You use commands on the ____________________  menu to add and delete table rows and columns.

Fill in the blank(s) with the appropriate word(s).


Modify

Computer Science & Information Technology

You might also like to view...

When using a pointer variable, the value that is obtained is always found by first going to the pointer for an address; this is called indirect addressing.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A user reports that icons appeared on the desktop after visiting a website. The technician reviews the system, and identifies that the system has malware. Which of the following procedures would be performed NEXT?

a. Quarantine infected system b. Scan the system for malware, and verify security updates are current c. Report the issue to the information security officer. d. Disable System Restore e. Educate the user on using the internet safely.

Computer Science & Information Technology

Assume permissions on a file allow you to write to the file but not to delete it.

a. Give a command to empty the file without invoking an editor. b. Explain how you might have permission to modify a file that you cannot delete.

Computer Science & Information Technology

Your job is to examine the access lists to see whether they meet the stated goals. You are to make corrections to the configurations as needed. The trouble ticket for this is shown as follows. Investigate the access list configurations, make corrections or modifications to the network as necessary, and report your findings. Use access list 1 for standard and 101 for extended when numbering your access lists.

The objective of this exercise is to verify that the access lists provided on Routers R1, R2, R3, and
R4 have been properly configured to meet the following stated goals.
Access list goals:
? Only HTML traffic can access the web server through the 192.168.2.2 interface on Router R2.
The rest of the server subnet has no restrictions.
? Only the Finance department subnet (192.168.1.0) can access the financial database subnet.
? The Lobby Kiosk PC, connected to the Fa0/0 interface on Router R3, can only access the web
server; the rest of the kiosk subnet (192.168.3.0) has no restrictions.

PC Assignments
PC1: Finance department
IP address: 192.168.1.2/24
Gateway: 192.168.1.1

PC2: Web server
IP address: 192.168.2.2/24
Gateway: 192.168.2.1

PC3: Lobby kiosk
IP address: 192.168.3.2/24
Gateway: 192.168.3.1

PC4: Financial database
IP address: 192.168.4.2/24
Gateway: 192.168.4.1

You can find the problems in this lab by examining the network configuration and looking for
errors. The topology for t

Computer Science & Information Technology