A daemon ________.
a) remains dormant until the scheduler or another component of the kernel wakes it
b) enforces the system’s security policies
c) spawns all other tasks in the system
d) none of the above
a) remains dormant until the scheduler or another component of the kernel wakes it
Computer Science & Information Technology
You might also like to view...
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?
A) Blowfish B) HMAC C) AES D) RC4
Computer Science & Information Technology
Pits are the reflective surfaces on a CD burned flat by a laser
Indicate whether the statement is true or false.
Computer Science & Information Technology
Common fields can be used to link entities in various types of relationships.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A legend is considered to be a chart index
Indicate whether the statement is true or false
Computer Science & Information Technology