1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LuckyWell [14K]
3 years ago
14

You are managing an FTP server installed in Ubuntu Server. The server has created a very large log le, vsftpd.log. Which command

is appropriate to search the log le for activity of the user charlie?
a. sudo cat /var/log/vsftpd.log
b. grep "charlie" /var/log/vsftpd.log
c. sudo grep "charlie" /var/log/vsftpd.log
d. cat /var/log/vsftpd.log
Computers and Technology
1 answer:
kirill115 [55]3 years ago
5 0

Answer:

c. sudo grep "charlie" /var/log/vsftpd.log

Explanation:

  • sudo is used to access /var/log files since it requires superuser access
  • grep command is used to search for a string of characters in a specified file
  • "charlie" is the string searched in the log files
  • /var/log/ is where the log files are in linux systems
You might be interested in
You want to transfer a document from one computer to another, and you want the document to be encrypted. The destination compute
Alex_Xolod [135]

Answer:

Check the explanation

Explanation:

This document transfer ought to work smoothly. Due to the IEEE standards and Principles, the presentation layer is expected to encrypt/decrypt the data on both part of the network. The session layer creates a mutual coordination among the applications while the transport layer is there to ensures delivery. Immediately the segments hit the network, routers control and handle the routing process of the packets to the distant end. Layers 6, 3 & 1 are straightly involved in the italicized parts of the question; however, the entire layers play a role when looking at the transfer as a whole.

5 0
3 years ago
Why should you delete files from your computer?
LekaFEV [45]

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

6 0
3 years ago
Read 2 more answers
Each of the following programs has errors. Find as many as you can. 65. // Find the error in this program. #include using namesp
Serggg [28]

Answer:

There are two error in this program--

  1. In header file inclusion, file is not defined.
  2. In the statement "result = ++(num1 + num2);" , bracket is fixed after the increment operator.

Explanation:

  • For the first error, the user needs to add the file because "#include" is used to add the library for the program which states about the function and symbols used in the program.
  • The second error is because there must be a variable with the increment operator ( increment operator is being used to increase the value of a variable by 1), but there is a small brace fix in between the operator and operands.
7 0
4 years ago
If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ theme file.
stiks02 [169]
<span>A theme is a coordinated set of colors, fonts, backgrounds, and effects.</span><span>
An installed theme can be accessed and applied by clicking on a theme in the Themes group on the Design tab. </span><span>
If you need to use a custom theme frequently, you can save a presentation file as a(n) Office theme file.</span>
3 0
3 years ago
Read 2 more answers
A(n) _______ is a distributed networking architecture, residing on one or more computers, where one program requests a resource
vova2212 [387]

Answer: Client-Server model

Explanation:

The Client-server model is a distributed network application configuration, that partitions task or where one program requests a resource or service from another program, between the providers of a resource or service, called servers, and service requesters called clients. In the client-server architecture, when the client computer sends a request for data to the server through the internet, the server accepts the requested process and deliver the data packets requested back to the client.

4 0
3 years ago
Other questions:
  • Sam says that when he clicks on his schedule on the Internet, his computer is a receiver, not a sender. Is Sam correct? Why or w
    7·1 answer
  • What is used in computers to communicate with wireless keyboards, mice, and printers?
    8·1 answer
  • What is the process called if you are erasing data on your hard drive from a MAC
    12·1 answer
  • Brian is selecting an authentication protocol for a PPP connection. He would like to select an option that encrypts both usernam
    7·1 answer
  • The list below show test scores for 3rd period on a recent test.
    13·1 answer
  • True or false? LearnSmart (the "smart flash card assignments") really gets your competitive spirit in gear by allowing you to se
    8·1 answer
  • If one department chair—a professor—can chair only one department, and one department can have only one department chair. The en
    13·1 answer
  • What are the main features cyber law of Nepal​
    13·1 answer
  • Advantages of python programming language
    10·1 answer
  • Code used when creating a hyperlink to a specific part of the same page.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!