1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
love history [14]
3 years ago
5

The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root with

out actually logging in under the root account in a Linux or UNIX system. A. True B. False
Computers and Technology
1 answer:
bagirrra123 [75]3 years ago
5 0

Answer:

B. False

Explanation:

The term Super user do (sudo) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system.

On the other hand, a Linux Intrusion Detection System can be defined as a patch to the operating system kernel of the Linux machine, as well as a set of administrative tools that is typically used to improve the security of the Linux kernel through the implementation of a mandatory access control known as MAC.

Hence, the Linux Intrusion Detection System can be used to deny any unauthorized use of the input or output device, memory, raw devices, file access and other network administrative functions.

You might be interested in
If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is execute
MAVERICK [17]

  The value of result of the  code segment is executed is known to be 4.

<h3>Why is the value of the code segment so?</h3>

  When the result of  is not  executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true

  Therefore,   result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the  code segment is executed is known to be 4.

Learn more about scores from

brainly.com/question/19492935

#SJ1

4 0
2 years ago
A) How can jitter be reduced on a user’s PC if there is jitter in incoming packets?
ELEN [110]

Answer:

a.) Incoming packets can be placed in the buffer and played back without the jitter.

b.) Buffering would increase the latency because there would be a delay in time when the packets enter the buffer and the time is released.

Explanation:

Jitter is referred technically as a packet delay variations.

It is variation in the periodicity of periodic events or a signal from target or the true frequency.

6 0
3 years ago
Which of the following protocols allows seemingly ill-matched computers to communicate with one another?
hodyreva [135]

Answer:

HTTP

Explanation:

HTTP is Hyper Text Transfer Protocol. This protocol is used to provide connection between server and client that are not connected or ill-matched. When a client request to the website. this address facilitate the client to connect with the server that is not directly connected to the client computer.

As we know, every website address starts with http/:  

5 0
3 years ago
PLZ ANSWER ASAP WILL GIVE BRAINLIEST
DENIUS [597]

Answer:

A or B would work.

If the developer tell you how to, which depends on what you ask then A would work

But Following links could give several smaller bits of info and resources required which makes B able to work

3 0
3 years ago
ShowDialog, used by a FileDialog object to display itself, is ______________________.
emmasim [6.3K]

Answer: A method

Explanation:

 The show Dialog is the type of method that is used by the file-dialog object for displaying itself. The main purpose of show-dialog is that it runs the common dialog box in the system with the default owner. It is basically inherited from the common-dialog.

The show-dialog is the type of method that displays the dialog box for defining the file extension filter and the various dialog behavior in the system.

 

8 0
3 years ago
Other questions:
  • Unlike a virtual image, a real image
    7·1 answer
  • What are six external parts of a computer
    11·1 answer
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • Thomas drew a rectangle with an area of 6 square cm what is the greatest possible perimeter of this rectangle
    5·1 answer
  • How would you justify using cloud computing?
    12·1 answer
  • Write a Bare Bones program that takes as input two variables X and Y. (Again, assume these values are set before your program be
    10·2 answers
  • Select the item that best represents technology transfer?
    8·1 answer
  • JAVA
    12·1 answer
  • Submit your newsletter that includes the following: two or three columns a title at least three graphics, but not more than six
    10·2 answers
  • What do you mean by computer ethics?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!