1/163
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
- Networking
- Operating systems
- Ethics
- Programming
- Changing data files in the organization's system for one's own gain
- Accessing other people's files
- Reading employees' emails
- Setting up backdoor accounts
A security administrator would be responsible for administering a…
firewall
True or False: A smartphone should not be considered a computer.
False
Detecting that a computer is running slowly because of a computer virus infection would be an example of which type of IT skill?
Volatility is a property of which of the following?
memory
- Training users
- Updating the operating system
- Installing software
- Troubleshooting hardware
Concurrent processing means that the operating system executes processes in an overlapped fashion. What is not a form of concurrent processing?
batch processing
the hard disk
- One process' register values for another
- One process' data for another
- One process' priority for another
- One process' pages for another
The use of permissions to control who/what can and cannot access and use system resources is part of what operating system role?
True or False: User passwords are not actually stored in the /etc/passwd file.
The zip and tar programs can be used to create...
The /proc top level directory is different from most other Linux top level directories because...
Which Linux command is like the DOS command dir?
ls command
nothing in Windows, and pwd in Linux
- Mount and unmount specific partitions
- Encrypt portions of the file system
- Establish disk quotas
- Add remote storage to be accessed over network
backward slash (\)