When using the compress utility, each file specified for compression is renamed with what extension?
A. .c
B. .cmp
C. .cpz
D. .Z
Answer: D
You might also like to view...
Why does the secure option in /etc/exports not really provide any security?
What will be an ideal response?
With VTP, where is the VLAN database stored?
a. On the router responsible for maintaining the VTP database. b. On the switch that is known as the stack master. c. On the switch that is configured as the trunk root. d. On the designated VLAN server for the network.
Which of the following statements is not valid?
A. cars = Array.new B. cars = %w(Pinto Corvette Viper) C. cars = ["Pinto", "Corvette", "Viper"] D. None of the above
Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes. Unfortunately, DoomShift has infected the login program on your Unix system and increased its size from 54K bytes to 1,054K bytes; hence, 1,000K bytes of the login program now consists of the DoomShift virus. Barb has a cleanup program, DoomSweep, that is able to prune away the useless bytes of the DoomShift virus, so that in any infected file it will consist of 98% useless bytes and 2% useful bytes.
If you apply DoomSweep to the infected login program, what will be its new size?