ITSP 134 chp. 20-21

Ace your homework & exams now with Quizwiz!

A user calls the service desk to ask where to locate the sleep option on their Mac computer. The technician can bring up the option using which of the following? App Store Safe Mode Login Items Apple Menu

Apple Menu

Ethan is almost finished setting up a new user with their MacBook when the user asks how they can set up a quick shortcut to one of their most-used apps. Ethan can place the shortcut icon on which of the following? Multiple Desktops System Preferences Remote Disc Dock

Dock The Dock is at the bottom of the desktop and contains shortcuts to frequently used applications.

Lauran has attempted to save a file she has just finished updating but receives a message that the task is not able to be completed. To further troubleshoot, she checks how much disk space is available using a specific command. What command(s) allows her to take this action? rm df cat cp

df This command will show the amount of disk free space available in Linux and to understand the file systems that are attached, or mounted, to the system

Kyle is working off a macOS while Linda is working on a Linux system. Linda needs to share a file with Kyle for the current project the two are working on. Linda uses a specific file server that allows her to share the file with other operating systems that are within her Network. What would the server be called? Samba Telnet Root Account Bash Shell

Samba It is a file server that allows file sharing across different operating systems within a network.

Sarah is working within the Linux terminal updating necessary files for the company. While running commands, she notices how long it is taking her to write out singular commands. In order to save time, she decides to place the commands within a text file and begins to run them as a batch. This allowed her to update many files within a short period of time. What would the text file being executed be called? Samba Telnet Root Account Script.

Script Stores commands in a text file and execute them as a batch.

Luan is in the process of creating a backup for the corporate Ubuntu Server. She has been informed that the company would not like to use a third-party backup software. With this information, Luan decides to write it herself. This allowed her to include tar commands to create an archive of many files and she was able to place it onto a USB drive for the company. What would the process be called? Script Clone Shell Scripts Superuser

Shell Scripts Allows the user to write their own scripts that include tar commands to create an archive of many files and copy it to other media, such as a USB drive or network storage.

A user calls the service desk to ask about installing an application on their corporate IOS device. Samuel is able to recommend the specific application for this type of issue. As a service technician, Samuel walks the user through the application and can safely install the requested application. What would this application be called? Time Machine Apple Menu App Store Disk Utility

App Store The App Store is a central location where you can find, install, support, and update apps.

Harrison has finished setting up his Ubuntu server and would like to start running commands in the terminal. This terminal stands for "Bourne Again Shell" and is a mixture of previous shells. What is the default terminal called? Package Bash shell Korn shell Script

Bash shell Bash shell is the default terminal for Ubuntu Software.

Andy would like to edit one of the files within the Linux VM. He uses the terminal to locate the file and then runs a command that opens a direct path for editing the file. What command did Andy run to edit the file? cp chown nano rm

nano

Steven will be receiving a new MacBook and must return his original laptop back to corporate. Before Steven sends it in, he'd like to erase all the sensitive data from the device. What would allow him to perform this process safely? Safe Mode Kernel panic Disk Utility Apple Menu

Disk Utility Disk utility is a process used to repair or erase a disk

Mary was navigating through the directory when she decided to use a command that would allow her to check the present working directory. After confirming the directory, Mary knew she was on the right track for editing a specific file. What command would Mary use to double check the directory? cp pwd ps rm

pwd This command allows the user to view the name of the current or present working directory.

Gary was in the process of installing a program using the terminal within Linux when he received a message stating that a superuser is required to run the command. Using a specific command, Gary was able to allow root user rights for this one installation. What command did he use? cp pwd ps sudo

sudo Run a command as the superuser. The command stands for "substitute user to do the command," and it is pronounced "sue-doe" or "sue-doo." When logged in as a normal user with an account that has the right to use root commands.

Susan is working within the Linux terminal for her corporation. She has been asked to install software packages in RPM (Red Hat Package Manager). She uses a specific command to do just this. What command did Susan run to update the packages? cat yum df sudo

yum Get, install, delete, and manage software packages in RPM (Red Hat Package Manager). The yum (Yellowdog Update Manager) command is the primary tool for performing these functions in RPM.

Louis has been tasked as the lead IT technician to setup a way to secure the company's data on the hard disk of the main macOS Desktop. They have requested it be a form of encryption that can only be accessed by logging in with a password or using a recovery key. What would allow Louis to secure the company data following the given requirements? FileVault Disk Utility Keychain Time Machine

FileVault Secures the data on the hard disk using encryption. Note that data will be lost if you forget the login password or lose the recovery key to access encrypted data

Samuel is assisting an internal user with one of their corporate applications. It is currently not responding to any actions, nor can the user close it using the button in the top left corner. Samuel knows there is a method to forcibly close the app. Which of the following can Samuel use to take this action? macOS Recovery Disk Utility Force Quit Apple Menu

Force Quit This application allows the user to force quit active applications. In the Force Quit Applications window, select the app, and click Force Quit. The application closes.

Through the process of installing Ubuntu Server in VM, Veronica is faced with partitions. Going through the first partition, she notices that it has been automatically created and that it is used to boot the system to manage the dual-boot systems. What is the partition called? Samba GRUB Clone Comment syntax

GRUB A boot loader is used to manage dual-boot systems.

A service desk technician is asked by an internal employee for further assistance with a corporate app. To locate the app, the technician uses a gesture by pinching with three fingers and thumb on the trackpad to bring up all the applications installed on the MacBook and can find the corporate app. Which of the following is the process for bringing up all the downloaded apps? Launchpad Safe Mode First Aid iCloud

Launchpad Similar to a combination of the Windows Start menu and Programs and Features window, Launchpad shows all apps installed on the computer.

Leslie is setting up Ubuntu for the first time. She has decided that she would like to install it from a USB flash drive, which would allow her to boot up a live version of Linux. What is this method referred to as? Package Bash shell Live CD GRUB

Live CD When a user installs Ubuntu Desktop or Ubuntu Server on a hard drive, CD, or USB flash drive.

Steven is using the main MacBook in the office to check his email before leaving the office for the day. Using his Login, Steven's email application automatically launches once signed in. Steven is able to quickly check his email and head out for the day. What is the process of signing in and having applications automatically open afterwards called? Keychain Login Items Startup Items iCloud

Login Items Login Items automatically launches programs after a user logs in.

Cesar is setting up his new MacBook for his job as a Service Desk Technician. He would like to setup his laptop in a way that would allow him to view and use another desktop. He uses the trackpad and swipes up using four of his fingers revealing the option that he wanted to use. What feature is Cesar using to have several desktops setup? Safe Mode Keychain Mission Control Software Update

Mission Control This feature gives you a quick view of all open windows and desktops and lets you switch among them.

Sam is assisting an internal user with setting up their Ubuntu Server. He notices a report from the server that states a few updates are required. He installs the necessary files so that he can install the software. What would these files be called? rm GRUB Chown root Packages

Packages A collection of files needed to install software in Ubuntu.

Louis is not able to open a specific app that requires the latest version of macOS. She knows that the system is updated, and she still receives the same message. Louis goes into her settings and has the latest macOS installed from the Internet. This action resolves the issue she was having with the application. What is the process described called? Safe Mode First Aid Reinstall macOS

Reinstall macOS The latest macOS that was installed on the computer is downloaded from the Internet and reinstalled

Cindy would like to share files from her MacBook to the rest of the team. Everyone is currently working remotely. She remembers there is a feature that would allow her to share over the same network. What would allow her to share the files with her team? Spotlight Apple Menu Remote Disc First Aid

Remote Disc This feature gives other Mac computers on the network access to the computer's optical drive.

Sarah is signing in for the day in the role of a Service Desk Technician. She is able to easily sign into her email application and corporate application and get straight to work once her MacBook has been started up. What are the applications that are automatically launched called? First Aid Login Items Startup Items macOS Recovery

Startup Items Startup Items are programs that automatically launch at startup.

Sarah is signing in for the day in the role of a Service Desk Technician. She is able to easily sign into her email application and corporate application and get straight to work once her MacBook has been started up. What are the applications that are automatically launched called? First Aid Login Items Startup Items macOS Recovery

Startup Items Startup Items are programs that automatically launch at startup.

A user calls into a service desk for assistance with their Ubuntu server. They would like a method to improve performance. Daniel being the service technician is more than happy to assist and provides a method that would hold virtual memory. What is the following feature called? Samba GRUB Korn shell Swap Partition

Swap Partition Used to hold virtual memory and yields better performance for Ubuntu.

Sandra is working from home today and has decided she will be gaining remote access to Linux today at a shell prompt. Sandra knows that the method she is choosing does not encrypt her transmissions. What would the remote access type be called? Script Telnet Shell Scripts Bash Shell

Telnet In Linux, the primary utilities for remote access at a shell prompt.

While going through PowerShell to organize files, Julie noticed an unknown data file. She proceeds to assign a value using the equal symbol, which further organizes the file setup. What did Julie initialize by naming the unknown data? Python Script Variable JavaScript Batch File

Variable Is the name of an unknown data item and can be assigned a value, which is called initializing the variable. In PowerShell, a variable name is preceded by $. You can assign a value to a variable using the equal symbol (=).

Frank has been asked to have the corporate Linux VM upgraded. Before he begins the process, he makes sure that a backup of the data and disk image of the entire Linux partition has been completed. What would the process of backing up the specific data be called cat Clone Shell Scripts Samba

Clone Backups of your data and a disk image of the entire Linux partition.

Susan has been tasked with reviewing the company's files within PowerShell. On further review, she comes across a file that needs to be edited. She uses a # symbol and proceeds to leave a comment and not a command. What would the process be referred to as? Python Script Variable JavaScript Comment Syntax

Comment Syntax This refers to how you tag the text as a comment, so it is not interpreted as a command. For example, in PowerShell, a line in the script file can hold a comment if you begin the line with a #.

While working within the Linux VM, Daniel came across a file that had unwarranted editing permissions. In order to have the file permissions changed, What command would Daniel be using? chmod pwd chown cp

chmod This command will change modes (or permissions) for a file or directory.

Elise is asked to remove a user from the Ubuntu server and to have the user's files changed to a different owner. In order to have the files owner changed, What command will Ellen need to run? pwd df cat chown

chown This command changes the owner of a file or directory.

Sarah is within the Ubuntu server and would like to run a command within the terminal. She needs to make a copy of an important file. What command would allow her to do so? chmod pwd chown cp

cp

Ron is navigating through the Linux terminal for a specific directory. He is unsure of what may be in his current file. He decides to run a specific command that populates a list of directories and files. This allows him to get back on track to locate the directory he is looking for. What command did Ron perform? ls dig cd rm

ls This command allows the user to view the name of the current or present working directory.

Larry has just finished installing Node.js on his system and now needs to add it to PATH. He copies the file location down to the "bin" file and proceeds to navigate to the System Variables so that he may add it. What would allow Larry to find PATH and add the copied address link? Python Script PowerShell Script Environmental Variable Comment Syntax

Environmental Variable Is information the OS makes available to a script

Susan would like to open an application found within her finder. There are 3 files with similar names, but different file types. Based on what Susan would like to open, what file would allow you to do so? Example.dmg Example.app Example.pkg Example.tar

Example.app The APP file is an application file, used to run an application.

This file format is used mostly for distributing software. These install packages appear as a virtual disk drive on the Mac. Once the file has been double-clicked the virtual disk is mounted to macOS, you then can access the files inside it. What file would this be? Example.dmg Example.app Example.pkg Example.pdf

Example.dmg

This file format is used for software installations. This file is often compressed similar to a ZIP file in Windows. Once the installation is complete there is no longer a need for this file. What file is described? Example.dmg Example.app Example.pkg Example.bat

Example.pkg

A user calls into a service desk and receives further assistance from the technician named Brian. The user informs Brian that they are not able to open an important file that will be used in their presentation later today. Brian is able to use a feature found in the Disk Utility to scan the hard drive for file system errors and repair them. Once the action was completed the user was able to access the folder. What is the name of this feature? Keychain App Store Screen Sharing First Aid

First Aid First Aid is found in Disk Utility and is used to scan the hard Drive for file system errors and repair them.

