1. Match each term with the correct statement below. 1. A user-friendly name that masks an IP address. 2. The list of instructions that a software developer writes to make up a program 3. An organized collection of data that is arranged into tables of related information. 4. A service that protects companies from outside intruders on the Internet. 5. A computer equipped with open source software such as text editors, desktop publishing software, and office productivity suites. 6. A software system that installs and maintains software. 7. The sets of instructions or programs that understand how to use the hardware of the computer in a meaningful way. 8. A GUI Environment for Linux written in the C programming language. 9. A service that requests outside Internet resources on behalf of a computer inside of a company. a. GNOME b. source code c. fully qualified domain names d. firewall e. package manager f. software g. proxy server h. database i. office workstation Statement Response Value Correct Match 1 c 11.11% c 2 b 11.11% b 3 h 11.11% h
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1.
Match each term with the correct statement below.
1. A user-friendly name that masks an IP address.
2. The list of instructions that a software developer writes to make up a program
3. An organized collection of data that is arranged into tables of related information.
4. A service that protects companies from outside intruders on the Internet.
5. A computer equipped with open source software such as text editors, desktop publishing software, and office productivity suites.
6. A software system that installs and maintains software.
7. The sets of instructions or programs that understand how to use the hardware of the computer in a meaningful way.
8. A GUI Environment for Linux written in the C programming language.
9. A service that requests outside Internet resources on behalf of a computer inside of a company.
a. GNOME
b. source code
c. fully qualified domain names
d. firewall
e. package manager
f. software
g. proxy server
h. database
i. office workstation
Statement Response Value Correct Match
1 c 11.11% c
2 b 11.11% b
3 h 11.11% h
4 d 11.11% d
5 i 11.11% i
6 e 11.11% e
7 f 11.11% f
8 a 11.11% a
9 g 11.12% g
2.
A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.
Student Response
Value Correct Answer
Feedback
A. system service
B. graphical user interface
C. user interface
D. device driver
100% Correct.<br/><br/>
3.
A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.
Student Response
Value Correct Answer
Feedback
A. package manager
0% Incorrect.
B. DBMS
C. tarball
D. router
4.
The concept of ____ enables software developers to read the source code of other people’s software, modify that source code to make the program better, and redistribute that source code to other developers who might improve it further.
Student Response
Value Correct Answer
Feedback
A. Open Source Software
100% Correct.
B. Linux
C. Closed Source Software
D. Freeware
5.
The ____ stipulates that the source code of any software published under its license must be freely available.
Student Response
Value Correct Answer
Feedback
A. Artistic License
B. GNU Public License
100% Correct.
C. Free Software Foundation
D. Freeware
6.
Linux is merely one product of open source development.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
7.
Each computer participating on the Internet must have an IP address.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
8.
Services that are used on the local computer are referred to as server services.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
9.
The ____ stores information for retrieval in a separate computer chip that is connected to the processor via a high-speed link.
Student Response
Value Correct Answer
Feedback
A. Level 1 (L1) cache
B. Level 2 (L2) cache
100% Correct.
C. Level 3 (L3) cache
D. Control Unit
10.
The most common slot for peripheral devices used today is a(n) ____ slot.
Student Response
Value Correct Answer
Feedback
A. PCI 100% Correct.
B. ISA
C. AGP
D. DMA
11.
On Linux, a master hard drive connected to the secondary IDE controller would be named ____.
Student Response
Value Correct Answer
Feedback
A. hda
B. hdb
C. hdc 100% Correct.
D. hdd
12.
Greater amounts of ____ memory allow more programs to run simultaneously on the system.
Student Response
Value Correct Answer
Feedback
A. PROM
B. ROM
C. RAM 100% Correct.
D. BIOS ROM
13.
Keyboards and mice are devices that facilitate user input and direction.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
14.
Any operating system can be installed on any computer, regardless of the computer’s hardware.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
15.
Match each correct item with the statement below.
1. Filesystem that performs journaling
2. Passwords that are stored in a separate database from the user account information
3. Program started by the BIOS ROM that loads the Linux kernel into memory from a hard disk partition inside the computer
4. Passwords that support a length of up to 256 characters and are encrypted using a hash algorithm
5. Allows you to choose the operating system to boot upon system startup
6. Specify a commands’ working parameters
7. May be required if the / or /boot partition starts after the 1024th cylinder of the hard disk
8. Alter the way a command works
9. Traditional filesystem still used on most Linux computers
a. MD5 passwords
b. Dual booting
c. ext3
d. Arguments
e. LBA32
f. Boot loader
g. Shadow passwords
h. Options
i. ext2
Statement Response Value Correct Match
1 c 11.11% c
2 g 11.11% g
3 f 11.11% f
4 a 11.11% a
5 b 11.11% b
6 d 11.11% d
7 e 11.11% e
8 h 11.11% h
9 i 11.12% i
16.
LDAP stands for ____.
Student Response
Value Correct Answer
Feedback
A. Linux Distributed Access Protocol
B. Lightweight Directory Access Protocol
100% Correct.
C. Linear Distributed Access Patrol
D. Linux-Delegated Access Protocol
17.
To find all of the commands that have the word “list” in their name or description, you would type ____.
Student Response
Value Correct Answer
Feedback
A. man -j list
B. man -k list
100% Correct.
C. man -l list
D. man -m list
18.
In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.
Student Response
Value Correct Answer
Feedback
A. processor
B. user interface
C. swap memory
D. shell 100% Correct.<br/><br/>
19.
In Linux, a "-" precedes a(n) ____.
Student Response
Value Correct Answer
Feedback
A. argument
B. option 100% Correct.
C. keyword
D. command
20.
The ____ metacharacter indicates background command execution.
Student Response
Value Correct Answer
Feedback
A. @
B. ^
C. & 100% Correct.
D. !
21.
A swap partition contains a filesystem.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
22.
Typically, you only perform an upgrade if there are data and configurations on the previous installation of Red Hat Linux that are difficult to re-create or back up.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
23.
To display the contents of a file called data, use the command ____.
Student Response
Value Correct Answer
Feedback
A. disp data
B. ls data
C. ls -l data
D. cat data 100% Correct.<br/><br/>
24.
The ____ command displays the last 10 lines of a text file.
Student Response
Value Correct Answer
Feedback
A. end -10
B. head -10
C. stop -10
D. tail -10 100% Correct.<br/><br/>
25.
The ____ metacharacter can also be used to refer to the current user's home directory.
Student Response
Value Correct Answer
Feedback
A. ~ 100% Correct.
B. @
C. &
D. #
26.
A linked file is followed by a(n) ____.
Student Response
Value Correct Answer
Feedback
A. @ 100% Correct.
B. *
C. /
D. =
27.
It is acceptable to use shell metacharacters when naming files.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
28.
Pressing the Esc key at the prompt while using the more command displays a help screen.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
29.
The command strings /bin/echo displays the binary characters inside the /bin/echo binary executable program.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
30.
The ____ section of a filesystem is the section that contains information about the filesystem in general.
Student Response
Value Correct Answer
Feedback
A. inode table
B. inode
C. data blocks
D. superblock
100% Correct.<br/><br/>
Score: 10/10
31.
In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.
Student Value Correct Feedback
Response
Answer
A. /load
B. /bin
C. /boot 100% Correct.
D. /mnt
Score: 10/10
32.
In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.
Student Response
Value Correct Answer
Feedback
A. *
B. +
C. ?
D. - 100% Correct.<br/><br/>
Score: 10/10
33.
When using the chmod command, the mode rwx can be represented by the number ____.
Student Response
Value Correct Answer
Feedback
A. 0
B. 1
C. 7 100% Correct.
D. 8
Score: 10/10
34.
To move files you can use the mv command.
Student Respons
Value Correct Answer
Feedback
e
A. True 100% Correct.
B. False
Score: 10/10
35.
The rmdir command automatically removes a directory and all of its subdirectories and files.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
36.
You can use wildcard metacharacters with the find command.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
37.
The SGID allows regular users to execute a binary compiled program and become a member of the group that is attached to the file.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
38.
Match each term with the correct statement below.
1. Directory that stores device files. a. major
2. Indicates a particular device.
3. File on the hard disk representing a device on a Linux system.
4. Command used to create a journal file on the filesystem.
5. The first readable sector of a hard disk, where partition definitions are stored.
6. File that contains a list of devices that are currently used on the system and their major numbers.
7. Quota limits that are rigid and prevents the user from going past them.
8. Points to the device driver for a device in the Linux kernel.
9. Quota limits that allows the user to extend them for a certain period of time.
number
b. /proc/devices
c. MBR
d. soft limits
e. tune2fs
f. hard limits
g. minor number
h. /dev
i. device file
Statement Response Value Correct Match
1 h 11.11% h
2 g 11.11% g
3 i 11.11% i
4 e 11.11% e
5 c 11.11% c
6 b 11.11% b
7 f 11.11% f
8 a 11.11% a
9 d 11.12% d
Score: 10/10
39.
To create partitions after installation, you can use the ____ command.
Student Response
Value Correct Answer
Feedback
A. format
B. formatdisk
C. fdisk 100% Correct.
D. partition
Score: 10/10
40.
To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types.
Student Response
Value Correct Answer
Feedback
A. fcheck 0% Incorrect.
B. fsc
C. fscheck
D. fsck
Score: 0/10
41.
If you do not know the type, major, or minor number of a device, you can use the ____ program to re-create the device based on the common name.
Student Response
Value
Correct Answer
Feedback
A. /dev/MAKEDEV
100% Correct.
B. mkfs
C. mknod
D. /dev/makedevice
Score: 10/10
42.
The ____ filesystem contains most of the operating system files.
Student Response
Value Correct Answer
Feedback
A. boot
B. data
C. mnt
D. root 100% Correct.<br/><br/>
Score: 10/10
43.
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.
Student Response
Value Correct Answer
Feedback
A. -t 100% Correct.
B. -f
C. -c
D. -o
Score: 10/10
44.
After a typical Red Hat Fedora Linux installation,over 18,000 different device files are in the /dev directory.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
45.
In Linux you must use only one type of filesystem on a system.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
46.
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.
Student Response
Value Correct Answer
Feedback
A. 256
B. 512
C. 1024 100% Correct.
D. 2048
Score: 10/10
47.
To verify hardware settings, you can examine the contents of the ____ directory.
Student Response
Value Correct Answer
Feedback
A. /log
B. /root
C. /proc 100% Correct.
D. /hw
Score: 10/10
48.
The ____ standard support speeds of up to 80 MB/second.
Student Response
Value Correct Answer
Feedback
A. SCSI-3 Ultra2 Wide
100% Correct.
B. SCSI-2 Wide
C. SCSI-3 Ultra
D. SCSI-3 Ultra3 Wide
Score: 10/10
49.
RAID level ____ is often referred to as disk mirroring.
Student Response
Value Correct Answer
Feedback
A. 1 100% Correct.
B. 2
C. 3
D. 4
Score: 10/10
50.
IRQ 2 and IRQ 9 are linked such that they are seen by the system as a single IRQ.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
51.
Multiple devices can use a DMA channel simultaneously.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
52.
The BIOSes on different computers are generally very similar or exactly the same.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
53. Match each term with the correct statement below.
1. Labels representing command input and output.
2. Any error messages generated by a command.
3. Shell variables that are typically set by the system and contain information that the system and programs access regularly.
4. Files that are typically used to create custom programs that perform administrative tasks on Linux systems.
5. The first line in a shell script, which specifies the
a. decision construct
b. stderr
c. tee
d. stdout
e. hashpling
f. environment
pathname to the shell that interprets the contents of the shell script.
6. The information that is processed by the command during execution.
7. Constructs that alter the flow of a program based on whether a command in the program completed successfully or based on a decision that the user makes given a question posed by the program.
8. The normal output of a command.
9. A filter command that takes information from Standard Input and sends that information to a file, as well as to Standard Output.
variables
g. file descriptors
h. stdin
i. shell scripts
Statement Response Value Correct Match
1 g 11.11% g
2 b 11.11% b
3 f 11.11% f
4 i 11.11% i
5 e 11.11% e
6 h 11.11% h
7 a 11.11% a
8 d 11.11% d
9 c 11.12% c
54.
The ____ escape sequence represents a form feed.
Student Response
Value Correct Answer
Feedback
A. \n
B. \f 100% Correct.
C. /f
D. /n
55.
You can redirect a file to the Standard Input of a command using the ____ metacharacter.
Student Response
Value Correct Answer
Feedback
A. >
B. #
C. |
D. < 100% Correct.<br/><br/>
Score: 10/10
56.
The ____ command counts the number of lines, words, and characters in a file.
Student Response
Value Correct Answer
Feedback
A. pr
B. nl
C. tr
D. wc 100% Correct.<br/><br/>
Score: 10/10
57.
