Describe two ways to find out who is logged in on some of the other machines attached to your network.

What will be an ideal response?


Use rsh, ssh, or telnet to connect to and run w or who on each host.
Use finger.
Log in on the console of each host and run w or who.

Computer Science & Information Technology

You might also like to view...

If an expression contains logical operators, comparison operators, and arithmetic operators, ____.

A. the comparison operators are evaluated first B. the arithmetic operators are evaluated first C. the logical operators are evaluated first D. the operators are evaluated in order

Computer Science & Information Technology

The each method automatically iterates once for each item stored in the array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A new color can be added to the ____________________ panel by sampling a color from the image.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The ____ option confines editing to the opaque portions of a layer.

A. Lock all B. Lock image pixels C. Lock position D. Lock transparent pixels

Computer Science & Information Technology