1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

Use the pattern of syntax for Linux commands to view messages generated by the kernel during boot, and display the location of t

he log files for the kernel messages using ls. You should submit two screen captures.

Computers and Technology
1 answer:
Jobisdone [24]3 years ago
3 0

Answer:

Explanation:

Now youwill have to enable boot logging by utilizing the following command:

$ sudo gedit /etc/default/bootlogd

You will then find the following line in the opened text editor.

# Run bootlogd at startup ?

BOOTLOGD_ENABLE=No

Replace No with Yes i.e.

BOOTLOGD_ENABLE=Yes

Now at any time you will boot, bootlog will be created in the /var/log/boot

how to open it? There are two ways, either through login in as root or use the sudo command to open it.

you can also head over to the log directory by making use of the command cd /var/log

and when you’re there you can now use ls command to check if all files present in the log folder

you will find file boot also.

The two screen captures are attached below

You might be interested in
Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
topjm [15]
Text box
hope this helped
3 0
2 years ago
I have a problem with Instagram.
krok68 [10]

Answer:

developer tool

Explanation:

if you're using chrome click on the 3 dots that's in the top right corner and go to tools, you will see "developer tools" and click on that, then you will see an icon that shows a laptop/computer and an iphone click on that and you can even choose the type of phone you wish to see the view of (ex. iphone X), refresh the page and you will be able to see the direct message icon and you will be able to message your friend.

good luck.

5 0
3 years ago
If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
umka21 [38]
64 bit the likely hood of it failing is much less
4 0
3 years ago
While speech recognition can operate without any confi guration, you can train it to more accurately recognize your voice. true
Natasha_Volkova [10]
True because any one can change or fix their voice just by practicing a voice.
3 0
3 years ago
A(n) ____ consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to pe
yarga [219]

Answer:

The correct answer is "Program".  

Explanation:

Program is the collection of statement or instruction which is developed for creating any software or any purpose. The program is implemented or executed by a computer to perform a particular task.The particular programmer always writes an instruction to develop a program.

Program are always organized for the common purpose, that specifies the computer what tasks to perform as well as how to perform that particular task for example if programmer develops a program of calculator then it should be only used for the calculation purpose.

7 0
3 years ago
Other questions:
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • In an inheritance situation, the new class that you create from an existing class is known as the:
    5·1 answer
  • 7. When using find command in word we can search?
    7·1 answer
  • Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control
    10·1 answer
  • For which type of long-distance call do you need to tell the operator the name of the person to whom you wish to speak?
    10·1 answer
  • What are finger nails made of?-
    12·2 answers
  • Fire Tint, Inc., (FTI), applies tint to airplane canopies (front windows) manufactured by other companies. When the canopy manuf
    12·1 answer
  • What year did the first hovercraft sail on water
    15·1 answer
  • Given the following statement, what is the value of myExample?
    13·1 answer
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!