1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
4 years ago
14

"The pkill command terminates _________."

Computers and Technology
1 answer:
Helen [10]4 years ago
4 0

Answer:

d. all instances of a process with the same name matched by a regular expression

Explanation:

In Linux OS there is <em>kill</em> command that you can use to force applications to shut down. When you execute <em>kill</em> command, you are actually sending a signal to the system to force it to terminate the incorrectly behaving application.

The syntax for <em>kill</em> is:

$ kill [signal or option] PID

You have to know <em>PID</em> (Process IDentification number) of the desired process to complete this command.

The <em>pkill</em> command allows you to use advanced <em>regex</em> patterns and other matching criteria. Instead of using the <em>PID</em>, you can now terminate the application by entering the name of its process. For example, to shut down <em>Firefox</em> simply enter the command:

$ pkill firefox

Since it matches the regular expression pattern, you can also enter the name only partially, for example:

$ pkill fire

You might be interested in
Evidence left behind by participants or observers is an example of what kind of resource?
Natasha2012 [34]
The answer should be D
6 0
3 years ago
Read 2 more answers
Why do we need to update database regularly
sergiy2304 [10]
To protect from attackers gaining access by sitting on a certain configuration too long. 
7 0
3 years ago
How do nations mostly use technology in foreign relations? Check all that apply.
Andreas93 [3]

Answer:

  • to spy on one another
  • to carry out cyber attacks
  • to improve their public images

Explanation:

Different countries have tools to hack, control and filter information in foreign countries using different devices and techniques that allow them to be aware of any threat that may arise from another country, as well as obtaining information that helps them.

By linking technology with foreign policy, it is possible to strengthen and complement national capacities in these areas, opening the possibility of diversifying and expanding the projection of a country with an excellent image that offers sophisticated technology-based services.

5 0
3 years ago
Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text
Anna [14]

Answer:

HTML, CSS, JavaScript, python, SQL

Explanation:

To create a web page for her travel adventures Dani has to use HTML and CSS to design the page's layout. A beautiful simple design such as one which shows photos of her on her travel destinations, and a paragraph for her to write a little story on her travels would do.

Dani needs JavaScript to animate the photos she's going to post on the page. Dani also should use python to build the backend of her page so she can write codes to save and access her documented adventures from the database. She should use a database language like SQL to save all of her adventures so she can view them at a later time for the memories.

7 0
3 years ago
Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be
zaharov [31]

558c::d367:7c8e:1216:0:66be

7 0
3 years ago
Other questions:
  • An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
    6·2 answers
  • Which of the following patterns of cell phone use can be observed in this chart
    12·1 answer
  • When 2 or more computers are connected it is called?
    14·1 answer
  • Which of the following statements is false? a. InputStream and OutputStream are abstract classes for performing byte-based I/O.
    7·1 answer
  • The 6 steps for PowerPoint competency from the TED talk in the module "How to Avoid Death by PowerPoint."?
    6·1 answer
  • Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
    10·1 answer
  • Please discuss what you consider to be some of the biggest challenges your company will face when working from the Linux command
    14·1 answer
  • ________ allows the computer to get its configuration information from the network instead of the network administrator providin
    5·1 answer
  • What symbol do we use to denote a character?
    14·1 answer
  • What are the characteristics of:<br> Master file<br> Transaction file<br> Reference file
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!