What is the shell that will be used

Assignment Help Computer Engineering
Reference no: EM133337901

Question: We must run the makefile using make, but there is no makefile, Makefile.in is a partial makefile. To generate the makefile, we run the script configure. The configure script has a number of options available. Type ./configure --help to view them. We want to move all parts of the software into one directory, which will be /usr/local/bg. Type ./configure --prefix=/usr/local/bg. You will see a lot of output. When done, type ls and you will see a new file, Makefile. This is the makefile, similar to what you saw in 4a except much longer and more complex. View the first part of this file. What is the shell that will be used? What value is used for the variable prefix? For bindir (fill in the value prefix to figure this out)? What about datadir? mandir?

Reference no: EM133337901

Questions Cloud

What kind of impact would iot have in that industry : IT 423 Southern New Hampshire University State what IT role you'd like to be in, and why you can envision yourself in that role.
Describe your overall reading experience : Describe your overall reading experience. Have your thoughts about the book changed or stayed the same? Why?
Do you think this is an ethically valid practice : Do you think this is an ethically valid practice for this, or any, company, to block hiring any felon? Discuss this question using the deontology
Compile a list of acceptable use policies : Compile a list of acceptable use policies that will be agreed upon by the user of the productivity application created by Hi-Tek. (4-5 lines)
What is the shell that will be used : CIT 371 Northern Kentucky University What is the shell that will be used? What value is used for the variable prefix? For bindir (fill in the value prefix
Describe at least one flaw in the design of wep making : CSE 7349 Southern Methodist University Describe at least one flaw in the design of WEP making it so that WEP should never be used as a means to secure Wireless
Find details on the partners and the strategic relationship : IT- 515 Southern New Hampshire University find details on the partners and the strategic relationship, select another organization and technological
Review two side of privacy along with cybersecurity : After review two side of privacy along with cybersecurity, it concludes information can be expose online with limitations following policies.
Describe the importance of having privileged : ISSC 290 American Public University Describe the importance of having privileged and non-privileged states within an organization.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How does openness of a distributed system impact the design

How does the openness of a distributed system impact its design? Give a specific example.

  What are some other ways to clean up the winsxs

What are some other ways to clean up the WinSxS folder without having to do it manually - While it does not seem that difficult to do, you have to remember

  What is a pending interrupt

Why, in most processors with interrupts. are further interrupts disabled when the processor reaches the interrupt service routine?

  Create a one dimensional dynamic array with size equal to n

Prompt the user to input n integers and place these integers in the array using the traveling pointer technique.

  What is the running time of your algorithm

Give a bottom-up dynamic programming algorithm based off your recursive definition. What is the running time of your algorithm?

  Were you able to see the given malware at both vendors

Using a web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor.

  Define a block cipher that is similar to an affine cipher

Define a block cipher that is similar to an affine cipher using the multiplication and addition of matrices.

  List all the nonnegative floating point number

Compare the difference of 4 bits IEEE Std 1985 similar floating point number representation and the binary number system.

  Determine the nature of holographic storage

IBM has invested heavily in research and development for holographic storage systems. Investigate this research to determine the nature of holographic storage.

  What is a real-world example of how an application developed

What is a real-world example of how an application developed for a uniprocessor can impact the performance of executing the same application on a multiprocessor

  Discuss common input-output technologies

Discuss common input / output technologies. Provide a brief overview of the organizations that have developed and promoted each format.

  How internet of things iot might utilize deep learning

University of Phoenix, Do you have a more comprehensive explanation of how the Internet of Things (IoT) might utilize deep learning

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd