What is the UID for the root user?

A. 0
B. 1
C. 100
D. 1000


Answer: A

Computer Science & Information Technology

You might also like to view...

When a business finds that many of its business applications have to be updated or rewritten, it will be better if they replace them with an ERP system.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To improve performance for file and directory access, the virtual file system maintains the _________ and _________ caches.

a) directory entry, inode b) swap, slab c) swap, directory entry d) slab, inode

Computer Science & Information Technology

Which of the following is a disadvantage of Check Point Firewall – 1?

a. It cannot work with multiple operating systems. b. The firewall is dependent on the security of the underlying operating system. c. It cannot protect against common DoS attacks. d. It cannot perform a stateful packet inspection.

Computer Science & Information Technology

Every slide master has at least one layout.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology