Filters
Question type

Study Flashcards

The ability for a computer to increase workload as the number of processors increases is known as _________________________.

Correct Answer

verifed

verified

Which of the following is the greatest expense for companies using Linux?


A) Additional software
B) Operating system cost
C) Hiring people to maintain the Linux system
D) Software upgrades

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.

A) True
B) False

Correct Answer

verifed

verified

What is scalability? How does it relate to clustering?

Correct Answer

verifed

verified

The ability for a computer to increase w...

View Answer

​The QT toolkit is utilized by which GUI environment?


A) ​GNOME
B) ​Enlightenment
C) ​KDE
D) ​Xfce

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What Linux distribution is the most commonly used distribution within organizations today?


A) Mandrake
B) SuSE
C) Debian
D) Red Hat

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

Match each correct item with the statement below.​ a.​Beowulf clustering b.Closed source software​ c.​cracker d.​distribution e.flavor f.​GNU General Public License (GPL) g.​hacker h.​kernel i.​newsgroup j.process -A person who uses computer software maliciously for personal profit.​

Correct Answer

verifed

verified

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:


A) router
B) package manager
C) DBMS
D) tarball

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.

A) True
B) False

Correct Answer

verifed

verified

What two options below are examples of common UNIX flavors?​


A) ​Macintosh OS X
B) ​Red Hat Linux
C) ​OpenSuSE
D) ​HP-UX

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​

A) True
B) False

Correct Answer

verifed

verified

True

Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs).​ Provide examples of each.

Correct Answer

verifed

verified

E-mail is distributed via a network of e-mail servers, also known as Mail Transfer Agents (MTAs).Many MTAs are freely available for Linux, including sendmail, postfix, smail,and exim. Before the user can access his e-mail, it must be downloaded from a MTA; the service that provides this is known as a Mail Delivery Agent (MDA). Linux also provides several of these services; procmail and fetchmail are two of the most common. Finally, the user views her e-mail using a program known as a Mail User Agent (MUA). Common MUAs available for Linux include mutt, pine, printmail, elm, mail, Netscape, and Eudora.

The Linux kernel was developed and released in 1991 by:​


A) ​Richard Stallman
B) ​Linus Torvalds
C) ​Andrew Tannenbaum
D) ​Dennis Ritchie

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Match each correct item with the statement below.​ a.​Beowulf clustering b.Closed source software​ c.​cracker d.​distribution e.flavor f.​GNU General Public License (GPL) g.​hacker h.​kernel i.​newsgroup j.process -​A popular and widespread method of clustering computers together to perform useful tasks using Linux.

Correct Answer

verifed

verified

The iptables software on Linux is an example of what kind of software?​


A) ​Routing
B) ​Anti-virus
C) Firewall​
D) ​Proxy

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​


A) ​Freeware
B) ​Shareware
C) ​GPL
D) ​Artistic

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

D

________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.​

Correct Answer

verifed

verified

Database M...

View Answer

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?


A) major number
B) revision number
C) minor number
D) production kernel number

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What software type is software that is distributed free of charge, but the source code is not available?


A) Open source software
B) Shareware
C) Close source software
D) Freeware

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In what year was the source code for the Linux kernel released?


A) 1987
B) 1990
C) 1991
D) 1993

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer