1. True or False: Hard disk devices that use flash memory chips for storage is called a Solid-State Drive (SSD)?
2. True or False: NTFS is a recognized Linux file system?
3. The software that runs on an Operating System and provides the user with specific functionality is called?
a. Application
b. Tracert
c. Ping
d. Kernel
4. This command is used to view a list of running processes.
a. FORK
b. JOBS
c. LIST
d. SHOW
Question 1: True Question 2: False Question 3: a. Application Question 4: b. JOBS
1. True or False: Hard disk devices that use flash memory chips for storage is called...
true or false 1. Speeding up your system today can be by Performing the system maintenance and adding more memory? 2. Storage devices are identified by names and/or letters? 3. Fixed media faster and less expensive than removable media? 4. Portable hard drive systems do not offer large storage capacities and portability? 5. Physical file representation is the way data stored on the storage media as viewed by the computer? 6. Digital camera Images cannot be transferred to a PC...
QUESTION 1 Virtual Memory is a technique that makes excellent use of available space on a hard drive, to temporarily store data that would otherwise require massive amounts of main memory (RAM). True False 2 points QUESTION 2 Which of these allocation schemes require the entire program to be loaded before execution can begin? I. Segmented/Demand paged II. Paged III. Segmented IV. Demand paged 2 points QUESTION 3 Select the advantages of the First-In First-Out page replacement policy...
Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...
TRUE/FALSE QUESTIONS: Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...