intro to comp concepts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

File name extensions are primarily used ... -... by the system administrator to ensure the file is properly protected. -All of the above -... by the operating system to know what software to use to open the file. -... by the user to know how recent the file is. -... by the user to know whether the file can be executed or not.

-... by the operating system to know what software to use to open the file.

Which of the following files stores the currently mounted file systems (partitions) in Linux? -/etc/motd -/etc/fstab -/etc/sudoers -/etc/mtab -/etc/resolv.conf

-/etc/mtab

in the linux useradd instruction, which option would you use to add the user to a number of existing groups? - -a - -o - -s - -g - -G

-G

In the Linux useradd instruction, the -u option allows you to ... -... unlock the user's account. -... change the default shell. -... change the user's username. -... change the default user ID. -... change the default home directory.

.. change the user's username.

The Linux instruction passwd -x 30 zappaf will ... -... lock zappaf out of his account now and delete his account in 30 days if his account is not unlocked. -... change zappaf's password in 30 days. -... require that zappaf change his password within 30 days. -... lock zappaf out of his account in 30 days. -... warn zappaf to change his password within 30 days.

.. require that zappaf change his password within 30 days.

A strong password requires all of the following except ... -A strong password should include all of the above. -... it should be changed at least every 2-3 months. -... it should contain a combination of alphabetic and non-alphabetic characters. -... it should be at least 8 characters long. -... it should be generated randomly.

... it should be generated randomly.

In file compression, lossy compression ... -... increases the file size by uncompression portions of it. -... reduces the file size by discarding some of the data. -... reduces the file size but requires uncompression the file before its contents can be viewed/used. -... reduces the file size by eliminating unnecessary content. -... increases the file size by inserting additional data.

... reduces the file size by discarding some of the data.

The main purpose of a group in both Linux and Windows is to permit ... -... a means of password sharing. -... to permit secure access to network resources like printers and file servers. -... a classification used for accounting purposes. -All of the above -... another level of permissions over just yourself and the world.

... to permit secure access to network resources like printers and file servers.

In Linux, devices like the disk drives, USB drives, network devices and monitor are treated as files. These "files" are stored under which directory? -/mnt -/etc -/dev -/sbin -/bin

/dev

under which linux top-level directory would you find most of the configuration files -/var -/usr -/bin -/etc -/home

/etc

When a new user is created in Linux, an entry of user account information is automatically placed into ... -/home/shadow -/etc/user -/etc/passwd -/home/passwd -/home/username where username is the account name of the new user

/etc/passwd

Which of the following files stores user account information? -/etc/shell -/etc/users -/etc/passwd -/etc/shadow -/etc/sudoers

/etc/passwd

under which linux top-level directory would you find the user directories? -/home -/usr -/bin -/etc -/var

/home

In Linux, when creating a user account for some user, username, by default, the user's directory will be placed in ... -username -/etc/username -/home/username -Users/username -root/username

/home/username

Assume you are user dukeg, which of the following directories would be equivalent to ~zappaf? -/home/zappaf -/home/dukeg -This would yield an error for anyone other than zappaf. -usr/zappaf -/zappaf

/home/zappaf

In Linux, the system administrator's home directory is stored under ... -/home -/root -/sbin -/sys -/bin

/root

in Linux, you would expect to find many of the system administrator programs stored under -/boot -/sbin -/var -/root -/bin

/sbin

In Windows, the Programs top level directory stores applications software. In Linux, the equivalent directory is ... -/etc -/home -/bin -/usr -/var

/usr

Assume Q=15. The instruction Q=$Q+1 will result in Q storing ... -16 -15+1 -None: you cannot store a number in a bash variable. -Q+1 -15

15+1

Assume the current directory has the following files: file1.txt file2.txt file3 file4 files5.txt How many files would be listed in the instruction ls file? -2 -All 5 of them -2 -0 -3 -1

2

how many different directories is referenced in the instruction ls/home/a/{b,c}} -3 -2 -4 -1 -0

2

Assume the current directory has the following files: file1.txt file2.txt file3 file4 files5.txt How many files would be listed in the instruction ls file*.txt ? -0 -All 5 of them. -2 -1 -3

3

in a linked list, to reach the 5th block, how many links do you have to follow? -0 -2 -5 -1 -4

4

which of the following is the largest storage capacity? -1,000,000 bits -10,000 kilobytes -3,000,000 bytes -100 megabytes -4 gigabytes

4 gigabytes

The file afile has permissions of 764. The instruction chmod g-w,o-r will alter its permissions to be ... -740 -744 -644 -640 -760

740

if a hard disk contains 4 platters, how many read/write heads will the hard disk contain? -1 -2 -16 -4 -8

8

What is the difference between > and >>? - > redirects output while >> redirects input. - > redirects input from file, >> redirects input from keyboard. - > redirects input while >> redirects output. - They do the same thing. - > stores the output to a file, >> appends the output to a file.

