Question: How many classes of items did the U.S. Supreme Court rule could not be patented?

Answer Options:

two
five
four
three

Answer: three

 

Question: The system administrator is the person responsible for

Answer Options:

Day-to-day operation of a technology system
Writing, enforcing, and reviewing security operating procedures
Upgrading existing technology systems
Developing new technology systems

Answer: Day-to-day operation of a technology system

 

Question: The system security officer is the person responsible for

Answer Options:

Developing new technology systems
Day-to-day operation of a technology system
Writing, enforcing, and reviewing security operating procedures
Upgrading existing technology systems

Answer: Writing, enforcing, and reviewing security operating procedures

 

Question: Common system administration tasks include

Answer Options:

Developing software
Customer service
Purchasing hardware
Updating software

Answer: Updating software

 

Question: System administration provides all of the following except

Answer Options:

Reliable operations
Support services
Project management
Efficient use of the system

Answer: Project management

 

Question: Cloud computing models include all of the following except

Answer Options:

Platform as a service
Infrastructure as a service
Revenue as a service
Software as a service

Answer: Revenue as a service

 

Question: A virtual machine

Answer Options:

Is the display device in virtual reality systems
Is a machine in name only
Is a software container into which an operating system and applications can be installed
Is another name for computers installed inside virtual reality gaming systems

Answer: Is a software container into which an operating system and applications can be installed

 

Question: Writing the necessary data in the appropriate locations on a computer’s hard drive for running a software program is called

Answer Options:

Access control
Configuration
User management
Installation

Answer: Installation

 

Question: Selecting one among many possible combinations of features of a system is called

Answer Options:

Installation
Access control
User management
Configuration

Answer: Configuration

 

Question: Limiting access to information system resources only to authorized users, programs, processes, or other systems is called

Answer Options:

Configuration
Installation
Access control
User management

Answer: Access control

 

Question: In the context of system administration, the operating system is

Answer Options:

Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
Software that manages computer hardware and provides common services to user applications
A text-based program that allows users to interact with the shell
The graphical interface for users to interact with applications

Answer: Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications

 

Question: In the context of system administration, the kernel is

Answer Options:

A text-based program that allows users to interact with the shell
The graphical interface for users to interact with applications
Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
Software that manages computer hardware and provides common services to user applications

Answer: Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications

 

Question: In the context of system administration, the shell is

Answer Options:

The graphical interface for users to interact with applications
A text-based program that allows users to interact with the shell
Software which controls hardware devices, manages memory, and hides underlying physical hardware from user applications
Software that manages computer hardware and provides common services to user applications

Answer: A text-based program that allows users to interact with the shell

 

Question: Common shell programs include

Answer Options:

Born shell, C shell, Born again shell
Korn shell, Born shell, C shell
Bourne shell, C shell, D shell
Bourne shell, C shell, Bourne-again shell

Answer: Bourne shell, C shell, Bourne-again shell

 

Question: The filesystem root is represented in Linux by

Answer Options:

/
.
~
$

Answer: /

 

Question: The current folder is represented in Linux by

Answer Options:

/
~
$
.

Answer: .

 

Question: The parent folder of the current folder is represented in Linux by

Answer Options:

/
~
..
$

Answer: ..

 

Question: The default shell prompt for a regular user in the bash shell is

Answer Options:

/
~
$

Answer: $