1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
9

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.

Which of the following files could Lynn modify so that the locate command no longer includes those results?
a. /etc/locate.d/updatedb.conf
b. /etc/locate.conf
c. /etc/updatedb.conf
d. /etc/locatedb.conf
Computers and Technology
1 answer:
marusya05 [52]3 years ago
4 0

Answer:

Lynn can modify /etc/updatedb.conf file so that locate command does not include files from a directory that she does not want to include in her search.

Explanation:

/etc/updatedb.conf is a configuration file for updating database. Locate command works fast because it searches for files in a database not in a file system. That Database is updated by a background process that runs on your system and continuously search and upload new files in a database./etc/updatedb.conf is a text file that contains key-value pairs. Key is a defined variable like PRUNENAMES or PRUNEPATHS. Key values other than defined variables give an error. Value can be any character but it should not exceed one line.  

PRUNENAMES is a key that can be initialized by only directory names and no pattern mechanism is used. The update does not scan this list of space-separated directory names when uploading files in a database that’s why the files in a directory never appear in the database.

You might be interested in
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Which mechanisms do we use to transport binary data and memory addresses?
Sav [38]

Answer:

The External Data Bus  is used to transport binary data and Address bus is used to transport memory addresses.

Explanation:

  • External Data Bus is a combination of data bus and external bus. Data bus is used to carry data and instructions between two or more components in the system e.g. CPU and all other computer components.
  • External bus is also called expansion bus. It is used to connect external components to the computer. Its a communication medium between CPU and other components. These components can be peripheral device like USB or flash memory.
  • So External Data Bus is used to transport data between CPU and external components. It is a primary communication pathway for data in a computer. The external data components are connected to this bus and the instruction or data on this bus is available to all external components. But the data communication is slower as compared to that of internal bus.
  • Address Bus carries physical location or address of data and transports memory addresses. Processor uses address bus when it wants to read data from memory or write data to the memory by sending a read/write signal by placing the read/write address of the specific memory location on the address bus.

 

6 0
4 years ago
In a C++ program, one and two are double variables and input values are 10.5 and 30.6. After statement cin >> one >>
melisa1 [442]

Answer:

The answer is "Option d"

Explanation:

In the given C++ program code, It is defined, that two double type variable "one and two" is defined, that holds the two double value that is "10.5 and 30.6".

In this code, it uses the "cin" method for input values from the user ends, when we execute this code, it provides the console screen, that inputs the double type value from the user side, and other given choices were wrong because it holds different values.

3 0
4 years ago
Landing pages in a foreign language should never be rated fully meets?
PilotLPTM [1.2K]

Answer:

if the landing page provides all kind information of information as to that site people usually like it or will most likely enjoy it

BRAINLIEST?????

Explanation:

3 0
3 years ago
Look at the following partial class definition, and then respond to the questions that follow it:
zhannawk [14.2K]

Solution :

a.

public Book($\text{String title}$, String author, $\text{String publisher}$, int $\text{copiesSold}$) {

 this.$\text{title}$ = $\text{title}$;

 this.$\text{author}$ = $\text{author}$;

 this.$\text{publisher}$ = $\text{publisher}$;

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

b). $\text{public String}$ getTitle() {

 return $\text{title}$;

}

$\text{public void}$ setTitle($\text{String title}$) {

 this.$\text{title}$ = $\text{title}$;

}

$\text{public String}$ getAuthor() {

 return author;

}

$\text{public void}$ setAuthor(String author) {

 this.$\text{author}$ = $\text{author}$;

}

$\text{public String}$ getPublisher() {

 return $\text{publisher}$;

}

$\text{public void}$ setPublisher(String $\text{publisher}$) {

 this.$\text{publisher}$ =$\text{publisher}$;

}

public int get$\text{copiesSold}$() {

 return $\text{copiesSold}$;

}

$\text{public void}$ set$\text{copiesSold}$(int $\text{copiesSold}$) {

 this.$\text{copiesSold}$ = $\text{copiesSold}$;

}

4 0
3 years ago
Other questions:
  • Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
    6·2 answers
  • which quotation from the story of the fisherman in the Arabian nights' entertainments supports the theme that cleverness trumps
    15·1 answer
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • Which philosopher believed that if we carefully examine the contents of our experience, we find that there are only two distinct
    10·1 answer
  • Which of the following best describes when a packet is addressed so that more than one destination can receive it and the first
    11·1 answer
  • Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
    8·1 answer
  • Which chart element provides the boundaries of the graphic?
    9·1 answer
  • What is the condition for setting an alarm clock
    11·1 answer
  • De que material esta hecho la pantalla de la computadora​
    12·1 answer
  • Necesito ejemplos de actitud filosófica por favor
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!