1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olchik [2.2K]
3 years ago
11

Lynn runs the locate command and the results include many files from a directory that she doesn't want to include in her search.

Which of the following files could Lynn modify so that the locate command no longer includes those results?a. /etc/locate.d/updatedb.conf
b. /etc/locate.conf
c. /etc/updatedb.conf
d. /etc/locatedb.conf
Computers and Technology
2 answers:
Zinaida [17]3 years ago
5 0

Answer:

C) /etc/updatedb.conf

Explanation:

The locate command actually uses the configuration file located at /etc/updated.conf.

Bumek [7]3 years ago
5 0

Answer:

The correct option is c.  /etc/updatedb.conf

Explanation:

In Linux operating system, locate command is used to search for directories and files in the system.

The locate command uses a database file which is generated by updatedb command to search for a pattern.

Therefore, Lynn can modify the /etc/updatedb.conf file so that the locate command doesn't include those results in the search results.

You can further explore the available options of locate command by typing the man locate command in the terminal.

You might be interested in
Your mother is sure that you were driving too fast because she knows
Klio2033 [76]

I think the corret answer would be C

5 0
3 years ago
Read 2 more answers
Java:
Agata [3.3K]

Answer:

import java.util.*;

public class work {

// function for counting unique character

public static int numUnique(String input) {

boolean[] list = new boolean[Character.MAX_VALUE];

for (int i = 0; i < input.length(); i++) {

list[input.charAt(i)] = true;

}

int count = 0;

for (int i = 0; i <list.length; i++) {

if (list[i] == true){

count++;

}

}

return count;

}

public static void main(String args[])

{

List<String>list=new ArrayList<>(); // creatng array list of type string

list.add("abcdef");

list.add("aaabcd");

list.add("bccddee");

list.add("abcddd");

list.add("a");

for(String str:list)

{

// for printing the results

System.out.println("given string : "+ str+" , number of unique values :"+numUnique(str));

}

}

}

Explanation:

5 0
4 years ago
A computer’s BIOS is defined as the
Dennis_Churaev [7]
Basic input/output system
5 0
3 years ago
Read 2 more answers
What option is used to combine several objects so that they can be treated as a single unit
elixir [45]
Im gonna hope this is a coding question.
It's parent (unit) and make children (objects)

If it's word/excel give me the multiple choice answers please.
6 0
4 years ago
You are the security administrator for a bank. The users are complaining about the network being slow. It is not a particularly
bulgar [2K]

Answer:Denial of service

Explanation:Denial of service is the type of attack that is caused to the computer attacks. These attacks basically cause the circumstances such as difficulty in accessing of the website or resource, accessing particular computer system , creation of the traffic in network, This attack occurrence stops or create difficulties for the legal person to access the network .

Therefore, there is the occurrence of the Denial of service(DoS) in the bank's computer network.

3 0
3 years ago
Other questions:
  • My 2 in 1 laptop/tablet
    13·1 answer
  • An empty frame used to reserve space for a picture to be inserted at a later time is know as what
    6·1 answer
  • 7) through: (0, 4) and (-1,0)​
    10·1 answer
  • The Department of Homeland Security only deals with threats to national security and does not play a role in helping companies m
    13·1 answer
  • The basic assumption that underlines event driven modeling is that the system can be represented as a model with an infinite num
    9·1 answer
  • Which file is usually the first file to be displayed when you navigate to a website?
    7·1 answer
  • Assume the following:
    10·1 answer
  • Help me guys plssssss​
    10·1 answer
  • NEED HELP ASAP
    13·2 answers
  • what is the greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!