1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
4 years ago
14

"The pkill command terminates _________."

Computers and Technology
1 answer:
Helen [10]4 years ago
4 0

Answer:

d. all instances of a process with the same name matched by a regular expression

Explanation:

In Linux OS there is <em>kill</em> command that you can use to force applications to shut down. When you execute <em>kill</em> command, you are actually sending a signal to the system to force it to terminate the incorrectly behaving application.

The syntax for <em>kill</em> is:

$ kill [signal or option] PID

You have to know <em>PID</em> (Process IDentification number) of the desired process to complete this command.

The <em>pkill</em> command allows you to use advanced <em>regex</em> patterns and other matching criteria. Instead of using the <em>PID</em>, you can now terminate the application by entering the name of its process. For example, to shut down <em>Firefox</em> simply enter the command:

$ pkill firefox

Since it matches the regular expression pattern, you can also enter the name only partially, for example:

$ pkill fire

You might be interested in
What do you understand by the terms:<br> I)input<br> ii)process<br> iii)storage<br> iv)output
agasfer [191]

an output device translate information processed by the computer into a form which you can understand.

input device are used to enter information such as letters, numbers, sounds or picture into a computer.

5 0
3 years ago
In _________, the process requests permission to access and modify variables shared with others. A) entry section B) critical se
AleksAgata [21]

In entry section, the process requests permission to access and modify variables shared with others.

<h3>What is Entry section?</h3>

Entry Section is known to be an aspect of any given process that tells the entry of a specific process.

Note that it often allows one process to enter and alter the shared variable and as such, In entry section, the process requests permission to access and modify variables shared with others.

Learn more about entry section from

brainly.com/question/1637572

#SPJ1

3 0
2 years ago
The protection of intellectual property (ip) is an example of what kind of information security need?
timama [110]

The protection of intellectual property (IP) is an example of Confidentiality of information security need, Unauthorized disclosure of intellectual property might result in the loss of whatever competitive advantage the IP may have provided the company.

What is considered IP?

Any creation of human intelligence that is shielded by the law from illegal use by others is generally referred to as intellectual property. A limited monopoly over protected property is inevitably created by the ownership of intellectual property.

Who owns intellectual property?

A work's owner is typically considered to be its creator. But for various kinds of property and in various situations, intellectual property ownership can be decided in various ways. For instance, if a piece of work is produced for a client, the client is the owner of that intellectual property.

Learn more about intellectual property: brainly.com/question/18650136

#SPJ4

3 0
2 years ago
Gina is using Outlook in the default cached mode and is connected to an Exchange server. What is the default file type used to s
ser-zykov [4K]

Answer:

Its C. MSG

Explanation:

On edg

5 0
3 years ago
Give sally sue specific suggestions on how she can improve her powerpoint skills.
castortr0y [4]
Use proper words. Also, add interesting facts about the subject
5 0
3 years ago
Other questions:
  • Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmit
    13·1 answer
  • I'll pay 50 dollars to anyone who can do this leave your snap after answering doing it and ill cash app it
    13·1 answer
  • The headings that appear on the Ribbon, such as File, Home, and Insert, are called:
    5·1 answer
  • One in five teens have been tricked by someone online:
    14·2 answers
  • The vertical and horizontal scroll bars can be used to aid in navigation throughout the document. true or false
    7·2 answers
  • __________ is a contemporary term for data and software tools for organizing, analyzing, and providing access to data to help ma
    6·1 answer
  • Which communication device uses wireless data transmission? Select 4 options.
    8·1 answer
  • Suppose that a laptop identifies its processor as follows: AMD’s A84500M. What does the AMD represent?
    5·1 answer
  • Create a parent class called Shape with width and height parameters of type double and a function that returns the area of the s
    12·1 answer
  • Given integer variables totalTickets, vipTickets, and sessionNum, which line of code correctly calls the following function? voi
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!