9. A Signal driver is a device driver that includes a digital signature proving who published the device driver and whether the device driver has been altered. 10. Device manager provides you with a graphical view of the hardware that is installed in your computer and gives you a way to manage and configure your devices. Multiple Choice 1.
UNIX/Linux versus Mac versus Windows Preamble Although there are important differences in the Linux, Mac, and Windows operating systems (OS), it is important to note many of the similarities. By understanding what these operating systems have in common, the significance of the differences is clear. According to Andrews (2007), OS’s share the common four main functions: 1. Provides a User Interface (UI) – performs user requests concerning storage devices, including formatting disks, deleting, and copying files, and changing the computer system’s date. The OS UI provides a way for users to manage applications, data, software, and hardware.
To partition a disk using an answer file, you must add settings to the _____ configuration pass. WIN PE 7. The Windows 7 AIK tool that you use to create answer files is called _____. SIM 8. To boot from an image transmitted over the network by a WDS server, a workstation must have a network adapter that supports _____.
What happens when you use diff to compare two binary files that are not identical? (You can use gzip to create the binary files.) it will display the differences on the screen. Explain why the diff output for binary files is different from the diff output for ASCII files. When you compare binary files with diff, the utility displays a message saying the files differ when that is the case or no message when the files are the same.
When using traffic analysis, this process reveals the amount, type, origin and destination of the traffic flow on a network. This process is used when there is an infected computer presumed in the network. Also, the process can identify which computer is downloading something that is legal or potentially illegal. If for some reason that there is an infected computer, traffic analysis could expose which computer(s) that are infected on the network. Using traffic analysis could also identify the amount of bandwidth that each computer(s) on the network are
“Operating system functions” 1.1-1.6 What are the major functions of an operating system? Connect from hardware to the applications / Ram/ Software etc. / What is a file system and what are the three major file systems supported by windows? A file system is when the computer names and storages the date and organizes & –FAT –HPFS – NTFS supported by windows. What are limitations of these three file systems?
Most networks use __________________ to dynamically assign addresses and configure computers to use them. Dynamic Host Configuration Protocol (DHCP) 9. The Windows 7 utility that displays a list of the routers currently forwarding packets to a particular destination is called __________________. Tracert.exe 10. The top and bottom layers of the OSI model are called the __________________ and ________________ layers.
sort –u phone 6. What happens when you use diff to compare two binary files that are not identical? (You can use gzip to create the binary files.) Explain why the diff output for binary files is different from the diff output for ASCII files. It displays the differences between the two files comparing the versions of the source code.
University of Phoenix Material Unix® and Linux® Comparison Matrix Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare. Insert the three chosen versions and fill out the requested information in the Components column. UNIX® or Linux® operating system version: Red Hat Enterprise Linux |Components |Your response | |Role of shell |Uses a Bash command shell. The Shell provides the ability to interact and access a computer | | |system. This is mostly used for administrative purpose to either update the server, or add a | | |role to server, or install a program.
A two way system of saving is used here. Firstly for the database system, the user details for registration are stored in it while for the flat file system the documents uploaded may be stored there using pointer to create a specific name for a group of documents as the user prefers to save it. 3.10 System Implementation Tools We used software development tools and Languages to accomplish our goals and objectives of the system. We make elaboration on Front-End Languages and Back-End Servers. 3.10.1 Code Editors and Tools