A user calls the service desk to ask about installing an application on their corporate IOS device. Samuel is able to recommend the specific application for this type of issue. As a service technician, Samuel walks the user through the application and can safely install the requested application. What would this application be called? Time Machine Apple Menu App Store Disk Utility

App Store The App Store is a central location where you can find, install, support, and update apps

Nathan is working on a project within the Windows command line. He decides that instead of repetitively updating the files within the directory manually that he would like to run a file that would go through the process for him and would be able to execute a list of Window commands. What would allow Nathan to perform these activities? Clone Run-Time Environment JavaScript Batch File

Batch File Contains a list of Windows commands that can be executed in a command prompt window.

Frank is helping an internal employee set up their new MacBook. While setting up their security settings, Frank suggests that the employee set up their Touch ID through the biometric scanner found in their trackpad. Where could they set up these functions? Apple ID Mission Control Gestures Printers & Scanners

Gestures Selecting Gestures allows you to set up the use of multiple fingers and actions by using the trackpad on a Mac laptop.

A user reports to a service desk technician that their MacBook continues to give a prompt for restarting the system, and eventually completely shuts down after the fifth restart attempt. The initial issue they were facing was an application corruption. Based on the description given above, what is this process called? Apple ID Kernel panic Screen Sharing Apple Menu

Kernel panic A kernel panic can be caused by something simple, such as a crashed app or a network communication issue, or it might result from a corrupted macOS installation. macOS restarts automatically when experiencing a kernel panic. If the kernel panic continues to prompt restarts, macOS will stop trying and shut down the computer after five attempts.

Susan is in the process of setting up her new MacBook for her current job as a service technician. She begins to setup her passwords but wants to use a password manager to keep all her passwords in one place. What would allow her to do so? macOS Recovery iCloud Remote Disc Keychain

Keychain

A user has called into the service desk and would like assistance with their MacBook Pro on a missing tab. They are unsure of what keys they have pressed, but they see a new desktop background has been populated. Mary, being the service desk technician, knows exactly what the issue is. She asks the user to swipe up with 3 fingers on their trackpad and a menu comes up with three different desktop screens. The user was then able to locate their missing tab. Using the gesture shown above, what would the feature be called? Multiple Desktops Keychain Time Machine SharePlay

Multiple Desktops This feature is several desktop screens, each with its own collection of open windows

While further working within the terminal, Sally decides she would like to create her own scripts so that she can save time typing the repetitive commands. What would allow her to create and test the Windows 10 script? Basic Loop PowerShell ISE Environmental Variable Integers

PowerShell ISE Contains PowerShell commands, also known as cmdlets, which are executed in Windows PowerShell.

Louis is currently working on a project using Python. In doing so she would like to use more than one command at a time so that she may increase her work performance. What would allow her to execute several Python commands? Python Script PowerShell Script JavaScript Comment Syntax

Python Script Is a group of Python commands interpreted by Python.

Lincoln is in the process of resetting a password for one of the users in the Ubuntu server. In order to perform this action, he must gain access to the principal user account. This account not only changes password, but is the administrator for installing patches, managing backups, and installing software. Knowing this, what is the account called? Root Account pwd Shell Scripts Korn Shell

Root Account The principal user account for the Linux system.

Samantha is in the process of executing a script for testing. In order to proceed with this process, she must make sure the correct program is used. What is the type of environment for executing the script called? Clone Run-Time Environment Batch File Script

Run-Time Environment The environment in which a script file can be executed in.

When Lauran attempts to sign into her MacBook, she receives an error message when connecting to the company email application. This causes a Kernel Panic, and her laptop goes through a restart. After the 3rd attempt, Lauren decides to place the device in a different mode so that when she signs in, the email application is not automatically launched. What is this mode called? Time Machine Kernel panic Safe Mode Apple Menu

Safe Mode Safe Mode in macOS loads essential kernel components and prevents startup items and login items from launching

A user calls into the service desk due to issues with their web browser. Unable to completely describe what is happening, the user request the service technician to remote into their desktop. What would allow the technician to remote in from their desktop? Login Items Screen Sharing Startup Items First Aid

Screen Sharing

Larry has been asked to assist a user in placing a Tag on a very important file. Larry remembers a technique that would allow the user to do this quickly and efficiently. He asks the user to tap on the trackpad using two fingers. Which one of the following is this action called? Screen Sharing Keychain Secondary-click iCloud

Secondary-clickCorrect. Secondary-click is an action where a user taps on the trackpad with two fingers.

