1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mote1985 [20]
3 years ago
9

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.

Which of the following files could Lynn modify so that the locate command no longer includes those results?
a. /etc/locate.d/updatedb.conf
b. /etc/locate.conf
c. /etc/updatedb.conf
d. /etc/locatedb.conf
Computers and Technology
1 answer:
marusya05 [52]3 years ago
4 0

Answer:

Lynn can modify /etc/updatedb.conf file so that locate command does not include files from a directory that she does not want to include in her search.

Explanation:

/etc/updatedb.conf is a configuration file for updating database. Locate command works fast because it searches for files in a database not in a file system. That Database is updated by a background process that runs on your system and continuously search and upload new files in a database./etc/updatedb.conf is a text file that contains key-value pairs. Key is a defined variable like PRUNENAMES or PRUNEPATHS. Key values other than defined variables give an error. Value can be any character but it should not exceed one line.  

PRUNENAMES is a key that can be initialized by only directory names and no pattern mechanism is used. The update does not scan this list of space-separated directory names when uploading files in a database that’s why the files in a directory never appear in the database.

You might be interested in
Some designer suggest that speech recognition should be used in tale phone menu system. This will allow users to interact with t
Sergio [31]

Answer:

My two arguments against the proposal are based on physical side effects and background noise interference.

Explanation:

To start with physical side effects, the use of speech recognition technology might make users experience physical discomfort. This is due to the fact that users who interact with the system by speaking for a long period would experience dry mouth, temporary loss of voice, vocal problems and muscle fatigue. In addition, the fact that users would always speak in an unnatural way to make the system interpret commands effectively could lead to voice strain.  

Also, users need to be in a quiet environment before they can get the best out of speech recognition technology. This is because background noise can interfere with commands and create a mix-up which the system cannot interpret. In other words, when an environment is noisy, speech recognition technology would find it difficult to differentiate between users voice and background noise.

4 0
3 years ago
how to get into harvard stanford mit ivy league guaranteed upper middle class need aid 9th grade, computer science major have no
Murrr4er [49]

Answer:

Colleges care a lot more about your math skills than computer stuff, even for computer science. Make sure you still do some computer science stuff (esp. if it's extracurricular) but focus on improving your math.

8 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
The producer thread will alternate between sleeping for a random period of time and inserting a random integer into the buffer.
Llana [10]

Answer:

// Producer Thread

void *producer(void *param) {

buffer_item item;

while (true) {

item = rand() % 100;

sem_wait(&empty);

pthread_mutex_lock(&mutex);

if (insert_item(item))

printf("Can't insert item\n");

else

printf("Producer %d: produced %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&full);

}

}

// Consumer Thread

void *consumer(void *param) {

while (true) {

buffer_item item = NULL;

if (in > 0)

item = buffer[in - 1];

sem_wait(&full);

pthread_mutex_lock(&mutex);

if (remove_item(&item))

printf("Can't remove item\n");

else

printf("Consumer %d: consumed %d\n", *((int*)param), item);

pthread_mutex_unlock(&mutex);

sem_post(&empty);

}

}

Explanation:

An outline of the producer and consumer threads appears as shown above.

3 0
3 years ago
HW7.24. Return nth integer from CSV string The function below takes two parameters: a string parameter: CSV_string and an intege
kotykmax [81]

Answer:

The solution code is written in Python 3.

  1. def processCSV(CSV_string, index):
  2.    data = CSV_string.split(",")
  3.    result = data[index]
  4.    return int(result)
  5. processCSV('111,22,3333,4', 2)

Explanation:

Firstly, create function and name it as <em>processCSV()</em> with two parameters, <em>CSV_string</em> and <em>index</em> (Line 1).

Since the CSV_string is a collection of integers separated by comma, we can make use of Python String built-in method <em>split() </em>to convert the <em>CSV_string </em>into a list of numbers by using "," as separator (Line 2).

Next, we can use the <em>index</em> to extract the target value from the list (Line 3).

Since the value in the list is still a string and therefore we shall use Python built-in method int() to convert the target value from string type to integer and return it as output of the function (Line 4)

We can test our function by using the sample test case (Line 6) and we shall see the expected output: 3333.

8 0
3 years ago
Other questions:
  • List three ways you can help someone who is being bullied in of just being a bystander​
    8·1 answer
  • These statements describe the NOS.(choose all that applies)
    13·2 answers
  • Write a program that produces the following output:
    12·1 answer
  • One interesting application of computers is to display graphs and bar charts. Write an application that reads five numbers betwe
    5·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
    15·1 answer
  • Present a detailed data model for your project scenario. You can create your data model using Microsoft Visio 2010, which you wi
    10·1 answer
  • IfL = 4.4H and the inductive reactance of an inductor is 620 Omega find the frequency of the alternating current​
    5·1 answer
  • LIST THE BEST 10 3D PRINTERS WITH THEIR RESPECTIVE APPS.
    14·1 answer
  • A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!