1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
9

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.

Which of the following files could Lynn modify so that the locate command no longer includes those results?
a. /etc/locate.d/updatedb.conf
b. /etc/locate.conf
c. /etc/updatedb.conf
d. /etc/locatedb.conf
Computers and Technology
1 answer:
marusya05 [52]3 years ago
4 0

Answer:

Lynn can modify /etc/updatedb.conf file so that locate command does not include files from a directory that she does not want to include in her search.

Explanation:

/etc/updatedb.conf is a configuration file for updating database. Locate command works fast because it searches for files in a database not in a file system. That Database is updated by a background process that runs on your system and continuously search and upload new files in a database./etc/updatedb.conf is a text file that contains key-value pairs. Key is a defined variable like PRUNENAMES or PRUNEPATHS. Key values other than defined variables give an error. Value can be any character but it should not exceed one line.  

PRUNENAMES is a key that can be initialized by only directory names and no pattern mechanism is used. The update does not scan this list of space-separated directory names when uploading files in a database that’s why the files in a directory never appear in the database.

You might be interested in
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
ValentinkaMS [17]

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

8 0
2 years ago
What the meaning of ethics
insens350 [35]
Ethics is a system of moral principles and is concerned with what is good for individuals and society and is also described as moral philosophy.
3 0
3 years ago
In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used t
Elina [12.6K]

Answer:

The right response is "Robots ".

Explanation:

  • A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.
  • It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.
7 0
3 years ago
The definition of network is:
kondaur [170]

\text{Hello there!}

<u>Networks were originally used as a government weapon 61 years ago</u> to <u>communicate information</u> such as data and research. However, individual networks were eventually discontinued by the government and made open to the public to use for things such as PAN, LAN, MAN, WAN, SAN, and so on.

<u>Our internet today is capable of communicating with bilions of computers.</u> This is possible due to your modem using radio wave-like speeds to connect to your ISP. Your ISP then connects to a larger network, which is connecting to thousands of other networks. You see, <u>the internet is just a large network of networks that are connected through very fast radiowaves</u>. However, it is not just a single network being used anymore; it's thousands of them. The term, "internet" was used to describe this large selection of networks. In short, <u>B</u><u> would be incorrect. </u>

The worldwide web is a protocol used by the internet to connect to select websites favourably from whoever's using it. This obviously would not define the network, as this is something that's used by it. Furthermore, <u>A</u><u> would not be correct.</u>

As described already, the network was a selection of computers used to communicate information to each other. <u>C </u><u>would not be correct </u>as it states that there is only one computer being used.

\fbox{Therefore, D would be the correct answer.}

\rule{300}{1.5}

6 0
3 years ago
The area of a square is stored in a double variable named area. Write an expression whose value is length of the diagonal of the
melisa1 [442]

Answer:

sqrt(area)

Explanation:

  • Here sqrt is a short form of square root.
  • area is a variable name having he area of square.
  • When the function is called, it will give the square root of the value stored in variable area.

As we have to find the length of the diagonal, we must knew that as all sides of the square are same in length so are the diagonals. This means that each of the four sides of the square and it diagonals are equal in length.

So a square has: length=breadth=diagonal

As  Area= length*breadth

√area = length           (as length = diagonal length)

So     √area = diagonal length

4 0
3 years ago
Other questions:
  • Fix the 2 error codes.
    14·1 answer
  • Select the correct answer.
    6·1 answer
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • Complete the function void update (int *a, int *b), which reads two integers as argument, and sets a with the sum of them, and b
    8·1 answer
  • 2. Who created the first photograph? How was this done?
    14·2 answers
  • A customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft P
    9·1 answer
  • What is the first step a user should take toward generating an index?
    7·1 answer
  • A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection
    9·1 answer
  • What are the different alignment options available in Microsoft​
    11·2 answers
  • A CPU has just been powered on and it immediately executes a machine code instruction. What is the most likely type of instructi
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!