1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
2 years ago
6

Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?

Computers and Technology
1 answer:
likoan [24]2 years ago
8 0

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

You might be interested in
Select the correct answer from each drop-down menu.
Gelneren [198K]

Answer:

Maybe computer engineering and marketing skills

4 0
3 years ago
Which of the following characteristics of an e-mail header should cause suspicion?A. Multiple recipientsB. No subject lineC. Unk
julsineya [31]

Answer:

The correct answer for the given question is option(b) i.e " No subject line"

Explanation:

In the e-mail subject is the important part which describe the information which kind of particular mail is send or received .if we do not give any subject line in the e-mail header then most of the chances that email will not read by recipients due to this suspicion will be caused.

Unknown Sender and Multiple recipients do not cause suspicion so the correct answer is option(b) i.e No subject line".

3 0
3 years ago
The concept/theory where computer generated animation (especially humans) that is TOO life-like they become uncomfortable to us
Zolol [24]

Answer:

The concept/theory where computer generated animation (especially humans) that is TOO life-like they become uncomfortable to us as viewers instead of likeable cartoons is known as Uncanny valley

Explanation:

The uncanny valley is a concept that was introduced in the 1970s by Masahiro Mori. It is used to describe when a computer generated animated figure bears too much of a resemblance to humans, to the extent that the person viewing it may feel a sense of unease. The animated figure appearing almost human would likely elicit cold and eerie feelings in viewers.

7 0
3 years ago
Read 2 more answers
Henry is creating code In JavaScript to run calculations on extremely small numbers. How can he use MIN_VALUE as validation in t
QveST [7]

In creating code in JavaScript to run calculations on extremely small numbers, MIN_VALUE as validation in the program can be use to check the lowest value JavaScript can handle

Number.MIN_VALUE returns the smallest positive numeric value representable in JavaScript.  It is the number more closer to zero. The value is approximately 5e⁻³²⁴.

Using Number.MIN_VALUE, the value can be printed as follows:

val = Number.MIN_VALUE;

console.log(val); // 5e-324

Therefore, In creating code in JavaScript to run calculations on extremely small numbers, MIN_VALUE as validation in the program can be use to check the lowest value JavaScript can handle.

learn more on JavaScript here: brainly.com/question/13041378?referrer=searchResults

3 0
2 years ago
What is the other name of iterative staatement ​
Mademuasel [1]

Answer:

An loop statement

Explanation:

An iteration statement, loop, repeatedly executes a statement, know as a loop body,until the controlling expression is false

8 0
3 years ago
Other questions:
  • What's another name for the Super High shot, if you shot it on the ground using a tripod?
    14·1 answer
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • Hi I am Khine Mye and I want to ask you a question I don't know that is square root of 2 is 1.4 and how to get that 1.4 and plz
    8·1 answer
  • Haley is helping to choose members for a customer satisfaction team. Which
    6·1 answer
  • How are switches indirectly involved in ARP poisoning?
    6·1 answer
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
    10·1 answer
  • How does computer number system play a Vital role in a computer calculation. ​
    8·1 answer
  • What would be a social networking page background for Sigmund Freud?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!