Which of the following is true about the process of read data, as described in the chapter? a. The CPU tells the RAM which address holds the data that the CPU wants to read. 6. A user has opened a word processor, typed the numbers 123456789, and stored the document as a file called report1.
D 3. Which answer lists the correct number of bits associated with each term? C 4. Which of the following answers are true about random-access memory (RAM) at it is normally used inside a personal computer? A & C 5.
D. Kilobytes 3. Which answer lists the correct number of bits associated with each term? C. 64 bits per quadruple word 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? A. used for short-term memory E. is installed onto the motherboard 5.
Create a .plan file in your home directory. Does finger display the contents of your .plan file? The answer is system dependent. 8. What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path?
a. autounattend.xml b. auto.xml c. auto.txt d. automatic.xml 3. What is the program you should use to create or validate an answer file used to install Windows? a. IAS b. Server Core c. SIM d. WDS 4. What is the maximum amount of memory that
What happens when you give the following commands if the file named done already exists? $ cp to_do done $ mv to_do done Either command overwrites done with the contents of to_do 4. How can you display the following line on the screen you are working on? Hi $2, I’m number * (guess)! $ "Hi #2, I'm number * (guess)!"
Manages Applications – each OS installs, uninstalls, runs applications and manages the interface to the hardware for an application. 4. Manages Hardware – each OS manages the permanent programs and memory. All three OS’s also diagnose software and hardware problems and interpret the needs of each. With the similarities in the forefront of our minds, let us delve into the depth of the differences in the Linux, Mac, and Windows operating systems.
Lesson 5 Connecting to a Network Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. A software routine, which also acts as a filter that blocks certain type of incoming and outgoing traffic, while enabling other types is called a __________________. firewall 2. The __________________ tool provides a central access point for all of the network controls and connections on a computer running Windows 7.
The unit can compare numbers, letters, or special characters. The computer can then take action based on the result of the comparison. It then has a memory unit which allows the CPU via the operating system to calculate the amount of memory needing to be allocated to each programme and where to put the memory in use if unallocated. The processor can also control backing storage this is sometimes knows as secondary storage this is the name for all other data storage devices in computer i.e. a hard drive, etc.
Question 1 What is the name of the computer you are working from? SEA-SVR1 Question 2 What is the default lease duration of a Wired subnet type? 6 long time Question 3 What are three recommendations listed in Server Manager for managing the DHCP Server role? 1. Increase fault border by change integrity DHCP orbital cavitys.