1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleonysh [2.5K]
2 years ago
6

Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?

Computers and Technology
1 answer:
likoan [24]2 years ago
8 0

Answer:

Explanation:

some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.

You might be interested in
Write a program that teaches arithmetic to a young child. The program tests addition and subtraction. In level 1, it tests only
Elenna [48]

Answer:

Explanation:

The following program is written in Java and creates three levels with the different set of randomly generated arithmetic problems. As the player goes getting more points they advance every 5 points to the next level.

import java.util.Random;

import java.util.Scanner;

class Main {

   private static Random random = new Random();

   private static Scanner in = new Scanner(System.in);

   static int points = 0;

   public static void main(String[] args) {

       while (true) {

           System.out.println(points);

           if (points < 5) {

               System.out.println("Starting Level 1");

               levelOne();

           } else if (points < 10) {

               System.out.println("Starting Level 2");

               levelTwo();

           } else if (points < 15) {

               System.out.println("Starting Level 3");

               levelThree();

           }

       }

   }

   public static boolean levelOne() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt((10 - numberOne));

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 5 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelOne();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelTwo() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne + numberTwo;

       int count = 0;

       while (points < 10 && count < 2) {

           System.out.println("What is " + numberOne + " + " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelTwo();

           } else {

               count += 1;

           }

       }

       return false;

   }

   public static boolean levelThree() {

       int numberOne = random.nextInt(10);

       int numberTwo = random.nextInt(10);

       int answer = numberOne - numberTwo;

       int count = 0;

       if (answer <= 0) {

           levelThree();

       }

       while (points < 15 && count < 2) {

           System.out.println("What is " + numberOne + " - " + numberTwo + "?: ");

           int userChoice = in.nextInt();

           if (userChoice == answer) {

               points += 1;

               levelThree();

           } else {

               count += 1;

           }

       }

       return false;

   }

}

3 0
3 years ago
3n - 12 = 5n - 2<br> how many solutions?
Luda [366]
N=-5 sry about the other guy stealing
6 0
3 years ago
Required by the Fair and Accurate Credit Transaction Act of 2003 (FACTA), which of the following is an anti-identity theft rule
oksian1 [2.3K]

Answer:

Red Flags Rule

Explanation:

The Red Flags Law relies upon commercial banks and investors to put red flags in order to identify and deter identity fraud. Institutions must have a documented policy for the protection of fraud to control the organization and secure their clients.

Other options are incorrect because they are not related to the FACTA that is anti-identity theft rule.

3 0
3 years ago
Which software program is used to create a database on a computer, add, change, and delete data in the database, and create quer
Radda [10]
I'd say Microsoft access
3 0
3 years ago
Read 2 more answers
If a student passes off an authors work as his or her own, the student has
tatuchka [14]
Committed plagiarism, the student did not obtain permission to use the work, and the student said it was their original work.
7 0
4 years ago
Read 2 more answers
Other questions:
  • Ms. Troy would like you to make a copy of an outfit that she owns and really likes—a sleeveless dress with a short-sleeve jacket
    15·2 answers
  • It is possible to make the document larger for viewing small text. <br> True or False
    13·2 answers
  • What is looping? the rerecording of sound first recorded on set the recording of sound on set the process of combining different
    11·1 answer
  • Function templates ___________.
    5·1 answer
  • A poem for coduction
    15·2 answers
  • The __________ web site and list site seclists.org is home to the leading free network exploration tool, nmap.
    15·2 answers
  • Write a program that prompts the user to input the decimal value of a double and outputs the number rounded to the nearest integ
    7·1 answer
  • All of the following are qualities of certification programs except:
    8·2 answers
  • Who is he can anyone help me​
    14·2 answers
  • You designed a program to find the midpoint of two points. Which step below corresponds to finding the average of the x-coordina
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!