Show Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Starting Out with C++ from Control Structures to Objects8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis 1,294 solutions Upgrade to remove ads Only ₩37,125/year
Terms in this set (53)Which NTFS feature should you configure if you want users to be able to revert to an older version of the file? Shadow Copies T/F: Locally attached storage devices include other hard disks that are installed on the system internally as well as external devices that are attached through either USB connections or external SATA connectors. True T/F: In Linux, every user that is created automatically belongs to a default group named Users. False A user logs on to the network from a different computer than they normally use, and they still have the same desktop as usual. This user's profile is called a ____________ profile. Roaming Which of the following are standard NTFS permissions? 2 T/F: Group accounts make it easier for an administrator to manage user rights and permissions. True Which of the following is a special identity group? 1 Which of the following is a group scope in active directory? 2 T/F: A user account in a client OS is meant to log on to the local machine only. A user account created in Active Directory has the ability to log on to any computer that is a member of the domain. True T/F: An image backup is a file that is a complete copy of the disk volume. If the volume contains the OS, when you restore from the image backup, you do not have to reinstall the OS. True ______ consists of a collection of tools for pinpointing which resources are being overloaded and how they're being overloaded. Performance Monitor T/F: Restore Points store previous versions of files so if users accidentally delete a file or write over a file, they have a way to restore the file without dealing with a backup. False _____ is the dominant file-sharing protocol used by Windows and supported by Linux and MAC OS. SMB In Windows, the term for a computer that accepts job requests for a shared printer and sends them to the physical device is called a print ____________. Server T/F: NTFS permissions can only be configured on files. False T/F: A standby UPS continually powers devices from its battery so that if a power failure occurs, there is no delay in switching to battery power. False In regards to a user account, what does a white circle with a black arrow indicate? The account is disabled. T/F: In Windows terminology, a printer is the actual physical printer that will print the jobs that are sent to it. False Which is true about Windows Backup in Windows Server? (Choose all that apply.) 2. Backups can be stored on tape. 3. It is designed to support a large number of servers and servers distributed across multiple sites 4. You can back up another computer remotely 5. The volume Shadow Copy Service backs up open files 1 Which is true about Linux user accounts? (Choose all that apply.) 3 ____ accounts are used to organize users so that the assignment of resource permissions and rights can be managed more easily than working with many user accounts. Group Provide the complete directory path to where the user accounts are stored in a basic Linux installation. /etc/passwd Which of the following is a default group in Active Directory? 1 Which of the following groups are special identity groups? 1 What tool would you use to view error messages that are generated by system services or applications? Event Viewer What command in Linux gives extensive help on how to use a command? man Which
of the following is a function of a user account? 1 T/F: Basic disks support advanced features like spanned volumes and software RAID. False What is a collection of a user's personal data folders and application settings that's available at any computer where the user logs on? Roaming Profile T/F: In a file system that uses FAT or FAT32, the only file security option that is available is sharing permissions. True
In linux, what is the command for viewing a files contents on screen? cat When dealing with permissions in Linux, what are the user types that can be assigned permissions? 1 T/F: A server cluster is a group of servers that appear to the user as a single server. The two most common types are a fail-over cluster and a load-balancing cluster. True Which of the following are case sensitive? 2 If you need to limit the amount of data users
