1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
2 years ago
8

Use the pattern of syntax for Linux commands to view messages generated by the kernel during boot, and display the location of t

he log files for the kernel messages using ls. You should submit two screen captures.

Computers and Technology
1 answer:
Jobisdone [24]2 years ago
3 0

Answer:

Explanation:

Now youwill have to enable boot logging by utilizing the following command:

$ sudo gedit /etc/default/bootlogd

You will then find the following line in the opened text editor.

# Run bootlogd at startup ?

BOOTLOGD_ENABLE=No

Replace No with Yes i.e.

BOOTLOGD_ENABLE=Yes

Now at any time you will boot, bootlog will be created in the /var/log/boot

how to open it? There are two ways, either through login in as root or use the sudo command to open it.

you can also head over to the log directory by making use of the command cd /var/log

and when you’re there you can now use ls command to check if all files present in the log folder

you will find file boot also.

The two screen captures are attached below

You might be interested in
Please Help!<br><br>in return brainliest and special thanks
arlik [135]
1. Option 3
2. Option 2
3. Option 3
8 0
3 years ago
Computer software licensed under exclusive legal right of the copyright holder with the intent that the licensee is given the ri
Shkiper50 [21]

Answer:

The following statement is 'True'.

Explanation:

There is a software named 'Proprietary software' and also called 'closed-source software', it's non-free software and used to describe the software that is not freely licensed such as operating system, file formats, and system programs. this software is licensed for studying, sharing, modification, redistribution and reverse engineering and has the copyright to use the software under only certain conditions and we can also say that it bears limit against these types of uses.

6 0
2 years ago
Types of computer viruses<br>​
e-lub [12.9K]

Answer:anti various

Explanation:hope fully this will help u

5 0
3 years ago
Read 2 more answers
HELP! Answer to question 2?
Vesnalui [34]
One advantage of Binary Search Algorithm: 
Compared to Linear search it is much faster because linear search starts its searching right from the first value but binary searches for something by splitting the array in two again and again and again. 

One disadvantage of Binary Search Algorithm:
Have to be sorted, unlike linear search that doesn't have to be. 
4 0
3 years ago
Given a positive real number, print its fractional part.
givi [52]
<span>The modf() function will do this for you:

double x, y, d;
x = -14.876;
y = modf(x, &d);
printf("Fractional part = %lf\n", y);

</span>
8 0
3 years ago
Other questions:
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • In three to five sentences, describe how technology helps business professionals to be more efficient. Include examples of hardw
    10·1 answer
  • Wide area networks are defined by their ability to
    14·2 answers
  • Text that has equal left and right margins is said to be
    14·2 answers
  • A customer comes into a computer parts and service store. The customer is looking for a device to help a person with accessibili
    5·1 answer
  • The CUSTOMERS and SALES tables contain these columns:
    6·1 answer
  • This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time
    13·1 answer
  • Which wildcard characters will return a single character when using the Find dialog box?
    6·2 answers
  • Given n ropes of different lengths, we need to connect these ropes into one rope. We can connect only 2 ropes at a time. The cos
    9·1 answer
  • Which of the following statements is true about the code used for software development?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!