1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
8

What standard linux utility is used to install and configure software on centos operating systems?

Computers and Technology
1 answer:
vazorg [7]3 years ago
8 0
For software management, yum is easier than rpm. For configuration CentOS 7 has a number of programs to use: nmcli, firewall-cmd and hostnamectl. Other than that, vi is the editor that's most common on *nix systems for editing configuration files.
You might be interested in
Your task is to build a palindrome from an input string.A palindrome is a word that readsthe same backward or forward. Your code
White raven [17]

Answer:

The program in Python is as follows:

word = input("Word: ")

if len(word) < 5:

   print("At least 5 characters")

else:

   pal = word[0:5]

   word = word[0:4]

   word = word[::-1]

   pal+=word

   print(pal)

Explanation:

This gets the word from the user

word = input("Word: ")

This checks if the length of the word is less than 5.

if len(word) < 5:

If yes, this tells the user that at least 5 characters is needed

   print("At least 5 characters")

If otherwise

else:

This extracts the first 5 characters of the word into variable named pal

   pal = word[0:5]

This extracts the first 5 characters of the word into variable named word

   word = word[0:4]

This reverses variable word

   word = word[::-1]

This concatenates pal and word

   pal+=word

This prints the generated palindrome

   print(pal)

7 0
3 years ago
Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
soldier1979 [14.2K]
D scanner She can scan the files and email a digital copy.
4 0
2 years ago
Read 2 more answers
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight
Sedaia [141]

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

7 0
3 years ago
Help me
denis23 [38]

Answer:

a = 6, b = 0

Explanation:

The loop ran 3 times before b == 0. "while ((b != 0)" is essentially saying: 'While b is not equal to 0, do what's in my loop'. Same general thing with "&& ((a / b) >= 0)". The "&&" is specifying that there should be another loop condition, while the rest states: 'as long as a ÷ b is greater than 0, do what's in my loop'. If both of these conditions are met, the loop will run, It will continue this until the conditions are not met. Hope that helped! :)

7 0
3 years ago
What is the purpose of saving code snippets?
Brrunno [24]

Answer:

A stores code for later re-use

Explanation:

To find - What is the purpose of saving code snippets?

Solution -

Code Snippet" is used to describe a small portion of re-usable source code, machine code, or text.

They allow a programmer to avoid typing repetitive code during the course of routine programming.

So,

The correct option is - A stores code for later re-use

4 0
3 years ago
Other questions:
  • Forensic computer investigators must _____.
    6·2 answers
  • Suppose the length of each packet is L bits. Also, assume the path from a server to a client includes N links each of rate R (i.
    8·1 answer
  • Mathematical expression that might link numbers in cells
    14·1 answer
  • Where could an identity theft access your personal information?
    9·2 answers
  • ____ is a bundled set of communications services, including internet, telephone, and tv, that operates over a total fiber-optic
    5·1 answer
  • PLZZZ HELP!!! I’ll give brainliest
    12·1 answer
  • A photographer uses which of these tools to form an argument?
    14·2 answers
  • 2ND LAST QUESTION
    13·1 answer
  • Please tell fast plzzzzzzzz​
    9·2 answers
  • The ________ is the easy way to insert a new slide between existing slides.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!