The ________ command allows you to cut or copy text, find and replace text, and use AutoText
A) Insert B) Tools C) Edit D) Help
C
You might also like to view...
A ____________ variable’s scope begins at the variable’s declaration and ends at the end of the method in which the variable is declared.
a. global b. static c. local d. basic
You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system.
a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on the local system? d. How many different login shells are in use on your system? (Hint: Look at the last field.) e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, your system uses shadow passwords and stores the encoded passwords elsewhere. Does your system use shadow passwords?
____________________ arrays require two subscripts to reference the contained elements.
Fill in the blank(s) with the appropriate word(s).
Answer the following statement(s) true (T) or false (F)
1.Information technology-related initiatives are simple and straightforward. 2.The information technology infrastructure library (ITIL) is used to standardize, integrate, and manage information technology (IT) service delivery. 3.A business continuity plan is to be implemented after the occurrence of an interruption in a service. 4.The International Standards Organizational standard ISO 22301:2012 is applicable onlyto nonprofit organizations. 5.The disaster recovery plan must be testedin advance to ensure that it is effective and that people can execute it.