As a general rule, you should employ extra care when running programs as root.

a. true
b. false


a. true

Computer Science & Information Technology

You might also like to view...

Please describe each of the following: the Quick Access toolbar, Contextual tabs, and the Dialog Box Launcher.

What will be an ideal response?

Computer Science & Information Technology

Describe an example of a DNS spoofing attack.

What will be an ideal response?

Computer Science & Information Technology

Word helps you organize information for your document by providing a(n) ________ view that, by default, uses heading levels

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ bog down a system until its operations are slow or completely stopped and can also carry viruses

Fill in the blank(s) with correct word

Computer Science & Information Technology