Bilgi Teknolojisi Ödev Yardımı
Bilgi teknolojisi atama yardımı, kullanıcılara en ileri bilim ve teknoloji hakkında çok yüksek kalitede bilgi sağlayabilir. Çok detaylı kategorize edilmiş bilgi verileri vardır ve yazılımın kendisinin bunları kullanma izni yoktur, böylece herkes teknolojiden sonuna kadar yararlanabilir.
Alışılmışın dışında teknoloji ve yaşam için de mükemmel bir içerik organizasyonudur. İlginç ve profesyonel içerik üretmek için kullanıcıları ve markaları birbirine bağlar. Teknik bilgiler, derinlemesine incelemeler, beceri ipuçları ve ürün deneyimleri vb. içerir. Grafik, video ve bilgilendirici reklam içerik formatlarına sahiptir ve başlıca yeni medya platformlarını kapsar.
- Interpret the meaning of the following VI editor commands i) ESC ii) u c) Identify the TWO main types of shells and their prompts in Linux environment Virtual terminals are Command Line Interfaces which execute the user commands. (4 mark Demonstrate the usage of the following shortcuts while working on virtual terminal (5 mar i) Ctrl+Alt+Del ii) Tab iii) Ctrl+u iv) Ctrl+w v) Ctrl+k (5 marks)
- QUESTION ONE (30 MARKS) (COMP(LSORY) a) i) Explain TWO components of Linux Operating systems (4 marks) ii) List THREF different modes used with Vì editor (3 marks) hi Differentiate between Soft and Hard links as used in Linux en ironment (4 marks) c) Explain the difference between command-line interface and graphical user interface operating systems. (4 marks) d) Compare Linux and windows operating systems with respect to file systems (5 marks) Command 1. ine interface is widely used in scripting and server administration Discuss TWO of its capabilities (4 marks) Interpret the following commands as used in Linux operating system (6 marks) cat file! file2>file 3
- [a]password [b] PIN [c]biometrics [d] PUK 37. __ compares data with a set of rules or values to determine if the data meets criteria [a] Validation [b]Verification [c]Maintenance [d] Report 38. The special formatting language used to create Web Pages is called: [a]HTML (b] COBOL_{c]Per [d]JAVA 39. Which one is not a major activities of planning phase? [a]Review and approve project requests [b]Form a project development team [c]Identify technical specifications [d] Allocate resources 40. Which one is not a classic programming language? [a]BASIC [b]COBOL [c]RUBY [d]FORTRAN
- [c]Cookies [d]Malware 35. The term "TCP/IP" stands for __ [a]Transmission Contribution protocol/ internet protocol [b] Transmission Control Pro protocol [c] Transaction Control protocol internet protocol [d] Transmission Control protocol 36. This type of authentication reads a unique personal characteristic to identify the use
- [a]ls an application that broadcast information to the server [b]Is a software that can monitor your us on the computer [e]ls a spying software used by detectives only [d]ts a database to record user's information 26. What is Pharming? [a]Steal user data, including login credentials and credit card numbers. [b] A way to seek for user private life [c]The email link you click on directs you to a fake website [d]When you type the cor URL it directs you to a fake website 27. Software that automatically displays advertisements on a computer is called __ [4]Shareware (1)/reeware (C)Adware (6)Malware 28. What kind of malware is used to find out user browsing habits, keystrokes, or passwords for th purposes of identity theft? [a]Trojan virus [b]Adware [c]Virus a) Spyware 29. What is the purpose of Trojan Viruses? [a]Trick people into downloading malicious software [b]Put computers in a network to contr [c]Melt down the computer to a point of no function [d]Spread other malicious programs 30. Animations and interactivity with the user on web page can be done by [a]PHP [b]Java Script [c]Visual Basic[d]CH 31. MAN Stands for __ . [a]Metropolitan Area Network [b]Main Area Network (c)Metropolitan Access Network [d Access Network 32. Which of the following is the smallest network? [a]WAN [b]MAN [c]LAN [d]Wi-Fi 33. __ standard specifies that computers and devices on the network share special signal. [a]TCP/IP [b]Token Ring [c]Etheme [d]RFID 34. It can be a software program or a hardware device that filters all data packets coming t internet, a network, etc.it is known as the __ [a]Antivirus(b]Firewall [e]Cookies [d] Malware 35. The term "TCP/IP"stands for __ [a]Transmission Contribution protocol internet protocol D)Transmission Control Pro protocol [c]Transaction Control protocol/ internet protocol [d/Transmission Control protocol 36. This type of authentication reads a unique personal characteristic to identify the us