1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
14

You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command

to update and install packages. Which command do you run?
Computers and Technology
1 answer:
masya89 [10]3 years ago
6 0

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

You might be interested in
Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
ANTONII [103]
You know what...ITS IS VERY VERY FREAKIN FALSE!!
7 0
3 years ago
Read 2 more answers
Why is making a model, or prototype, important in the design process?
seropon [69]

Explanation:

to size up and define your works organize and having a creative thoughts and imaginations in it to properly execute the measurement of the clothes.

8 0
3 years ago
Which of the following is a message sent from one person to another using the Internet?
Alexxx [7]
Where is the message lol ?
8 0
2 years ago
Read 2 more answers
You want to be super private with your email. You'd like to be able to download your email to a single device, then remove it fr
DENIUS [597]

Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

<h3>What is  POP3 about ?</h3>

POP3 is known to be a tool that gives one room to be able to download email to a single device, which a person want to use if they want to add privacy to their emails.

Therefore, Since the person want to be super private with your email, the email protocol can you use to do that is POP 3.

Learn more about email from

brainly.com/question/24688558

#SPJ1

8 0
2 years ago
You are configuring a network attached storage (nas) appliance. what file sharing protocol(s) could you use to allow access to w
kicyunya [14]

Most clients should support Server Message Block (SMB)/Common Internet File System (CIFS).

<h3>What is CIFS used for?</h3>

Common Internet File System (CIFS) is a network filesystem protocol used for providing shared access to files and printers between machines on the network. A CIFS client application can read, write, edit and even remove files on the remote server.

<h3>What are CIFS servers?</h3>

CIFS stands for “Common Internet File System.” CIFS is a dialect of SMB. That is, CIFS is a particular implementation of the Server Message Block protocol, created by Microsoft.

To learn more about Internet File System , refer

brainly.com/question/13008468

#SPJ4

6 0
2 years ago
Other questions:
  • When an Ethernet frame arrives at a computer, the Ethernet layer must hand the packet that it contains to the next higher layer
    9·1 answer
  • Does group policy management matter without a server environment?
    7·1 answer
  • I need help with this plz question 2 and 3 asap
    7·1 answer
  • Assume the existence of an UNSORTED ARRAY of n characters. You are to trace the CS111Sort algorithm (as described here) to reord
    14·1 answer
  • You can click the ____ button to undo an automatic correction.
    9·1 answer
  • What are other ways you could use the shake or compass code blocks in physical computing projects?
    14·1 answer
  • How many bits would be needed to count all of the students in class today?There are 25 in class
    15·2 answers
  • The term information technology was first used what year?
    15·2 answers
  • Write a function called mul_time that takes a Time_Elapsed object and a number and returns a new Time_Elapsed object that contai
    13·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!