Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Computer Science
Q:
Match each item with a statement below.a. DHCP f. Intranetb. HTTP g. SMTPc. workgroup h. homegroupd. Internet Protocol i. FTPe. client/server model1) Used for sending and receiving e-mail.2) Provides a basis for file and printer sharing.3) Allows Web users to request Web sites from remote servers.4) The main networking protocol that allows for the communication of data across a network.5) Has become a central idea of networking.6) Makes it easy to share your libraries and printers on a home network.7) A computer networking protocol used by hosts (DHCP clients) to retrieve IP address assignments and other configuration information.8) Allows for the rapid transfer of files across the Web.9) A private network that uses Internet-type applications, but is available only within a single organization.
Q:
How does Windows 7 provide shared folder access on a network?
Q:
Explain how Administrators use local user groups to simplify the management and authorization of network resources.
Q:
Describe Fedora 13's methods for accessing shared files.
Q:
Q:
How do you see the shares that another computer is offering using the NET VIEW command?
Q:
Describe the Internet Protocol Suite.
Q:
Describe the two standards of IP addresses.
Q:
What are the advantages of using a VPN?
Q:
Identify and describe a LAN.
Q:
Setting the Fedora 13 ____________________ bit ensures that only the owner (and root, of course) who created a file in his directory can delete the file and prevent malicious or accidental deletion by others.
Q:
____________________ inheritance occurs when you create or copy a subfolder or a file and the subfolder or file inherits the permissions of the parent folder by default.
Q:
A(n) ____________________ is a set of rules that enables two computers to talk to each other.
Q:
The ____________________ is a system of linked networks that are worldwide in scope and facilitate data communication services that permit access to the World Wide Web and e-mail.
Q:
Simply stated, a(n) ____________________ is a series of computer devices or nodes interconnected by communication paths.
Q:
A(n) ____ appears as the third character of the Fedora 13 Others permission bits when the sticky bit is set.a. p c. tb. s d. z
Q:
When the Fedora 13 execute bit is set for the owner, the SUID bit is set to ____.a. e c. sb. o d. x
Q:
Which Fedora 13 file and directory permission provides read and execute authority?a. r-x c. --xb. r-- d. ---
Q:
NTFS permissions are ____ when a file or folder is moved or copied to a FAT16 or FAT32 formatted partition.a. inherited c. changed to "read only"b. removed d. changed to "full control"
Q:
Permissions assigned at the ____ level override those assigned at the folder level.a. network c. fileb. group d. share
Q:
Which Windows 7 shared folder permission allows you to change file permissions and take ownership of the file resources?a. Read c. Changeb. Write d. Full Control
Q:
Only ____ permits user accounts and user groups to be linked to folder and file permissions.a. NT c. NTFSb. FAT32 d. FAT NT
Q:
____ are responsible for setting up shared printers on the network.a. Disk drive manufacturers c. Usersb. Managers d. Network administrators
Q:
To access a Fedora 13 share, you must ____ the share.a. mount c. cleanb. load d. execute
Q:
Using UNC notation requires that you know the name or ____ of the server and share.a. location c. IP addressb. password d. subnet address
Q:
The homegroup is protected with a(n) ____, so you can always choose what you share with the group.a. encryption key c. sticky bitb. password d. share
Q:
You can join an existing Windows 7 network workgroup, by default called ____, or you can create a new one.a. DEFAULTGRP c. WORKGROUPb. NETGRP d. GROUP
Q:
One way to view the Fedora 13 IPv4 settings is to use the ____ command in a Terminal window.a. view c. networkb. nm-tool d. IP
Q:
The ____ IP address of the server provides domain name resolution.a. DHCP c. gatewayb. subnetwork d. DNS
Q:
The ____ IP address is a node (a router) on a TCP/IP network that serves as an access point to another network.a. DHCP c. gatewayb. subnetwork d. DNS
Q:
____ is the division of a network into groups of computers that have a common, designated IP address routing prefix.a. Subnetting c. Leasingb. Subleasing d. Time-division multiplexing
Q:
POP3 (Post Office Protocol 3) operates in the ____ layer of the Internet Protocol Suite.a. Transport c. Networkb. Internet d. Application
Q:
The Internet Protocol Suite is divided into ____ "layers" of communication from bottom to top.a. two c. fiveb. four d. six
Q:
The Internet Protocol uses unique addresses, simply called ____ addresses, to identify computers or devices in a network.a. IP c. standardb. UNC d. DNS
Q:
A VPN (virtual private network) uses a technique known as ____ to transfer data securely on the Internet to a remote access server on your workplace network.a. piping c. sublettingb. leasing d. tunneling
Q:
Fedora 13 provides peer-to-peer networking with ____, which is based on the common client/server protocol of Server Message Block (SMB).a. SOHO c. DHCPb. Samba d. POP3
Q:
Between the NTFS Full Control and Modify permissions, the more restrictive permission is Full Control.
Q:
By default, the Network icon is not on the Start menu of the Windows 7 Network Connection Details window.
Q:
In the absence of DHCP, all hosts on a network must be manually configured with static IP addresses.
Q:
The Internet Protocol Suite Network layer allows the IP to transfer packets across a link.
Q:
SOHO is the standard used by home and business computers and all networking software, and is the foundation of the Internet Protocol Suite.
Q:
Match each item with a statement below.a. System Monitor f. Task Managerb. winhelp g. vmstatcommandc. reliability events h. pagingd. baseline i. pscommande. /proc file system1) Provides information about the programs and processes running on your Windows 7 computer.2) Lists the Fedora 13 system processes that are running, identifies who owns them, and shows the amount of system resources being used.3) The Fedora 13 task management tool.4) Occurs when the virtual machine accesses the hard drive to store or retrieve a memory page.5) A Fedora 13 command-line reporting and control information system.6) A Fedora 13 command that reports on process status, memory consumption, paging activity, I/O operations, and CPU usage.7) The level of performance you can reliably expect during typical usage and workloads.8) Changes to your system that could alter its stability or other events that might indicate system instability.9) A 16-bit Windows 3.1 legacy program.
Q:
What is the freecommand used for in Fedora 13?
Q:
What is the top command used for in Fedora 13?
Q:
What type of Fedora 13 system-related tasks is the /proc file system used for?
Q:
What are the advantages of using the performance-monitoring tools in Windows 7 and Fedora 13 for real-time and periodic observation?
Q:
How is thekillcommand used in Fedora 13?
Q:
How do you investigate whether a running service is tied to a particular process?
Q:
Which Windows 7 Task Manager set of process data selections are the most essential for day-to-day use?
Q:
How is the Processes tab in the Windows 7 Task Manager used?
Q:
Describe the two ways to start the Windows 7 Task Manager on a virtual machine.
Q:
The Windows 7 Reliability Monitor retains data for up to a(n) ____________________ so you can see how your system has been performing over time.
Q:
The____________________ Index rating gives you a visual indication of how reliably your system performs over time.
Q:
The Windows 7 ____________________ is an advanced tool that measures hardware and software problems and other changes to your computer.
Q:
A(n) ____________________ is anything that slows down a virtual machine's performance.
Q:
A program with an abnormally high CPU value could be hung, or a program with an extremely large amount of memory usage might have a memory ____________________, meaning that a process uses memory without bounds.
Q:
Which Fedora 13 vmstat basic field provides the percentage of total processor time consumed by the kernel?a. procs c. syb. us d. id
Q:
To use the Fedora 13 free command, simply type ____.a. top c. vmstatb. free d. watch free
Q:
The /proc file system is known as a ____-file system, which directly interfaces with the kernel and is stored in memory.a. virtual c. pseudob. logical d. real
Q:
A sustained processor queue of less than ____ threads per processor is normally acceptable.a. 10 c. 20b. 15 d. 25
Q:
If the Pages/sec counter in the System Monitor exceeds ____, you need to analyze paging activity.a. 10 c. 20b. 15 d. 35
Q:
The ____ counter indicates the amount of memory that is left after operating system allocations.a. Cache Bytes c. Pages/secb. Available Mbytes d. Page Faults/sec
Q:
The number of ____ that a disk can accomplish per second should not exceed the manufacturer's specifications.a. swaps c. start-upsb. writes d. rotations
Q:
If the value of the Performance Monitor % Disk time counter exceeds 90 percent, check the ____.a. Avg. Disk Bytes/Read c. Current Disk Queue Lengthb. Avg. Disk Bytes/Transfer d. Disk Bytes/sec
Q:
If the % Processor Time counter's value continually exceeds ____ percent, you might need to upgrade the processor.a. 55 c. 75b. 65 d. 85
Q:
Thekillcommand that sends a signal to "hang up" a process and clean up associated processes has the form:kill ____.a. -SIGHUP PID c. -SIGKILL PIDb. -9 PID d. PID
Q:
When you use the ____ option, the kill command is considered stronger.a. -9 c. 0b. -1 d. 10
Q:
The first number in the Fedora 13 ps display indicates the ____ PID.a. child c. siblingb. parent d. cousin
Q:
Whenever a program or command is executed, the kernel assigns an identification number called a(n) ____ to the process.a. SUID (set user ID) c. GUID (set group ID)b. PID (process ID) d. UID (User ID)
Q:
The four tabs in the Fedora 13 System Monitor are System, Processes, Resources, and ____.a. Users c. File Systemsb. Networking d. Applications
Q:
You use ____ to monitor active applications, view graphs, and manipulate the running applications on your Fedora 13 computer.a. System Monitor c. System Managerb. Task Manager d. /proc file system
Q:
The ____ program creates a virtual DOS machine to run DOS programs.a. dos.exe c. ntvdm.exeb. dos.cmd d. ntvdm.cmd
Q:
To stop a process, select the program and click the ____ button.a. End c. Quitb. Stop d. End Process
Q:
In the Processes tab of Task Manager, the ____ tab displays the "working set" of a process, or the amount of memory it is actively using.a. Virtual Memory Size c. Memory Usageb. Peak Memory Usage d. Page Faults
Q:
From the Windows 7 Task Manager ____ tab, you can determine if a program is not responding.a. Processes c. Servicesb. Applications d. Performance
Q:
The Windows 7 Task Manager ____ tab is not available to computer systems in a domain network.a. Users c. Servicesb. Networking d. Processes
Q:
In Windows 7, you can use the ____ feature to access system tools that require administrative privileges and determine the cause of a problem.a. Author c. Open Withb. Run As d. Send To
Q:
The Fedora 13 Automatic Bug Reporting Tool (ABRT) resides in the foreground and watches for application crashes.
Q:
Disk access is much slower than RAM (random access memory).
Q:
A low rate of page file activity indicates that more RAM is required.