1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
15

What does the /etc/shadow file contain?

Computers and Technology
1 answer:
Alexxx [7]3 years ago
7 0

Answer:

This file contains encrypted password and other information also such as password expiration values,account and other confidential stuff etc.

Explanation:

In linux this file contains passwords and confidential stuff.

This file is only readable that to by the root account and hence it is secured.

You might be interested in
Which of the following blocks allows a user to enter text in a text box in App Inventor?
defon

Textbox.text the following blocks allows a user to enter text in a text box in App Inventor.

Textbox.text

<u>Explanation:</u>

The textbox is basically used to allow end-user to enter the data in the application such as visual basic language or HTML or any other programing language under GUI interface.

  • Textbox.Text:- is used to assigned or get any value in the text box.
  • Textbox.Visible:- it is a property whether to display the textbox or not.
  • Textbox.Enabled:- it is will not allowed end-user to enter the data . It will display the textbox in blur mode and content in the textbox will be displayed but end-user can’t modify or enter the data.
5 0
4 years ago
Write a MATLAB script using the quiver and contour commands to visualize the field and its divergence. Assume the region of inte
DochEvi [55]

Answer:

2b2t

Explanation:

2b2t

4 0
4 years ago
Question 4 Multiple Choice Worth 5 points)
Morgarella [4.7K]

The correct answer is Boolean logic.

Booleans are true or false statements.

An example of a while loop is:

while 1 < 5:

   #do something.

The Boolean statement is 1 < 5 which evaluates to true because 1 is less than 5.

I hope this helps!

3 0
3 years ago
Three popular types of ____ are handheld computers, PDAs, smart phones.
m_a_m_a [10]

Answer:

portable media players, and digital cameras

Explanation:

4 0
3 years ago
Applications of computer 15 fields ​
ioda

Answer:

Explanation:

1 robotics

2. Engineering

3. Government

3. Industries

5. Individual programming

6. Business

7. Schools

Etc

4 0
4 years ago
Other questions:
  • Think of a game you are familiar with and identify at least three team responsibilities which were required to make the game, on
    5·1 answer
  • Jimmy is running out of desk space. He keeps three computers on his desk. The three computers can’t be moved, and they need to b
    5·2 answers
  • Bitlocker uses the computer's __________ chip to store encryption keys and does not rely on individual user credentials. securit
    10·1 answer
  • The _____ unit is the preferred style unit for web page text because it makes it easy to develop pages in which different page e
    10·2 answers
  • Two powerboats are about to cross paths. what should the boat on the starboard (right) do?
    11·1 answer
  • To achieve balance—that is, to operate an information system that satisfies the user and the security professional—the security
    13·1 answer
  • If number is 20, what is printed to the console after this code is executed?
    13·1 answer
  • A user attempts to log in to a Windows PC, but the computer returns to the login screen after entering the correct username and
    12·1 answer
  • Queries in Access can be used ______________
    9·1 answer
  • How to do the for loop in python
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!