You should have read permission for the /etc/passwd file. To answer the fol- lowing questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system.
a. Which character is used to separate fields in /etc/passwd?
b. How many fields are used to describe each user?
c. How many users are on the local system?
d. How many different login shells are in use on your system? (Hint: Look
at the last field.)
e. The second field of /etc/passwd stores user passwords in encoded form.
If the password field contains an x, your system uses shadow passwords
and stores the encoded passwords elsewhere. Does your system use
shadow passwords?
a. colon (:); b. seven; c., d., and e. are system dependent
You might also like to view...
________ is the arrangement and appearance of printed text
Fill in the blank(s) with correct word
If your LAN server is overloaded, which of the following should you not consider (to solve the server problem)?
a. adding one or more additional servers b. upgrading the server's CPU with a faster CPU c. increasing the amount of memory of the server d. increasing the number and speed of hard disks in the server e. replacing the cable with fiber optic cable
Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The manufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network. Which of the following should Joe perform in order to resolve this issue?
A. Load the latest hardware drivers for his USB drive B. Install the latest OS on his computers C. Download the latest playback software for his music files D. Flash the latest firmware for his router
34 17 19 16 10 23 3 What is the output of a postorder traversal of this tree?
a) 3 10 16 23 19 17 34 6 b) 3 6 17 16 10 19 23 c) 6 3 34 17 16 10 19 23 d) 10 16 23 19 17 34 3 6