Sandy has been asked to setup Linux for a new user within the company. As a service technician, she would like to setup Linux further by using key commands. She opens the Linux terminal and begins to type out the commands. What is the Linux terminal called? Shell Prompt Bash shell Korn shell Script

Shell Prompt This terminal is the command prompt in the Linux Terminal.

Sandy has been asked to setup Linux for a new user within the company. As a service technician, she would like to setup Linux further by using key commands. She opens the Linux terminal and begins to type out the commands. What is the Linux terminal called? Shell Prompt Bash shell Korn shell Script

Shell Prompt This terminal is the command prompt in the Linux Terminal

Paul has gone through a power outage and was currently working on a company project for 3 hours and has had no backup disk. Luckily Paul remembers that Time Machine stores backup copies, that are locally created, modified, or deleted files on the hard drive. Once Paul was reconnected to the backup disk, the data was restored. What is this called? Time Machine Spotlight Snapshots Network

Snapshots When a Mac is not connected to the backup disk locally, Time Machine stores backup copies of created, modified, or deleted files on the hard drive.

Rina has been tasked with a project for the company meeting. While working further on the project, Rina decides she would like to organize and place the project on its own desktop so that she can work separately on another desktop for her current work. What would allow her to have multiple desktops? macOS Recovery Space Time Machine Startup Disk

Space . You can place your specific windows on one desktop.

A user calls into Service Desk to ask for assistance locating a specific file. The user is not familiar with their MacBook and is unable to locate the missing file from a list of over 700. Andy, being the service desk technician, shows the user how to locate the folder. He clicks the search icon on the right side of the file, the menu bar and a search bar are then populated. The user was then able to search for the folder they were looking for. What is the process that Andy used to assist in finding the lost folder? FileVault Keychain Spotlight Screen Sharing

Spotlight This feature allows the user to search the name of the file, folder, or text they are searching for by pressing Command + spacebar or clicking the search icon on the right side of the menu bar.

A user calls into the support desk due to one of their applications not working correctly on their MacBook. Lisa is able to take a further look and see that the best troubleshooting step they can take is to uninstall the application. What would allow Lisa to locate and uninstall the stored application? Startup Disk. Login Items Snapshots macOS Recovery

Startup Disk The Startup Disk is the volume on which macOS is installed

Brandon being the lead technician is asked to setup a new user account to the corporate Ubuntu Server. In order to start the process, Brandon signs into the root account of the server and proceeds to create the account. What is the above process of logging into the root account called? Root Account pwd Superuser Korn Shell

Superuser A user who is logged in to the root account.

Brennan is working on a project that requires Linux Commands. He decides to open Finder, click Applications, double-click the Utilities folder, and double-click Terminal to allow him to run the required commands. What would allow Brennan to run the Linux commands? Safe Mode Apple Menu Terminal Startup disk

Terminal In macOS Terminal is similar to a command prompt window in Windows, except Terminal uses UNIX commands because macOS is based on UNIX

A user calls into a service desk due to their data not being backed up from their Mac to iCloud. The user wanted to know if there was another method, they may be able to save these important files. John is more than happy to assist as a service technician. He can provide a solution that is built-in and that will automatically back up user-created data, applications, and the entire macOS system. What utility John is using to back-up the information? Time Machine Apple Menu Startup Items Printers & Scanners

Time Machine Time Machine is a built-in backup utility that automatically backs up user-created data, applications, and the entire macOS system.

Samuel is working on a project within the Ubuntu Server and would like further details on Example.com. He uses a specific command and receives further DNS information on the website. What command(s) did he use to gain the DNS information? pwd dig cd sudo

dig Query for DNS information. This is similar to the Windows command nslookup. To lookup the DNS information


Related study sets

Lab 12 A&P 2401 Muscles Dr. Kerins

View Set

SPLUNK CORE CERTIFIED USER PRACTICE TEST-2

View Set

Ch. 18 Civilization's Inferno: The Rise and Reform of Industrial Cities, 1800-1917

View Set

Principles of Assessment/ Secondary Assessment

View Set

pearson elemental geosystems ch 11

View Set

chapter 7: legal dimensions practice questions

View Set