Upgrade to remove ads Show
Only ₩37,125/year
Terms in this set (47)Which of the following best describes the use of Libraries in Windows? Special folders that group files and folders, possibly stored in both local or network locations, into a single logical folder. Which of the following are true of Libraries? (Select two.) - A single folder can be added to multiple Libraries. You have created a custom Library using D:\Stats as the path to the Library. You want the files in the D:\Reports folder to be available in the Library you created. The files should also still be accessible using the D:\Reports folder. Include the D:\Reports folder in the Library. You need to install a 32-bit application on a 64-bit version of Windows 7. Where is the default directory where the application will be installed. %systemdrive%\Program Files (x86) You need to install a 32-bit application on a 32-bit version of Windows 10. In which default directory will the application be installed? %systemdrive%\Program Files You need to see the temporary files on a machine running Windows 7. Which directory holds the user temporary files, and which environment variable stores the temporary directory path? (Select two.) - C:\Users\username\AppData\Local\Temp Where system root is the C: drive, what is the path to the directories that hold user profiles in Windows 10? C:\Users\username Where system root is the C: drive, where are fonts stored on a Windows 7 system? C:\Windows\Fonts\ Which file system path is the default location for system files in Windows 10? C:\Windows Which of the following file extension types can be run from the command prompt? (Select three.) - .exe Which commands can you use to create a new directory? (Select two.) - md Which command would you use to copy all files and subdirectories in a directory, including empty subdirectories? xcopy /e Which command lets you delete subdirectories in addition to files in the current directory? rd /s Which command would you use to change the current directory to the immediate parent dictionary? cd .. Which option used with the copy command makes sure that all copied files are written correctly after they have been copied? /v You need to copy several hundred files from one directory to another. Most of the files exist in the target directory, but you want to overwrite the existing files with the ones you will copy. You want the file copy to proceed
automatically without prompting you to overwrite existing files. /y You are working at the command line and want to add the Read-only attribute to a file and remove the Hidden attribute. Which command would you use? attrib +r -h Which of the following extensions identifies a program packaged for use by Windows Installer? .msi Which file attribute identifies the file as having been modified since the last backup? Archive You have a file which you would like other users to see, but not modify. Which file attribute should you use? R Which of the following file extensions indicates a Windows system file? (Select two.) - .dll While researching a fix to a system file issue, you find that using the ATTRIB command should resolve the issue you are experiencing. The instructions you found said to run the following command: It adds the System file attribute, adds the Read-only attribute, and removes the Archive attribute to the file myfile.dll. Which command will display a list of files and subdirectories in a directory? dir Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes? robocopy If a folder exists on a NTFS partition, which permission is needed by a user who needs to set security permissions on the folder? Full Control Susan in accounting has left the company and been replaced by Manuel. You create a user account for Manuel on Susan's computer. Manuel calls you and says that he can't open a specific file on the computer. Make Manuel the owner of the file Mary and Pablo share a workstation doing customer support. Mary works in the morning, and Pablo works in the evening. Modify the permissions on the document. Your computer has a single NTFS partition used for the C: drive with the following folders: Allow Full Control to both Your computer has a single NTFS partition used for the C: drive with the following folders: Deny Read to Reports.doc; Allow Full Control to Costs.doc You manage two folders in your computer as follows: Allow Full Control to both You manage two folders in your computer as
follows: Permissions are removed from both files The D:\ drive in your computer has been formatted with NTFS. The Mary user account has been Deny Full Control to D:\Reports\2010reports.doc; Allow Full Control to D:\Sales\2010sales.doc The D:\ drive in your computer has been formatted with NTFS. The Sales group on your Edit the properties for the file; assign Mary the Deny Full Control permission. A user has a problem
accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folders are not currently connect. net use How can you see a list of valid command parameters for the net use command? net use /?
