1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
8

What standard linux utility is used to install and configure software on centos operating systems?

Computers and Technology
1 answer:
vazorg [7]3 years ago
8 0
For software management, yum is easier than rpm. For configuration CentOS 7 has a number of programs to use: nmcli, firewall-cmd and hostnamectl. Other than that, vi is the editor that's most common on *nix systems for editing configuration files.
You might be interested in
Im new on this site so wat are the points for???
stealth61 [152]
Points help you answer questions that you might have <span />
6 0
3 years ago
Read 2 more answers
Your current backup schedule involves incremental backups of all data Monday through Saturday, with a full backup on Sunday. Las
Simora [160]

<u>To recover the data on the failed drive the followings to be done:</u>

  • It is good practices schedule weekly backup schedule from Monday to Saturday as increment backup and Sunday as full backup.
  • Normally backup schedule is running done at midnight time only.
  • Either number of user will be less or no user will be access the database or network.
  • As first step check whether drive has enough spaces. I not free the enough space and rerun the backup on failed drive.
  • Check backup drives login where password changed.
  • Check drive is mounted or on.

Check operating system user id and password changed in operating system or active. After troubleshooting, Rerun the task for Saturday.

8 0
4 years ago
Lukas entered the date 9-17-2013 in an Excel workbook. He wants the date to appears as “Tuesday, September 17, 2013.” Instead of
Sphinxa [80]
<span>The answer is highlight cells, select the Insert tab, click on the number, select Date from the category box, highlight the correct format, and click OK.</span>
8 0
4 years ago
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.a. asy
Liono4ka [1.6K]

Answer: (B) Symmetric  

Explanation:

The symmetric encryption one of the type of method in which only one key is used for both the type of electronic information that is decrypt and encrypt.

  • In the computer technology, the symmetric encryption is used as the singular type of encryption key for displaying the electronic message.
  • It uses various types of mathematical algorithm for the purpose of data conversion which results into the inability to find out the message.
  • Is is used as the secret key for encipher and also decipher the message.  

Therefore, Option (B) is correct.

5 0
3 years ago
• Microsoft Windows 7 Operating System • 7-Zip • Adobe Acrobat Professional • Adobe Reader • Google Chrome • Microsoft Internet
inysia [295]

All are software applications except Microsoft windows 7 operating system

8 0
3 years ago
Other questions:
  • Which tool relies on the logged on user's certificate details to encrypt or decrypt files and folders? powershell bitlocker encr
    12·1 answer
  • Question 5
    5·1 answer
  • Does the game cooking fever use data?
    10·1 answer
  • Add an array, which will store the most recent 5 recent transactions. For the array, add an insert function which will store the
    10·1 answer
  • Which router feature, when enabled, helps computers on the local network automatically discover and communicate with services pr
    12·1 answer
  • Should the use of hacktivists by a country against enemy organizations be considered an act of war? Why or why not? How about th
    8·1 answer
  • What was one of the first ways that health information technology (health IT) changed the way healthcare workers practice? A. Us
    7·1 answer
  • Intrusion Detection System (IDS) is a security mechanism that detects unauthorized user activities, attacks, and network comprom
    5·1 answer
  • What sequence is used to create a brochure document from a template?
    5·1 answer
  • What kind of email formatting change can you make using the Rules Wizard?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!