> stores the output to a file, >> appends the output to a file.

The bash interpreter will perform many steps in executing your instruction. Redirections will occur at what point? -After expansions take place -After aliases are replaced -As the very last part of the operation -After the words and operators are parsed -After arithmetic operations are performed

After arithmetic operations are performed

In Linux, you might use the useradd instruction to create numerous new accounts over the GUI User Manager tool because ... -... you can specify additional groups more easily from the command line. -... you can write a script to automate the process. -All of the above are reasons. -... you do not have to enter an initial password using useradd. -... you can use command line editing to easily modify each new submission over filling out the GUI over and over.

All of the above are reasons.

What does the PATH environment variable store? -All of your working directories since the session started -Your home directory -Your current working directory -The last current working directory prior to the current one -All of the directories to test for any command entered

All of the directories to test for any command entered

Assume the current directory has the following files: file1.txt file2.txt file3 file4 files5.txt How many files would be listed in the instruction ls * ? - 3 - All of them - 4 - 2 - 0

All of them

In Linux, every top-level directory is located on its own partition whereas in Windows, all of the top-level directories are on the same partition. T/F

False

Most people who work in IT have 4-year IT degrees. T/F

False

Organizations typically only have one system administrator who will be responsible for all aspects of administering the computer systems. T/F

False

The only difference between a handheld unit such as a tablet device or a smart phone differs from a laptop or desktop computer is that the laptop/desktop has full sized peripheral devices and the handheld unit uses touch screens. T/F

False

Web developers and web administrators share most of the same tasks. T/F

False

a smart phone should not be considered a computer T/F

False

in both windows and linux, partitions are denoted by using different letters as C: and D: T/F

False

the system administrator of a company would not be responsible for installing software on individual employee's computers T/F

False

you can store a number between 0 and 255 in 1 bit T/F

False

Linux shell runs in an interpreted environment. What does "interpreted" mean? -Instructions entered can be written in different languages. -None of the above: the Linux shell is not an interpreted environment. -Instructions can be entered by either command line or GUI. -Instructions, when entered, are converted to executable form and executed. -Instructions, when entered, are executed without need for conversion.

Instructions, when entered, are converted to executable form and executed.

With command line editing, what does control+p do? -It moves the cursor to the previous character. -It moves the cursor to the previous word. -It recalls the next instruction in the history list. -It moves the cursor to the beginning of the line. -It recalls the previous instruction in the history list.

It recalls the previous instruction in the history list.

What does << do in the instruction cat << foo -It redirects the output from the program cat to go to the program foo. -It redirects the output of the program foo to go to the program cat. -It redirects input for cat to come from keyboard, ending with the string foo. -It redirects input for cat to come from the file foo. -It redirects the output from cat to go to the file foo.

It redirects input for cat to come from keyboard, ending with the string foo.

What does the following instruction do? cat foo1.txt foo2.txt > foo3.txt -It runs the program foo1.txt and foo2.txt, sending the output to foo3.txt -It determines if the number of lines of the first two files is greater than the number of lines in the third file. -It displays the contents of the 2 files foo1.txt and foo2.txt in your window. -It displays the contents of the 3 files foo1.txt, foo2.txt, foo3.txt in your window. -It takes the contents of file1.txt and file2.txt and copies them into the file foo3.txt

It runs the program foo1.txt and foo2.txt, sending the output to foo3.txt

An IT person in general would not be expected to handle which of the following tasks? -Be on call 24/7 -Monitor employees' files and web browsing behavior to ensure compliance with organizational IT policies -Train other employees -Make recommendations on computer purchases -All of the above are tasks that an IT person might be asked to perform.

Monitor employees' files and web browsing behavior to ensure compliance with organizational IT policies

which of the following environment variables defines your prompt? -P1 -PS1 -USER -PROMPT -PWD

PS1

Which of the following is true in (competitive) multitasking? -The CPU switches between processes only when a process needs I/O. -The CPU switches between processes at the user's request. -The CPU switches between processes at the user's request. -The CPU switches between processes only occasionally -The CPU switches between processes very quickly. -None of the above: the CPU does not switch between processes during multitasking.

The CPU switches between processes at the user's request.

Assume the current directory has the following files: carpenters cartoons creative_stuff.txt creatures customers.txt If you type cat ca<tab>, what will happen? -The bash interpreter will list carpenters and cartoons. -The bash interpreter will list all of five of the files. -The bash interpreter will complete the filename as cat cartoons. -The bash interpreter will complete the filename as cat carpenters. -The bash interpreter will beep at you.

The bash interpreter will beep at you.

Assume the file foo.txt has permissions of -rwxrw-r--. After issuing the instruction chmod g-w foo.txt, which of the following is not true? -The file is still readable by everyone. -The world (other) has no access to the file at all. -The world (other) has no access to the file at all. -The owner of the file still has full access to the file (rwx). -All of the above are true. -The owner is the only person who can write to the file.

The file is still readable by everyone.

The following alias has an error: alias lsl=ls -l What error is it? -None of the above: there are no errors in the alias. -You need to insert blank spaces around the =. -The word alias should be all capital letters (ALIAS). -You cannot define an alias with a word that contains a Linux command (e.g., you could not use lsl since ls is a Linux command but you could use lal since la is not a Linux command). -The right hand side, ls -l, needs to be placed inside of single quote marks.

The right hand side, ls -l, needs to be placed inside of single quote marks.

As an IT person, one should be someone who enjoys learning on your own. T/F

True

Computers today are more easily identifiable than computers in the past. T/F

True

If a device performs the IPOS cycle, we should consider it to be a computer no matter what the device is T/F

True

It is the user who initiates when and what a computer should do: T/F

True

a multithreaded operating system is more efficient than a multitasking operating system when executing threads T/F

True

disk access time is slower than memory access time T/F

True

for command line editing, control+b moves you back one character and escape+b moves you back one word (to the previous space or punctuation mark) T/F

True

one use of an alias is to fix common typos, for instance alias mr=rm so that if you are prone to typing mr, it will be fixed as rm T/F

True

the operating system is software T/F

True

to create a directory, both Linux and DOS use mkdir T/F

True

user passwords are not actually stored in the /etc/passwd file T/F

True

in DOS, which of the following symbols is used to denote a directory in a path? -.. -/ -\ -C: -~

\

GRUB is an example of -an initialization script -a boot loader program -an operating system -an operating system kernel -a BIOS

a boot loader program

When the CPU moves from one process to another in multitasking, this is known as ... -... interprocess communication. -... synchronization. -... a context switch. -... timer interrupt. -... a stack access.

a context switch

A security administrator would be responsible for administering which of the following? -A web server -An operating system -A website -A firewall -A database server

a firewall

If a process generates an address that is part of another process' area of memory, this is known as ... -... a page fault. -... a memory violation. -None of the above: this is not possible. -... a context switch. -... an interrupt.

a memory violation

The system unit houses the CPU and memory chips, all placed on ... -a motherboard -ROM -an expansion slot none of the above, the system unit houses the CPU but not memory -a monitor

a motherboard

If an entry in a page table is listed as not valid, then accessing that page will cause ... -... a logical error. -... a core file to be generated. -... a page fault. -... a run-time error. -... the system to reboot.

a page fault

the process of swapping is triggered under which circumstance -a cache miss -a page fault -a context switch -a process resumes from waiting for I/O -an interrupt

a page fault

In Linux, user accounts created for software will often have which of the following specified? -a shell of /sbin/nologin -no home directory at all -None of the above: software do not have user accounts -a home directory of /root -a comment field that says "software, not a user"

a shell of /sbin/nologin

Which of the following types of files would come closest to about 1MByte in size? -a textfile with 1 page of text - a small black and white image file -an uncompressed movie -a long song stored in an mp3 file - a highly compressed movie

a small black and white image file

in linux, a soft link is called -none of the above: linux does not have soft links, it only has hard links -a shortcut icon -an alias -a pointer -a symbolic link

a symbolic link

Which of the following behaviors might be considered as unethical from the position of a system administrator? -Changing data files in the organization's system for one's own gain -Accessing other people's files -Setting up backdoor accounts -Reading employees' emails -all of the above

all of the above

during a context switch, what is being switched? -all of the above -one process' priority for another -one process' data for another -one process' pages for another -one process' register values for another

all of the above

Which of the following tasks would not be possible for a system administrator to do on the file system? -Establish disk quotas -Add remote storage to be accessed over network -Mount and unmount specific partitions -All of the above are possible. -Encrypt portions of the file system

all of the above are possible

the zip and tar programs can be used to create -partitions -archives -directories -copies of files -lossy compressed files

archives

The process of identifying a user through a username and password is known as ... -... protection. -... acknowledgement. -... authentication. -... ermisisons. -... security.

authentication

Which of the following forms of processing does not provide any form of interaction with the user but instead requires I/O be handled before/after program execution? -Batch -Multiprogramming -Single tasking -Multitasking -Multithreading -Multiprogramming

batch

concurrent processing means that the operating system executes processes in an overlapped fashion, which of the following is not a form of concurrent processing? -multiprocessing -all of the above are forms of concurrent processing -multiprogramming -batch processing -multitasking

batch processing

files are broken into fixed sized units called -pointers -partitions -pages -blocks -breaks

blocks

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr The notation !cd repeats which of the following instructions? -ls -l * -cp foo.txt ~foxr -ls /etc/*.conf -None of the above: !c will yield an error message. -cd ..

cd ..

the concept of translating a program from a more readable language like Python or Java into the computer's native machine language is called -storage -processing -compilation -input -assembly

compilation

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr You would use which of the following sequences of keystrokes to delete the first entry on the line and then submit the instruction? -control+e, control+d, <enter> -control+a, control+k, <enter> -control+a, escape+d, <enter> -control+a, control+d, <enter> -control+d, escape+d, <enter>

control+a, control+d, <enter>

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr To re-execute the last instruction (the cp instruction) in the history list, which of the following would not do this? - All of the above would re-execute the last instruction. - !c <enter> - !20 <enter> - control+n <enter> - !! <enter>

control+n <enter>

In order for the operating system to be able to communicate with a specific piece of hardware, one must install the appropriate ... -... cache. -... interpreter. -... device driver. -... kernel. -... shell.

device driver

If you want to output the message "today's date is" followed by the result of the date command, which of the following Linux commands will accomplish this? - echo "today's date is $date" - echo today's date is $date - echo "today's date is `date`" - echo "today's date is date" - echo today's date is date

echo "today's date is `date`"

Which Linux file stores user passwords in an encrypted form? -/etc/passwd -/home/passwd -/etc/group -/usr/passwd -etc/shadow

etc/shadow

As a system administrator, you want all users to have rm redefined to the safer rm -i through an alias. The best place to put this alias is into each user's .bashrc file. T/F

false

The GUI is both easier to use and provides the user with greater flexibility in issuing instructions while the command line provides the user with the opportunity to write more detailed commands and so is more powerful. T/F

false

a virtual machine is hardware T/F

false

cooperative multitasking and competitive multitasking are the same thing T/F

false

in linux, two users can never share the same user ID or the same private group T/F

false

in linux, users all have ID numbers but groups do not T/F

false

the .profile script is executed whenever a new bash shell is started T/F

false

the earliest version of Windows that required user accounts was Windows 3.1 T/F

false

the history list retains 10 instructions at a time T/F

false

the process and the program are the same; the two terms can be used interchangeably T/F

false

we view the file system from a physical perspective while the operating system manipulates it from a logical perspective T/F

false

when using the useradd instruction in Linux, you are required to specify the user's username and password T/F

false

while it is possible to switch to another user without logging out in Windows using Switch user, it is not possible to do so in Linux T/F

false

The Linux instruction chown foxr:cit371 foo.txt changes foo.txt's ... -... group and owner. -... permissions. -... name. -... group. -... owner.

group and owner

where is swap space located? -CPU -flash drive -SRAM -DRAM -hard disk

hard disk

If you wanted to explore how to use some Linux command, say mount, your best option is to use ... - apropos mount - help mount - options mount - man mount - mount -help

help mount

the /proc top level directory is different from most other Linux top level directories because it -... never changes so it never has to be backed up. -None of the above: there is nothing different about /proc from other top-level directories. -... is not stored on disk but instead stored in memory. -... is writeable by both root and all users. -... is only used if your computer has multiple processors.

is not stored on disk but instead stored in memory

What does !! do? -It completes whatever filename is being entered. -It causes an error. -It executes the first instruction in the history list again -It executes the last instruction again. -It executes the last instruction in the history list that contained a !

it executes the last instruction again

In Linux, the -f parameter used in the passwd command does which of the following? -It locks the user's account. -It unlocks the user's account. -It forces the user to change their password immediately. -It warns the user to change their password soon. -It forces the user to change their password the next time they log in.

it forces the user to change their password the next time they log in

If two processes are deadlocked, what is your best move to free them from deadlock? -Reboot all of the resources -Wait until the deadlock resolves itself, which should only take a few seconds -Reboot the computer -Kill all running processes -Kill one of the processes

kill one of the processes

With file blocks distributed across the file system instead of being stored in consecutive disk blocks, accessing the file requires traversing the blocks creating what one might call a ... -... breadcrumb trail. -... partition. -... directory/subdirectory structure. -... linked list. -... track trail.

linked list

which of the following linux commands is like the DOS command dir? -mv -rm -dir -ls -car

ls

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr The notation !17 repeats which of the following instructions? - cp foo.txt ~foxr - ls /etc/*.conf - ls -l * - None of the above: !17 will yield - cd ..

ls -l *

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr Pressing control+p three times followed by the enter key repeats which of the following instructions? -ls /etc/*.conf -cp foo.txt ~foxr -cd .. -ls -l * -None of the above: control+p moves you forward in the history list, not backward

ls /etc/*.conf

Mounting ... -... alters a file's location in the file system. -... converts a soft link to a hard link. -... moves a directory from one location to another. -...makes a partition available -... removes a partition.

makes a partition available

Volatility is a property of which of the following? -hard disk storage -memory -users -processors -all of the above

memory

Which form of processing would run one process at a time, but when that process requires I/O, the CPU would switch temporarily to another process? -Multithreading -Multitasking -Single tasking -Multiprogramming -Multiprocessing

multitasking

In order to determine which directory you are currently in, which commands would you use respectively in Windows and Linux? -where in Windows and pwd in Linux -nothing in Windows (it is part of the user prompt), and pwd in Linux -pwd in Windows and nothing in Linux (it is part of the user prompt) -pwd in both -ls in Windows and pwd in Linux

nothing in Windows (it is part of the user prompt), and pwd in Linux

Which of the following could be called a peripheral device? -CPU -Memory chips -Power supply unit -Printer -Memory

printer

Two threads will always share the same ... -... register values. ... program code. -All of the above -... program code. -... data. -... path through the program code.

program code

Which of these hardware devices can force the processor to move from one process to another in multitasking? -status flags -redy queue -stack pointer -timer -program counter

program counter

If users use passwords containing non-alphabetic characters or a combination of upper and letter case letters, this ... -... helps users remember their passwords. -... helps the system administrator with troubleshooting. -... helps the system administrator track user access. -... ensures proper file protection. -... promotes computer security.

promotes computer security

The use of permissions to control who can and who cannot access resources is part of which of these operating system roles? -Memory management -Security -Process management -Resource management -Protection

protection

What operating system task is access control lists used for? -memory management -resource management -file management -security -protection

protection

In Linux, directories need to be ______ for a user to cd into them. -None of the above, directories do not need any special permissions to be cd'ed into. -executable -readable -writable -readable and executable

readable and executable

when two threads need to "meet up" in order to share data, this is known as -a deadlock -interval -an interrupt -synchronization event -rendezvous

rendezvous

The system administrator is responsible for each of the following tasks except... -... updating the operating system. -... training users. -... troubleshooting hardware -... securing a website. -... installing software.

securing a website

The time it takes the read/write head to move across the disk to the proper track is called ... -... rotational delay (or rotational latency). -... seek time. -... access time. -... transfer time. -... traversal time.

seek time

Bourne is an example of a Linux -utility program -shell -device driver -GUI -kernel

shell

Which of the following forms of scheduling will cause processes to wait the minimum amount of time? -Longest job first -Round robin -First come first serve -Priority -Shortest job first

shortest job first

which of the following forms or process management did MS-DOS use? -multiprogramming -multitasking -double tasking -batch -single tasking

single tasking

In order to discover your password, someone might call you on the phone and try to trick you into divulging it to them, for instance by acting as someone from your organization's IT group. This is often called ... -... denial of service. -... social engineering. -... ip spoofing. -... dumpster diving. -... password cracking.