You have a folder that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. - Configure both share and NTFS permissions. You
want to use the Universal Naming Convention (UNC) format to access a shared folder called Pictures on a computer Home1. \\Home1\Pictures Which of the following statements are true regarding administrative shares? (Select two.) - By default, Windows automatically creates an administrative share for every volume Bob is a member of the Accounting group. The Accounting group has been granted the Read and Write NFTS permissions to the WeeklyReport.xls file. Bob is attempting to access the report through a share with the Full Control permission assigned to the Everyone group. Bob can open, read, and write changes to the file. You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of
the files. Modify the NTFS permissions on the folder. Which tool in Windows 10 would you use to browse all networks and shared folders to which a user has access? - This PC You're using the vi editor to manage a text file on a Linux system. You want to type new test into the file; when you type you want the existing text that comes after the cursor to be pushed down. What mode do you need to be in to do this? Insert Mode You've just opened a text file in the vi editor and you're in Command Mode by default. There is more than one way to get from Command Mode to Replace Mode Which of the following key-press sequences will get you into Replace Mode? (Select three.) - Press Insert, then press Insert again - Press the 'i' key, the press Insert - Press the 's' key, then press Insert You need to see what kind of CPU is being used on a Linux system. The /proc directory contains a text file called cpuinfo that will give you the information you're looking for: Which of the following commands will display the entire contents of the cpuinfo text file on the screen? cat /proc/cpuinfo You need to view the contents of /var/log/auth.log file to get information about the users that have been logging on to the system. The auth.log file is a plain text file so you decide to use the cat command to review the file. However, the display fills up with text for several pages and you can't see the entire file. What commands can you use to view the content of the auth.log file page by page? more /var/log/auth.log You find that someone has set up an unauthorized account, with the username badmin, on the linux server. You have disabled the account but you need to find out when and how this user has been gaining access to the system. The first step you decide to take is to inspect the contents of the /var/log/auth.log file to find the information related to badmin logging into the system. Which command can you use to search through the auth.log for lines that contain the username you're looking for? grep "badmin" /var/log/auth.log You are the administrator of a Linux server. Following best practices for system security and effective administration, you always login to the system with a standard
non-root user account. You only elevate your privileges to root user level when you need to do an administrative task. What do you enter at the command prompt that will, by default, switch you to the root user and require you to enter the root password? su - Recommended textbook solutionsComputer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions
Computer Organization and Architecture10th EditionWilliam Stallings 497 solutions Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions Sets with similar termsmodule 11 questions36 terms robbi58d CH. 11 File Management44 terms amanda_teeters A+ 11-13155 terms juanarias1929 CTI 130 81 Practice Questions Chapter 1128 terms tbranch0 Sets found in the same folder1.4.7 Practice Questions/Windows Basics13 terms jcarranza3 CompTIA A+: Guide to IT Technical Suppor…184 terms Killcross14__ Test Out 2.4.314 terms Brandon_Gutchak 9.7 Mobile Device Security15 terms Grace20249 Other sets by this creatorEMS 1119 Chapter 670 terms karsonco EMS 1119 Chapter 526 terms karsonco Chapter 1 and 3 Vocabulary122 terms karsonco Chapter 3 Vocabulary63 terms karsonco Verified questions
COMPUTER SCIENCE Write a program that opens a specified text file and then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set. Verified answer
COMPUTER SCIENCE When a value in memory is no longer referenced by a variable, it is automatically removed through a process known as __________. a. garbage process b. garbage clearance c. garbage coordinator d. garbage collection Verified answer COMPUTER SCIENCE True/False Merge sort is a recursive sort with time complexity O(nlogn). Verified answer
COMPUTER SCIENCE Use a recursion tree to determine a good asymptotic upper bound on the recurrence T(n) = 2T(n - 1) + 1. Use the substitution method to verify your answer. Verified answer Other Quizlet setsGeology- Water Resources16 terms Michelle_MathisPLUS Chapter 4: Let the Market Know You Better11 terms johncarlosomera WE template12 terms pte506579 nutrition midterm80 terms Kayla_Cruz15 Related questionsQUESTION You are architecting an application and need to choose between application containerization and virtualization. What describes a difference between application containers and a virtual machine? 2 answers QUESTION Which of these log files stores most syslog messages, with the exception of those thatare related to authentication, mail, scheduled jobs, and debugging? 3 answers QUESTION In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula. (T/F) 9 answers QUESTION T or F: The native file system in Linux is called ufs. 15 answers What happens to the permissions of the file on the D :\ drive when copied quizlet?doc file; moving the file to the new folder on the same drive preserves the NTFS permissions assigned to the file. The D:\ drive allows the Full Control permission to the Users group. There are no other permissions assigned except for the default permissions.
Which of the following best describes the permission the members of the Users group will have for the two files in the D :\ public reports folder?Which of the following BEST describes the permission the members of the Users group will have for the two files in the C:\PublicReports folder? permissions assigned except for the default permissions. You then take the following actions: Move Reports.
Which of the following best describes what happens when share and NTFS permissions combine?When using share permissions and NTFS permissions together, if there is a conflict in the configuration, the most restrictive permission prevails. For example, if a user has NTFS full access to a specific file in a folder that is not shared, the user cannot access the file from the network.
What are the rules that affect what happens to permissions when a file or folder is created copied or moved?By default, an object inherits permissions from its parent object, either at the time of creation or when it is copied or moved to its parent folder. The only exception to this rule occurs when you move an object to a different folder on the same volume. In this case, the original permissions are retained.
|