1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
3 years ago
8

What standard linux utility is used to install and configure software on centos operating systems?

Computers and Technology
1 answer:
vazorg [7]3 years ago
8 0
For software management, yum is easier than rpm. For configuration CentOS 7 has a number of programs to use: nmcli, firewall-cmd and hostnamectl. Other than that, vi is the editor that's most common on *nix systems for editing configuration files.
You might be interested in
Which would increase electric current? increasing the resistance increasing the size of the wire decreasing the voltage
Neko [114]
The answer is the second answer Increasing the size of the wire.
8 0
3 years ago
Write a program that reads a string from the user containing a date in the form mm/dd/ yyyy. It should print the date in the for
Oxana [17]

Answer:

months_info = ['January', 'February','March','April', 'May','June', 'July','August', 'September', 'October', 'November', 'December']

date = input('Enter a date using the mm/dd/yyyy format ')

m, d, y = date.split('/')

m = int(m) - 1

name_of_month = months_info[m]

print('{} {}, {}'.format(name_of_month, d, y))

Explanation:

  • Create a list of all months and store them in the months_info variable.
  • Get the date as an input from user and then split the date.
  • Finally display the date by following the specific layout using the built-in format method.
3 0
3 years ago
Is it possible build a real time machine?
Helga [31]

Answer:

Travelling in time might sound like a flight of fancy, but some physicists think it might really be possible. BBC Horizon looked at some of the most promising ideas for turning this staple of science fiction into reality.

Explanation:

7 0
2 years ago
Read 2 more answers
What is the ethical danger of using agents in negotiation?
Mariulka [41]
Information sharing, divergent interests, conflicting interests
6 0
3 years ago
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to
anastassius [24]

Answer:

Hi,

The best option in the list is <u>stop posting her e-mail address on newsgroups.</u>

Explanation:

Unwanted e-mail is categorized as a spam email.These emails can not be entirely avoided because we use the Internet thus it is recommended that you filter them.A program called my email client can help to filter spam though in some cases, it might not be effective.

The techniques Nadia can employ in this case is to hidden her email address when visiting newsgroups.News groups are forums online where people discuss certain topic.Avoid publishing the email in these web sites can hide her tackle this problem. Additionally, Nadia could train the filter serach feature in her email box through repoting such emails using the report button present, avoid responding/openning spam  or use a third party program to track spam emails and block them.

Wish you Luck!

8 0
3 years ago
Other questions:
  • When you park facing downhill and there is a curb, turn your wheels _____ the curb. When you park facing uphill and there is a c
    13·2 answers
  • Which best describes the benefits of renting a home?
    10·2 answers
  • What is sun and what does it do?
    12·2 answers
  • Plato Web Tech B Semester Test- I'll mark brainiest for answers to ALL
    9·1 answer
  • Which descriptions offer examples of Correction Services workers? Select all that apply.
    8·1 answer
  • Is it good to work out at the gym one day with hands then the next with feet, then a pattern?
    11·2 answers
  • Which is the highest level of the hierarchy of needs model?
    14·1 answer
  • Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the
    9·1 answer
  • Which best explains a password attached to a document?
    6·2 answers
  • A friend of mine had a samsung j2 phone and someone with a iphone placed something in her phone she thought was malware in her p
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!