Question 1. 1. (TCO 5) A _____ is a folder or device that is accessible from a r
ID: 3554978 • Letter: Q
Question
Question 1.1. (TCO 5) A _____ is a folder or device that is accessible from a remote computer. (Points : 2) servertransport
network share
configuration Question 2.2. (TCO 5) Mobile devices can run each app in a _____a separated space from other apps. (Points : 2) phishing
sandbox
start-up
rotation Question 3.3. (TCO 5) A _____ can be used as a backdoor to your operating system and may be used to do things that require administrator access. (Points : 2) host
firewall
rootkit
vpn Question 4.4. (TCO 5) Which of the following is a hard drive preventative maintenance technique? (Points : 2) CHKDSK
Disk cleanup
Disk defragmenter
All of the above Question 5.5. (TCO 5) Software manufacturers offer software _____ that fix known problems. (Points : 2) commands
documents
devices
patches Question 6.6. (TCO 11) The three tabs in the Fedora 17 System Monitor are processes, resources, and _____. (Points : 2) users
networking
file systems
applications Question 7.7. (TCO 11) Whenever a program or command is executed, the kernel assigns an identification number called a(n) _____ to the process. (Points : 2) SUID
PID
GUID
UID Question 8.8. (TCO 11) When you use the _____ option, the kill command is considered stronger. (Points : 2) -9
-1
0
10 Question 9.9. (TCO 11) You use _____ to monitor active applications, view graphs, and manipulate the running applications on your Fedora 17 computer. (Points : 2) system monitor
task manager
system manager
process monitor Question 10.10. (TCO 11) In the processes tab of task manager, the _____ tab displays the working set of a process, the amount of memory it is actively using. (Points : 2) user name
description
memory usage
page faults Question 1.1. (TCO 5) A _____ is a folder or device that is accessible from a remote computer. (Points : 2) server
transport
network share
configuration Question 2.2. (TCO 5) Mobile devices can run each app in a _____a separated space from other apps. (Points : 2) phishing
sandbox
start-up
rotation Question 3.3. (TCO 5) A _____ can be used as a backdoor to your operating system and may be used to do things that require administrator access. (Points : 2) host
firewall
rootkit
vpn Question 4.4. (TCO 5) Which of the following is a hard drive preventative maintenance technique? (Points : 2) CHKDSK
Disk cleanup
Disk defragmenter
All of the above Question 5.5. (TCO 5) Software manufacturers offer software _____ that fix known problems. (Points : 2) commands
documents
devices
patches Question 6.6. (TCO 11) The three tabs in the Fedora 17 System Monitor are processes, resources, and _____. (Points : 2) users
networking
file systems
applications Question 7.7. (TCO 11) Whenever a program or command is executed, the kernel assigns an identification number called a(n) _____ to the process. (Points : 2) SUID
PID
GUID
UID Question 8.8. (TCO 11) When you use the _____ option, the kill command is considered stronger. (Points : 2) -9
-1
0
10 Question 9.9. (TCO 11) You use _____ to monitor active applications, view graphs, and manipulate the running applications on your Fedora 17 computer. (Points : 2) system monitor
task manager
system manager
process monitor Question 10.10. (TCO 11) In the processes tab of task manager, the _____ tab displays the working set of a process, the amount of memory it is actively using. (Points : 2) user name
description
memory usage
page faults
Explanation / Answer
1.network share
2.sandbox
3. vpn
4. All of the above
5.patches
6.file systems
7.UID
8. -1
9.system manager
10. description
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.