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
Student Response
Value Correct Answer
Feedback
A. True 0% Incorrect.
B. False
Score: 0/10
58.
You are limited to using one pipe | metacharacter on the command line to pipe information from one command to another command.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
59.
You can use the sed command to remove unwanted lines of text.
Student Response
Value Correct Answer
Feedback
A. True
B. False 0% Incorrect.
Score: 0/10
60.
Any command that can be executed on the command line can also be placed inside any environment file.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
61.
____ is the Window Manager used for the GNOME desktop in Red Hat Fedora Core 2.
Student Response
Value Correct Answer
Feedback
A. kwin
B. twm
C. metacity 100% Correct.
D. sawfish
Score: 10/10
62.
If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.
Student Response Valu Correct Feedback
e Answer
A. /etc/X11/XF86Config
B. /etc/X11/xorg.conf 100% Correct.
C. /etc/X11/xwin.conf
D. /etc/X11/xorg
Score: 10/10
63.
To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.
Student Response
Value Correct Answer
Feedback
A. sys-conf-kb
B. system-config-kb
C. sys-config-keyboard
D. system-config-keyboard
100% Correct.<br/><br/>
Score: 10/10
64.
After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility after X Windows has started
Student Response
Value Correct Answer
Feedback
A. xvidtune 100% Correct.
B. xvideotune
C. xtune
D. vidtune
Score: 10/10
65.
In Linux, runlevel ____ is also known as multiuser mode.
Student Response
Value Correct Answer
Feedback
A. 1
B. 2 100% Correct.
C. 3
D. 4
Score: 10/10
66.
The /etc/rc.d/rc 5 command only executes files that start with S in the /etc/rc.d/rc5.d/ directory.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
67.
Most daemons accept the arguments start, stop, and restart.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
68.
You can choose to use a Window Manager only, and not use a desktop manager.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
69.
Match each term with the correct statement below.
1. Identifies the process that started another process.
2. Ignoring a kill signal.
3. Daemon used to schedule a command to execute once in the future.
4. Directory storing the shell environment and scheduled commands.
5. A process’s identifier that allows the kernel to identify it uniquely.
6. The location of user cron tables.
7. Daemon used to schedule a command to execute repeatedly in the future.
8. The location of system cron tables.
9. An executable file on the hard disk that can be run when you execute it.
a. program
b. at daemon
c. /etc/crontab
d. /var/spool/cron
e. /var/spool/at
f. PID
g. cron daemon
h. trapping
i. PPID
Statement Response Value Correct Match
1 i 11.11% i
2 h 11.11% h
3 b 11.11% b
4 e 11.11% e
5 f 11.11% f
6 d 11.11% d
7 g 11.11% g
8 c 11.11% c
9 a 11.12% a
Score: 10/10
70.
A system process that is not associated with a terminal is called a(n) ____.
Student Response
Value Correct Answer
Feedback
A. daemon 100% Correct.
B. user
C. parent
D. startup
Score: 10/10
71.
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.
Student Response
Value Correct Answer
Feedback
A. *
B. + 100% Correct.
C. -
D. /
Score: 10/10
72.
To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.
Student Response
Value Correct Answer
Feedback
A. -f
B. -l
C. -a
D. -e 100% Correct.<br/><br/>
Score: 10/10
73.
There are ____ different kill signals that the kill command can send to a certain process.
Student Value Correct Feedback
Response
Answer
A. 16
B. 32
C. 64 100% Correct.
D. 128
Score: 10/10
74.
The ps command is the only command that can view process information.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
75.
The killall command uses the PID to kill a process.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
76.
After a process has been started, you can change its priority by using the renice command.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
77.
The skeleton directory on most Linux systems is ____.
Student Response
Value Correct Answer
Feedback
A. /etc/skel 100% Correct.
B. /var/skel
C. /etc/skeleton
D. /var/skeleton
Score: 10/10
78.
To lock an account, you can use the usermod command with the ____ option.
Student Response
Value Correct Answer
Feedback
A. -U
B. -u
C. -l
D. -L 100% Correct.<br/><br/>
Score: 10/10
79.
The lp command uses the ____ option to specify the destination printer name.
Student Response
Value Correct Answer
Feedback
A. -n
B. -p
C. -d 100% Correct.
D. -l
Score: 10/10
80.
The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.
Student Response
Value Correct Answer
Feedback
A. -o
B. -a
C. -p 100% Correct.
D. -e
Score: 10/10
81.