can store on a volume, you would implement which of the following? Disk Quotas Which of the following is NOT a linux file system? SFS Which is best describes as a record of performance data gathered when a system is performing well under normal conditions? baseline T/F: An event log entry that is is an error is marked with a ed circle with a white exclamation point in the center. True Which of the following correctly describes how sharing NTFS permissions work? 5 Which of the following is a permission in the Linux OS? 1 T/F: Windows may be booted from an extended partition that has been formatted with the NTFS file system. False Which of the following is true of Windows printing terminology? 1 ______ groups contain users from the domain in which they're created but can be assigned permissions to resources in other domains. global What level of RAID does not provide fault tolerance? 0 Which is true about partitions? 2 T/F: The three permissions used to control access to files and folders in Linux are: read, write, and delete. False T/F: The three primary forms of fault tolerance for networks and servers are: redundant power supply (UPS), redundant disk systems, and server clustering. True T/F: A RAID that is configured as a level 0 requires two drives because it copies data to both drives at the same time, making an exact duplicate of the data. False Employees in the Sales department need to be able to access the sales share on the file server. They will need to have the ability to create files, read them, and make corrections or additions. Which of the following share permissions should the group be given? change Which of the following is true of group accounts in Windows? 2 Which is true about file compression? 1 The partition that contains the Windows OS files is knows as the what type of partition? boot Which UPS type is for computer power backup? Online Other sets by this creatorCCNA Final86 terms tom_smith665 Cellular & Mobile Final (Post Midterm)24 terms tom_smith665 Cellular and Mobile Midterm64 terms tom_smith665 CCNA Midterm84 terms tom_smith665 Verified questions
COMPUTER SCIENCE If a list is already sorted in ascending order, a modified sequential search algorithm can be used that compares against each element in turn, stopping if a list element exceeds the target value. Write a pseudocode version of this short sequential search algorithm. Verified answer COMPUTER SCIENCE Let $\Sigma=\{\mathrm{a}, \mathrm{b}\}$. For each $k \geq 1$, let $C_{k}$ be the language consisting of all strings that contain an a exactly k places from the right-hand end. Thus $C_{k}=\Sigma^{*} \mathrm{a} \Sigma^{k-1}$. Describe an NFA with k+1 states that recognizes $C_{k}$ in terms of both a state diagram and a formal description. Verified answer
COMPUTER SCIENCE In statistics, when a set of values is sorted in ascending or descending order, its median is the middle value. If the set contains an even number of values, the median is the mean, or average, of the two middle values. Write a function that accepts as arguments the following: A) An array of integers B) An integer that indicates the number of elements in the array The function should determine the median of the array. This value should be returned as a double. (Assume the values in the array are already sorted.) Demonstrate your pointer prowess by using pointer notation instead of array notation in this function. Verified answer COMPUTER SCIENCE Let A be the language of properly nested parentheses. For example, (()) and (()(()))() are in A, but )( is not. Show that A is in L. Verified answer Recommended textbook solutionsFundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Operating System Concepts9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin 489 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Other Quizlet setsMicrobiology Lecture Exam 4124 terms bigbrainaaronPLUS meeting at night13 terms Lilybliss04 S6 - Lektion 13 - LS BC18 terms HappyLittleSchool Related questionsQUESTION What YUM command would you enter at the command prompt to download an RPM package without installing it to the system? 15 answers QUESTION SSD startup drives will reduce the amount of time to boot up. 11 answers QUESTION A command-line interface (CLI) that you can launch from within Windows, from Safe Mode, or as a Recovery option 2 answers QUESTION If a Windows 10 computer has multiple network interfaces active, each can be assigned a different network location, each with different firewall settings based on their assigned network location. (T/F) 2 answers Which is a permission used to control access to the files and folders in Linux?The three permissions used to control access to files and folders in Linux are: read, write, and delete. In regards to a user account, what does a white circle with a black arrow indicate? groups contain users from the domain in which they're created but can be assigned permissions to resources in other domains.
What type of permissions are assigned directly to a file or folder?Permissions assigned directly to a particular file or folder (explicit permissions) take precedence over permissions inherited from a parent folder (inherited permissions).
What are the basic Linux file permissions check all that apply?The three basic file permissions in Linux are read, write, and execute.
Which feature will allow you to create permissions on a file for specific users?Inheritance allows administrators to easily assign and manage permissions. This feature automatically causes objects within a container to inherit all the inheritable permissions of that container. For example, the files within a folder inherit the permissions of the folder.
|