subject

There has been suspicious activity on the system. In order to preserve log information, it will be necessary to archive the current files in /var/logending with the ".log" extension. The files are to be saved to a file named log. tar, stored in the directory, ~/archive. It has also been requested that the files that were archived be saved to a directory, ~/backup.

Objectives

- Create an archive named log. tar that is stored in the archive directory located in the home directory.

- Remove path names from the files that are archived.

- Produce verbose output while archiving.

- List the contents of the archive without extracting.

- Extract the files to the directory, ~/backup.

- Provide the final commands for successful completion.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:20
The pyraminx is a rubik's cube-type toy in the shape of a tetrahedron (not a pyramid). the pyraminx shown below has edges 15\,\text{cm}15cm15, space, c, m long and vertical height h=12.2\,\text{cm}h=12.2cmh, equals, 12, point, 2, space, c, m. the triangle drawn with dashed lines is a right triangle. what is the distance rrr? round your answer to the nearest tenth.
Answers: 1
question
Computers and Technology, 22.06.2019 13:30
1. technician a says horsepower information can be used by consumers to compare the power of different automobile engines. technician b says that manufacturers will often list the horsepower output of their engines in the online service information. who is right?
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
What are listed in the vertical columns across the top of the event editor? a. file names b. conditions c. check marks d. action types
Answers: 1
question
Computers and Technology, 23.06.2019 02:00
What is the main benefit of minimizing the ribbon in word? more options will be accessible through customized keystrokes. more of the document will be viewable without needing to scroll. fewer controls will be accessible to the user by using the mouse. fewer editing options will be available without entering a password.
Answers: 1
You know the right answer?
There has been suspicious activity on the system. In order to preserve log information, it will be n...
Questions
Questions on the website: 13722367