The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.
Student Response
Value Correct Answer
Feedback
A. wtmp
B. messages
C. dmesg
D. secure 100% Correct.<br/><br/>
Score: 10/10
82.
Can each user on a Linux system specify his or her own default printer?
Student Response
Value Correct Answer
Feedback
A. Yes 100% Correct.
B. No
Score: 10/10
83.
Can the lp command accept information from Standard Input?
Student Response
Value Correct Answer
Feedback
A. Yes 100% Correct.
B. No
Score: 10/10
84.
Did older Linux systems store encrypted passwords in the /etc/shadow file?
Student Response
Value Correct Answer
Feedback
A. Yes
B. No 100% Correct.
Score: 10/10
85.
Match each term with the correct statement below.
1. Burning software that comes with Red Hat Fedora Core 2.
2. Filenames that end with the .tar.gz or .tgz extensions, and represent gzip-compressed tar archives.
3. Command that can be used to ensure that a file was received in its entirety after you download it.
4. Command that can be used to manipulate tape devices or prepare a tape for system backup.
5. Archiving all data on a filesystem.
6. Values that are typically calculated using a Message Digest 5 (MD5) algorithm.
7. Back-up copies of files and directories.
8. Standard set of instructions used to compress a file.
9. The rate of compression.
a. full backup
b. tarball
c. compression algorithm
d. mt
e. compression ratio
f. checksum
g. sum
h. archive
i. X-CD-Roast
Statement Response Value Correct Match
1 i 11.11% i
2 b 11.11% b
3 g 11.11% g
4 d 11.11% d
5 a 11.11% a
6 f 11.11% f
7 h 11.11% h
8 c 11.11% c
9 e 11.12% e
Score: 10/10
86.
The compression algorithm used by the compress utility has an average compression ratio of ____%.
Student Response
Value Correct Answer
Feedback
A. 30-40
B. 40–50 100% Correct.
C. 50-60
D. 60-70
Score: 10/10
87.
The ____ option can be used with the tar command to extract a specified archive.
Student Response
Value Correct Answer
Feedback
A. -s
B. -e
C. -x 100% Correct.
D. -a
Score: 10/10
88.
You can perform up to ____ different incremental backups using the dump/restore utility.
Student Response
Value Correct Answer
Feedback
A. 7
B. 8
C. 9 100% Correct.
D. 10
Score: 10/10
89.
The ____ command can be used to display the contents of a compressed file.
Student Response
Value Correct Answer
Feedback
A. acat
B. zcat 100% Correct.
C. cat
D. ccat
Score: 10/10
90.
When used with the compress command, the ____ option can be used to compress symbolic links.
Student Response
Value Correct Answer
Feedback
A. -f 100% Correct.
B. -c
C. -v
D. -r
Score: 10/10
91.
When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
92.
The tar utility cannot back up device files or files with filenames longer than 255 characters.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
93.
The ____ option for the sar command is used to displays statistics for the processor queue.
Student Response
Value Correct Answer
Feedback
A. -r
B. -c
C. -q 100% Correct.
D. -v
Score: 10/10
94.
When compiling a kernel, if the source code has been compiled previously, you can optionally use the ____ command to remove any files created by previous kernel compilations.
Student Response
Value Correct Answer
Feedback
A. make proper
0% Incorrect.
B. make mproper
C. make mrpr
D. make
mrproper
Score: 0/10
95.
The shell restricts the number of filehandles that programs can open to ____ by default.
Student Response
Value Correct Answer
Feedback
A. 256
B. 512
C. 1024 100% Correct.
D. 2048
Score: 10/10
96.
The ____ keyword used with the setserial utility sets the speed of a serial port to 56KB/s.
Student Response
Value Correct Answer
Feedback
A. spd_vhi
B. spd
C. spd_hi 100% Correct.
D. spd_normal
Score: 10/10
97.
Many Linux problems are posted on Web sites or newsgroups.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
98.
Almost all hardware problems are the result of damaged hardware.
Student Response
Value Correct Answer
Feedback
A. True
B. False 100% Correct.
Score: 10/10
99.
If the / filesystem becomes corrupted, the system is unstable and must be turned off.
Student Response
Value Correct Answer
Feedback
A. True 100% Correct.
B. False
Score: 10/10
100.
Performance problems can only be caused by hardware.