1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

Use the pattern of syntax for Linux commands to view messages generated by the kernel during boot, and display the location of t

he log files for the kernel messages using ls. You should submit two screen captures.

Computers and Technology
1 answer:
Jobisdone [24]3 years ago
3 0

Answer:

Explanation:

Now youwill have to enable boot logging by utilizing the following command:

$ sudo gedit /etc/default/bootlogd

You will then find the following line in the opened text editor.

# Run bootlogd at startup ?

BOOTLOGD_ENABLE=No

Replace No with Yes i.e.

BOOTLOGD_ENABLE=Yes

Now at any time you will boot, bootlog will be created in the /var/log/boot

how to open it? There are two ways, either through login in as root or use the sudo command to open it.

you can also head over to the log directory by making use of the command cd /var/log

and when you’re there you can now use ls command to check if all files present in the log folder

you will find file boot also.

The two screen captures are attached below

You might be interested in
Why might location be important when searching for a job?
Elan Coil [88]
D I think because none of the others seem like very important things, 
8 0
3 years ago
Read 2 more answers
Topic: Video Games.
Butoxors [25]

Answer:

Fire Emblem

Explanation:

4 0
3 years ago
When do you use FTP?
Sergeeva-Olga [200]
FTP (File Transfer Protocol) can be used for a variety of tasks. For instance, webmasters using FTP for pushing updates/files to their websites can provide easy and straightforward changes to their services without the need to physically transfer files onto the host server. FTP should be used when you must update a file or files on a host server for a variety of reasons and you do not have access to the host server physically. However, FTP also has some inherent security risks which is why some webmasters/hosts chose to opt out of pushing updates through FTP in favour of physical file transfer.
5 0
3 years ago
Read 2 more answers
Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name
egoroff_w [7]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is c)field.

As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.

So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.

Other options are not correct because:

The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.

3 0
3 years ago
Read 2 more answers
Why is there more than one Brainly website?
marta [7]

they are for different countries and languages

8 0
3 years ago
Read 2 more answers
Other questions:
  • Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?
    5·2 answers
  • In what way(s) did the password you tried to use not meet the password policy requirements?
    14·1 answer
  • Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of ciph
    7·1 answer
  • Based on the Standards, the statement, "Competition for computer time during periods of high demand had become intense because o
    8·1 answer
  • What test is most similar to binary​
    9·1 answer
  • The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
    9·1 answer
  • If cells A1=90,A2=85,A3=80,A4=75, A5=75.What will be the formula if you are going to get the formula total
    5·1 answer
  • Write a method called rotate that moves the value at the front of a list of integers to the end of the list. For example, if a v
    6·1 answer
  • You should always be afraid to use the internet<br><br> True or false?
    11·1 answer
  • Under which menu would you be able to see the number of continuous track minutes available on each mounted hard drive at the cur
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!