social engineering

in linux, the administrator account is called -# -su -superuser -root -administrator

su

Which of the following skills would an IT person employ to find and fix a problem with the operating system? -hardware troubleshooting -soft skills -system troubleshooting -system security -system level programming

system troubleshooting

what does an interrupt interrupt? -any type of storage or input/output operation -It could interrupt any of the above. a memory access -the CPU during its fetch-execute cycle -the operating system

the CPU during its fetch-execute cycle

an it person would probably be expected to study each of the following topics except for -the IT person would be expected to study them all -networking -operating systems -programming -ethics

the IT person would be expected to study them all

Your PS1 variable is set to "\d $" What will your prompt display? -the current date and time followed by a space and $ -a $ -the current date followed by a space and $ -the current working directory followed by a space and $ -the user's username followed by a space and $

the current date followed by a space and $

If a file's long listing has permissions of lrwxrwxrwx, what can we conclude? -The file is actually a hard link. -The file is actually a symbolic link. -The permissions need to be changed. -None of the above. -The file is actually a directory.

the file is actually a hard link

the portion of the operating system that must be resident in memory at all times is -the device drivers -the kernel -the virtual machines -system utilities -the GUI

the kernel

To determine where a given page is stored in memory, the operating system uses ... -... device drivers. -... synchronization. -... cache. -... the file allocation table. -... the page table.

the page table

Which portion of the operating system can be personalized by the user. -the device drivers -the shell -None of the above: the user is unable to personalize any part of the operating system. -system utilities -the kernel

the shell

In the Linux useradd instruction, the -m option specifies ... -... to use the default directory location and shell. -... to create a private (primary) group whose name is the same as the username. -... to create a home directory. -... all of the above. -... to use the default user ID.

to create a home directory

the surface of a hard disk is broken into which types of regions? -sectors and blocks -blocks and partitions -tracks and segments -tracks and sectors -blocks (only)

tracks and sectors

the file system for Windows and Linux are "shapes" like a -well -window -tree -building -disk

tree

Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill? -system security -system-level programming -knowledge of operating systems -troubleshooting -software installation

troubleshooting

Consider the following history list: 15. ps 16. ps aux 17. ls -l * 18. ls /etc/*.conf 19. cd .. 20. cp foo.txt ~foxr → Neither !p nor !ps would repeat instruction 15. T/F

true

From the command line, if you type control+k and then control+y, you wind up having the exact same thing on the command line than you did before the keystrokes. T/F

true

a hard link in a file system points at the file while a soft link points at a file's directory entry T/F

true

accounts are not just set up for human users T/F

true

all files have names although the extension is not required T/F

true

although an IT student may not learn a variety of programming languages, it is likely that the IT student will learn to program T/F

true

as computer technology has improved and thus become more complex, the ability to use the computer has been made easier T/F

true

by default, the next user added to a Linux system is given the next sequential user ID from the previously entered user T/F

true

if you are zappaf, you have read but not executed access to this file T/F

true

in a batch processing system, the operating system would have to schedule the next process to execute T/F

true

in linux, you can add or delete users and add or delete groups using the same GUI tool T/F

true

in linux, you have one inode for every file and directory in your file system T/F

true

it is better to place your aliases in your .bashrc or .bash_profile script than to define them at the command line T/F

true

system administrators should know more than one operating system T/F

true

system administrators will be expected to provide support in the form of documentation and training to the organization's users T/F

true

the foreground process is the one that the user can directly interact with T/F

true

the root account in Linux has access to all resources including every file owned by every user T/F

true

while any device can issue an interrupt, it is the operate system that handles interrupts T/F

true

with virtual memory, only portions of the running program are stored in memory T/F

true

you can separately mount and unmount each individual partition T/F

true

you do not have to place the items to be output in an echo statement in either "" or ''. T/F

true

a computer system consists of the hardware, software, and -network -users -all of the above -peripheral devices -programs

users


संबंधित स्टडी सेट्स

Pharmacology Ch. 22 Psychotherapeutic Agents

View Set

Network+ Chapter 3: Addressing on Networks

View Set

K II Was würdest du tun, wenn ...

View Set

JavaScript Review - If/else, switch-case, loops, loop control, functions

View Set

Management Exam 3- Human Resources

View Set

Craven Ch 16: Caring for the Older Adult

View Set

Med Surg: Chapter 46: Nursing Management: Patients With Neurologic Disorders: PREPU

View Set