Question

The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo...

The Linux distribution that I currently recommend for testing purposes is __________ .

Debian

Fedora

Gentoo

Slackware

The package format used by Fedora is __________ .

APK

deb

rpm

tgz

The desktop environment that I typically use in Linux is __________ .

Cinnamon

GNOME

KDE

XFCE

The Linux command used to report file system disk space usage is __________ .

df

du

free

top

When working in the command line, which key to you press to retrieve the most recent entered command?

Home

PrtScn

Tab

Up Arrow

When working in the command line, which key to you press to activate command-line completion?

Home

PrtScn

Tab

Up Arrow

The popular, but not user-friendly, text file editor that I highly recommend learning how to use is __________ .

ed

emacs

pico

vi

Consider Lab 1.1 Questions 7.1e and 8.6c ("How can you be sure ...") when answering the following question.

How can you trust unencrypted data sent over the network?

Computers always tell the truth

Magic

Tradition

You can't

Consider Lab 8.4 Question 7.14b ("In what way does this feature make the web server less secure?") when answering the following question.

It is a good idea to use the same password for all your accounts.

True

False

0 0
Add a comment Improve this question Transcribed image text
Answer #1

First Question:

Second option is the correct answer.

The Linux distribution that is recommend for testing purposes is Fedora because of it's simplicity.

Second Question:

Third option is the correct answer.

The package format used by Fedora is RPM.

Third Question:

Second option is the correct answer.

The desktop environment that is typically used in Linux is GNOME. This is the most popular desktop environment in Linux today. It is also the default desktop environment in Ubuntu and Fedora.

Fourth Question:

First option is the correct answer.

The Linux command used to report file system disk space usage is df.

Fifth Question:

Fourth option is the correct answer.

When working in the command line, one may press the up arrow to retrieve the most recent entered command. Alternatively, one can enter F5 to scroll through the recent commands.

Sixth Question:

Third option is the correct answer.

When working in the command line, the Tab key should be pressed in order to activate the command-line completion.

Seventh Question:

First option is the correct answer.

ED is a popular, but not user-friendly, text file editor which is recommended to learn.

Eighth Question:

Fourth option is the correct answer.

You can't trust unencrypted data sent over the network.

Ninth Question:

It is False.

It is a very bad idea to use the same password for all the accounts. Because if any of them is hacked then the security of all of the remaining accounts are compromised.

Hope this helps.

Add a comment
Know the answer?
Add Answer to:
The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo...

    The Linux distribution that I currently recommend for testing purposes is __________ . Debian Fedora Gentoo Slackware OpenWrt is primarily used on embedded devices to route network traffic. True False The package format used by Fedora is __________ . APK deb rpm tgz The desktop environment that I typically use in Linux is __________ . Cinnamon GNOME KDE XFCE The Linux command used to report file system disk space usage is __________ . df du free top When working in...

  • Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following...

    Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following tasks based on the Linux Fundamentals lecture. For this lab, take screenshots for all major steps completed to illustrate that each task was successfully completed the same method as would be used for other labs). Tasks: 1. Create a new user named Billy Bob using the command linter face 2. Add Billy Bob to the sudoers group 3. Update and upgrade your Linux distribution...

  • Please help with this linux lab. Please include screenshots as I keep getting errors when I...

    Please help with this linux lab. Please include screenshots as I keep getting errors when I attempt this lab. Thank you in advance Example 1 Enter the system root directory cd / pwd [this command prints working directory] Here is how to go back to your home directory: cd ~ pwd Example 2 Use the Change directory command cd /labs/lab1/ohio inside the ohio folder use the Touch command to create a file called ohiostate.txt /labs/lab1/ohio/touch ohiostate.txt Use the pwd and...

  • LINUX QUESTIONS (dont have to display output, I will be running these commands myself to check...

    LINUX QUESTIONS (dont have to display output, I will be running these commands myself to check the output) Display the command(s) used to do the following: create an empty file called history by using just a redirection operator. Verify and show. Show/verify all results (i.e., all commands and their corresponding outputs). Wait 1 minute or more and then display the command(s) used to do the following: change the timestamp on the history file you just created. Verify/display the change. Show/verify...

  • could you please help me with this problem, also I need a little text so I...

    could you please help me with this problem, also I need a little text so I can understand how you solved the problem? import java.io.File; import java.util.Scanner; /** * This program lists the files in a directory specified by * the user. The user is asked to type in a directory name. * If the name entered by the user is not a directory, a * message is printed and the program ends. */ public class DirectoryList { public static...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT