Match each term with the correct statement below:

A. command that builds installable RPM packages from pristine sources
B. command used to generate metadata necessary for a package repository
C. command used to modify settings for an existing user account
D. command that creates an encrypted password
E. command used to change the user and group affiliation of a file
F. command used to change permissions of newly created files and directories
G. command that enables the swap partition in the system
H. command that displays PIDs of processes using the specified files or file systems
I. command used to edit the current quota settings for a user or group


A. rpmbuild
B. createrepo
C. usermod
D. mkpasswd
E. chown
F. umask
G. swapon
H. fuser
I. edquota

Computer Science & Information Technology

You might also like to view...

Why don’t we see red, green, and blue spots at each position in our picture?

What will be an ideal response?

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed. 2. Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user. 3. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file. 4. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. 5. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.

Computer Science & Information Technology

When a program lets the user know that an invalid choice has been made, this is known as:

a. input validation b. output correction c. compiler criticism d. output validation e. None of these

Computer Science & Information Technology

Use find with the –exec (Sobell, page 829) criterion to run an ls –l command on the files returned by the find statement in the previous step.

What will be an ideal response?

Computer Science & Information Technology