Most commands on Linux can display information on their usage. How can this information typically be displayed?
A.
By running the command with the option /? or /??.
B.
By running the command with the option ?! or ?=!.
C.
By running the command with the option /doc or /documentation.
D.
By running the command with the option -h or --help.
E.
By running the command with the option -m or --manpage.
By running the command with the option -m or --manpage.
Why are web browser cookies considered dangerous?
A.
Cookies support identification and tracking of users.
B.
Cookies are always public and accessible to anyone on the internet.
C.
Cookies consume significant amounts of storage and can exhaust disk space.
D.
Cookies store critical data which is lost when a cookie is deleted.
E.
Cookies can contain and execute viruses and malware.
Cookies support identification and tracking of users.
Which of the following statements is true about Free Software?
A.
It is developed by volunteers only.
B.
It may be modified by anyone using it.
C.
It must always be available free of charge.
D.
It only runs on Linux.
E.
It is only distributed as a compiled binary
It may be modified by anyone using it.
Which of the following are typical services offered by public cloud providers? (Choose three correct answers.)
A.
Platform as a Service(PaaS)
B.
Infrastructure as a Service(IaaS)
C.
Internet as a Service(IaaS)
D.
Graphics as a Service (GaaS)
E.
Software as a Service (SaaS)
Platform as a Service(PaaS)
Infrastructure as a Service(IaaS)
Software as a Service (SaaS)
Which of the following commands extracts the contents of the compressed archive file1.tar.gz?
A.
tar -czf file1.tar.gz
B.
ztar file1.tar.gz
C.
tar -xzf file1.tar.gz
D.
tar --extract file1.tar.gz
E.
detar file1.tar.gz
tar -xzf file1.tar.gz
Page 5 out of 16 Pages |
Previous |