How can you find the phone number for Ace Electronics in a file named phone that contains a list of names and phone numbers? grep “Ace Electronics” phone Which command can you use to display the entire file in alphabetical order? sort phone How can you display the file without any duplicate lines? uniq phone 6. What happens when you use diff to compare two binary files that are not identical?
What happens when you use diff to compare two binary files that are not identical? (You can use gzip to create the binary files.) Explain why the diff output for binary files is different from the diff output for ASCII files. When you compare binary files with diff, the utility displays a message saying the files differ when the files differ or no message when the files are the same. The diff utility compares ASCII files on a line-by-line basis; it is not designed to compare binary files on a byte-by-byte basis.
Chapter 5 Exercises 1. Which commands can you use to determine who is logged in on a specific terminal? 2. How can you keep other users from using write to communicate with you? Why would you want to?
Chapter 5 Questions 1. Which commands can you use to determine who is logged in on a specific terminal? finger, w, who, whoami, who am i 2. How can you keep other users from using write to communicate with you? Why would you want to?
To create a capture image, you use the Deployment Workbench console. | T | F | 3. The Windows 7 AIK script files used to perform unattended installations are called task sequences. | T | F | 4. You can use the boot images created by Deployment Workbench to start
6. What is the difference between passing an argument by value and passing it by reference? To pass an argument by value means that only a copy of the arguments’ value is passed into the parameter variable, while an argument by reference means that the argument is passed into a special type of parameter known as a reference variable. 7. Why do global variables make a program difficult to debug?
Microsoft Professional Test 1 1. Which of the following is not used for PE? A. custom deployments C. system troubleshooting B. Providing quick file server capability D. System Recovery 2. Which of the following is not a library that is included with Windows 7?
Resource sharing and device redirection Remote file access Remote printer access Inter-process communication Network management Directory services Electronic messaging (such as mail) Network virtual terminals 7.What functions resides under the transport layer? Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message. Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments. Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.
Backup Operators 10: Which of the following is the default UAC setting for a computer that is not joined to an AD DS domain? b. Notify me only when programs try to make changes to my computer
A non clustered index is a special type of index in which the logical order of the index does not match the physical stored order of the rows on disk. The leaf node of a non clustered index does not consist of the data pages. Instead, the leaf nodes contain index rows. 3. What are the different index configurations a table can have?