1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
2 years ago
6

What does running the “sudo” command do?

Computers and Technology
1 answer:
Luba_88 [7]2 years ago
3 0

Answer:

Elevates rights to what you can access

You might be interested in
Which of the following website is arguably considered the best site to search for scholarships
monitta
There is no way to define the 'best' site. Each site offers a unique experience along with the fact it might not display the same information as the other ones. The APEX site (As far as I know, it is a school test site) Won't really be able to help unless you are willing to do a few tests. I would go for Scholarshipexperts.com
3 0
2 years ago
Read 2 more answers
What makes the huns a formidable force for the roman empire?
Maurinko [17]
<span>The Huns were a formidable force to fight. They were able to eat most food without problem which removes the needs for supply trains and such and encourages pillaging. Another reason is that their a cavalry based army which completely decimated roman military since the roman empire consist of flat land and they could outflank, outrun, and could whittle down an army with ease. They also are nomads which means you don't know where they're living and so you can't be on the attack which also gave an advantage. This points that the Huns are a force to be reckon with.</span>
7 0
3 years ago
What is an antispamming approach where the receiving computer launches a return attack against the spammer, sending email messag
Burka [1]

Answer:

Teergrubing.

Explanation:

Teergrubing is an antis-pamming approach where the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.

It is a good antis-pamming approach because it slows response to the Simple Mail Transfer Protocol (SMTP) commands, thus tying up resources.

8 0
2 years ago
Read 2 more answers
What is the full form of bcc please tell​
expeople1 [14]

Blind Carbon Copy

For emails. It is used to send a copy of the email to somebody without the original person receiving it knowing that you sent a copy.

3 0
2 years ago
Read 2 more answers
The implementation stage of the SDLC _____.
Karolina [17]

Answer:

d. involves analyzing end-user business requirements in order to refine project goals

Explanation:

In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.

For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.

6 0
2 years ago
Other questions:
  • Why should spain go to Africa ​
    15·1 answer
  • Please help!!
    8·1 answer
  • Hi, I just have a few questions from my digital tech assignment.
    14·2 answers
  • Which are examples of types of audio media that can support a presentation? Check all that apply.
    14·2 answers
  • How to shutdow computer
    7·1 answer
  • Task 1
    9·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called what?
    11·1 answer
  • How to set Campaign goals?
    11·1 answer
  • Your customer said that understanding the directions is difficult. This is an aspect of
    6·1 answer
  • Can anyone figure this out???? I need help ASAP!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!