Match each term with the correct statement below.

A. Provides a naming system for shared resources on a UNIX/Linux network
B. A path in the Universal Naming Convention (UNC) format
C. Control access to an object, such as a folder or file
D. An ACL that is configured by a server administrator or owner of an object
E. An interface between the user and the operating system
F. A main container (top-level folder) in Active Directory that holds links to shared folders that can be accessed from the root
G. Contains information used to audit the access to an object
H. A program that reads lines of program code in a source file and converts the code into machine-language instructions the computer can execute
I. Contain program code that can be called and run by Windows applications


A. Network Information Services
B. folder target
C. permissions
D. discretionary ACL
E. shell
F. namespace root
G. system control ACL
H. compiler
I. Dynamic-link library (DLL) files

Computer Science & Information Technology

You might also like to view...

The bits in the result of an expression using the _______ operator are set to one if the corresponding bits in each operand are set to one. Otherwise, the bits are set to zero.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Impress allows the user to add effects that display when text or graphics enter a slide

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ Pane enables you to move through a long document more easily

Fill in the blank(s) with correct word

Computer Science & Information Technology

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

A. cybercrime protocols B. codes of conduct C. anithacking rules D. school rules

Computer Science & Information Technology