1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
4 years ago
14

"The pkill command terminates _________."

Computers and Technology
1 answer:
Helen [10]4 years ago
4 0

Answer:

d. all instances of a process with the same name matched by a regular expression

Explanation:

In Linux OS there is <em>kill</em> command that you can use to force applications to shut down. When you execute <em>kill</em> command, you are actually sending a signal to the system to force it to terminate the incorrectly behaving application.

The syntax for <em>kill</em> is:

$ kill [signal or option] PID

You have to know <em>PID</em> (Process IDentification number) of the desired process to complete this command.

The <em>pkill</em> command allows you to use advanced <em>regex</em> patterns and other matching criteria. Instead of using the <em>PID</em>, you can now terminate the application by entering the name of its process. For example, to shut down <em>Firefox</em> simply enter the command:

$ pkill firefox

Since it matches the regular expression pattern, you can also enter the name only partially, for example:

$ pkill fire

You might be interested in
Which term describes a secure, individual, private cloud-computing model hosted within a public cloud?
grin007 [14]

The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

<h3>What is this cloud about?</h3>

A hybrid cloud is known to be a system or a model which is said to be a form of a private cloud that is linked with public cloud infrastructure, and it is one that tends to give room for an organization to act workloads in two environments.

Note that In this model, the public cloud is known to be one that is seen and it is one that becomes an extension of the private cloud to make a single, uniform cloud.

Hence, The term that describes a secure, individual, private cloud-computing model hosted within a public cloud is A hybrid cloud.

Learn more about hybrid cloud from

brainly.com/question/27838623

#SPJ1

7 0
1 year ago
A data visualization tool that updates in real time and gives multiple outputs is called
strojnjashka [21]

Answer:

A data dashboard

Explanation:

3 0
3 years ago
The appropriate use of social media includes _____. having arguments with people with whom you disagree having arguments with pe
lesantik [10]

An appropriate use of social media includes: C. having thought-provoking debates.

<h3>What is social media?</h3>

Social media refers to a collection of Internet software applications which are designed and developed so as to avail end users an ability to add, share and discuss different information, as well as enhance collaboration and debates between community members over the Internet.

In this context, we can logically deduce that having thought-provoking debates and making constructive posts are appropriate use of social media.

Read more on social media here: brainly.com/question/25546524

#SPJ1

3 0
2 years ago
True or false: Information security primarily relies on technical approaches such as multifactor authentication or data encrypti
Brilliant_brown [7]

TRUE, that is a one-sided answer. One of the biggest examples is virtually unhackable blockchains.

8 0
3 years ago
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two
natka813 [3]

Answer:

tyhgfrd

Explanation:

8 0
3 years ago
Other questions:
  • The function takes two string parameters; the first is the name of a file and the second is text. Complete the function to appen
    7·1 answer
  • What is primary storage
    11·2 answers
  • Which of the following OSI layers is responsible for the segmentation, multiplexing, flow control and host-to-host communication
    6·1 answer
  •  In which part of a professional email should you try to be brief, but highly descriptive? 
    10·1 answer
  • You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm s
    10·1 answer
  • Q1: Which of the following is an input peripheral device?
    12·2 answers
  • Decimal numbers is equivalent to binary 110
    5·1 answer
  • Es costoso construir un robot
    6·1 answer
  • What is the answer ????​
    9·1 answer
  • Write a short note on Ms - Excel...​..
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!