1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
4 years ago
15

Which enviornment varible specifies additional directories to search for library files not listed in /etc/ld.so/conf?

Computers and Technology
1 answer:
Oliga [24]4 years ago
4 0

Answer:

LD_LIBRARY_PATH

Explanation:

In Linux operating system the LD_LIBRARY_PATH is a environment variable for search path and it specifies the set of directories separated by colon (:) that library files are searched for before the standard set of directories. it specifies additional directories to file search for library files not listed in /etc/ld.so/conf.

You might be interested in
Besides a soho router, which of these devices is a network printer most likely to be connected to? a. router b. server c. workst
alukav5142 [94]

Answer:

A technician is configuring a new SOHO multifunction wireless router at a customer's location to provide network access to several wireless ...

Explanation:

5 0
2 years ago
Read 2 more answers
For a list to be binary search-able, we need the following thing to be true, because... a. The list must be sorted, because chec
rusak2 [61]

Answer:

The answer is option A.

Explanation:

Negative numbers can be found by binary search, this makes option B incorrect.

Unsorted and randomized lists are also not things that support a binary search, options C and D are incorrect.

Binary search uses a technique where the middle element of the list is located and used to determine whether the search should be done within the lower indexed part of the list or the higher. So for a list to be binary search-able, it should be sorted and not randomized.

The answer is A.

I hope this helps.

7 0
3 years ago
Uses of internet write in point.​
Vladimir [108]

Answer:

-Electronic mail. At least 85% of the inhabitants of cyberspace send and receive e-mail. ...

-Research.

-Downloading files.

-Discussion groups. ...

-Interactive games. ...

-Education and self-improvement. ...

-Friendship and dating. ...

-Electronic newspapers and magazines.

3 0
3 years ago
When considering the typical characteristics of a server, how is the server optimized in relation to applications?
VLD [36.1K]

Answer: Server are optimized so that they can work efficiently and improve their performance while working. Application server optimization mechanism can be used for optimizing the server with respect to the application.

Some of the techniques used in the application server optimization are as follows:-

  • Load balancing- which helps in upgrading throughput ,improves the time of response, enhance the bandwidth of network etc.
  • Fail-over management- it is used for decrement of latency, balancing the server, increasing the availability of network and it resources etc.

3 0
3 years ago
Write a raptor program that will display the count from 100 to 0 in decrements of 5.
S_A_V [24]

A raptor program that will display the count from 100 to 0 in decrements of 5 is shown below.

<h3>What is a raptor program?</h3>

This refers to a programming environment that works on a flowchart basis to help the user to present their algorithms in a visual manner.

Using a raptor program, you can display a count from 100 to 0 in decrements of 5 as shown:


#include <iostream>

#include <string>

using namespace std;

int main()

{

int count;

Count =100;

while (Count<=0)

{

cout << Count << endl;

Count =Count-5;

}

return 0;

}

The result would be a list showing numbers that go from 100 to 0 in decrements of 5.

Find out more on raptor programs at brainly.com/question/15082977

#SPJ1

3 0
2 years ago
Other questions:
  • Suppose an instruction takes 4 cycles to execute in an unpipelined CPU: one cycle to fetch the instruction, one cycle to decode
    10·1 answer
  • Which of the following statements is true?
    11·1 answer
  • Using social media and sending a blast are examples of
    13·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
    8·1 answer
  • E-mail has made it very easy to send a message to more than one person at any time of day from just about anywhere. If you wante
    12·2 answers
  • Which of the following is productivity strategy for collaboration?
    6·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Which tab do you select to change how you see your Word document on screen?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!