1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
3 years ago
5

Given the following output from /etc/fstab, which filesystems will be automatically checked on boot by the fsck command? [BEGIN

CODE] /dev/sda1 / ext4 defaults 1 1 none /dev/pts devpts gid=5,mode=620 1 0 none /proc proc defaults 0 1 none /dev/shm tmpfs defaults 1 0 /dev/sdc2 swap swap defaults 0 1 /dev/dvd /media/dvd iso9660 noauto,ro 0 0 /dev/fd0 /media/floppy auto noauto 0 0 [END CODE]
Computers and Technology
1 answer:
leva [86]3 years ago
6 0

Answer:

Details below

Explanation:

From the following output we will get: /, /dev/pts, and /dev/shm while fsck is running automatically at boot for all filesystems

You might be interested in
Which type of software-generated problems can indicate that a software bug is causing a memory error?
Katena32 [7]
The type of software-generated problems that can indicate that a software bug is causing a memory error are page fault, exception error and general-protection fault. Registry errors show that there are parts of the registry that were written to the faulty parts of the RAM. An erroneous memory count would happen when there is incompatibility in the installation.
3 0
3 years ago
Desertification is caused by
Alex Ar [27]
<span>it is caused by A.overgrazing
</span>
5 0
3 years ago
What some one ask me if i am more of hardware or software person, what is that mean?
balu736 [363]

Answer: Any person or people asking about someone being a hardware or software person displays that they are questioning about the computer knowledge of the person and his/her interest.

The interest can be regarding software tools for programming, designing ,  etc or hardware device like troubleshooting, assembling the computer parts ,etc.

The person persisting good knowledge about software programming language and software is diverted towards software side .The person who likes to deal with hardware parts of the computer system is hardware-oriented person.

7 0
3 years ago
The "edit" command must allow the user to find a record in the list by director. If there are multiple records with the same dir
sveticcg [70]

Answer:

To allow user to assign rating

Explanation:

The basic function of “rate” command is to give opportunity to the user to assign a value to a song from the range of 1 – 5.

In the range, the value of 1 indicates the lowest rating, while value of 5 is the highest rating that can be obtained.

Any previous ratings are then replaced by the new rating assigned from the range of 1 – 5.

7 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is a narrative essay most like
    8·2 answers
  • Is frequency measured in henry.
    14·1 answer
  • While doing online research you enter this keyword search with a truncation character: man* Which of the following would not be
    15·1 answer
  • _____ can render data useless to unauthorized users who might have violated some of the database security layers.
    7·1 answer
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key
    6·1 answer
  • A. Suppose a CPU with a write-through, write-allocate cache achieves a CPI of 2. What are the read and write bandwidths (measure
    13·1 answer
  • Drag the tiles to the boxes to form correct palrs.
    9·1 answer
  • Which emerging technologies will have more injury on our day to day country &amp; How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!