Itn 263 Midterm

ITN 261: Network Attacks, Computer Crime and Hacking (W. Pehrsson) NOVA Online Northern Virginia Community College EXAM PASS Midterm Exam (Online) Form 8-13-A NAME: STUDENT #: (Be sure to take a photo-ID with you to the center.). Licensing for the Fox News archive is handled by ITN Source, the archiving division of ITN.38 Television Main article: List of programs broadcast by Fox News Channel FNC presents a variety of programming, with up to 15 hours of live broadcasting per day in addition to programming and content for the Fox Broadcasting Company.

  1. Itn 263 Midterm 2018
  2. Itn 263 Midterm 2019
  • ITN 263 Midterm Exam Review (1) 2 pages. ITN 263 Lab 4 Homework-3-3-16 Northern Virginia Community College Internet Firewalls and e-Commerce ITN 263 - Spring 2016 Register Now ITN 263 Lab 4 Homework-3-3-16. Chapter #1 Quiz.docx Northern Virginia Community College.
  • ITN use Yes 301 75.1. House type Plank 341 85.0. P = 0.001), MUAC (r = 0.263, P Midterm health expenditure framework.
  • In order to standardize the core topics of ITN 260 so that a course taught at one campus is equivalent to the same course taught at another campus, the following student contact hours per topic are required. Each syllabus should be created to adhere as closely as possible to these allocations. Of course, the topics cannot be followed sequentially.
Itn

Last Updated on May 25, 2018 by Google canary portable.

Itn 263 Midterm 2018

Linux Essentials Midterm Exam Modules 1 – 8 Answer

  1. Question ID 42

    To go to the end of an info page, press:

    • END
    • n
    • N
    • ]
  2. Question ID 43

    To go to the next match of a search on a man page, press:

    • ]
    • n
    • N
    • }
  3. Question ID 44

    When interpreting the SYNOPSIS of a command found on a man page, the “ ” means:

    • The items it separates can be used together
    • The items it separates cannot be used together
  4. Question ID 45

    After performing a search, you can use the ____ key to return to a previously found match:

    • n
    • N
    • D
    • U
  5. Question ID 46

    To move a page forward one at a time while viewing a man page, press the following:

    • Spacebar
    • m
    • a
    • Enter
  6. Question ID 59

    The ls command without options or arguments…

    • …lists the contents of the current directory.
    • …prompts for a directory to list.
    • …lists the contents of a user’s home directory.
    • …generates an error as this command requires arguments.
  7. Question ID 68

    Which option can be used with the rm command to prompt before deleting?

    • I
    • -i
    • -P
    • A
  8. Question ID 69

    The rm command can delete multiple files at once.

    True or False?

    • True
    • False
  9. Question ID 70

    Which of the following commands can be used to rename a file?

    • name
    • rn
    • mv
    • cp
  10. Question ID 72

    The touch command can be used to:

    (choose two)

    • Update the time stamp of existing files
    • Create new files
    • Change a file’s name
    • Change ownership of a file
  11. Question ID 88

    You try to compress a file that is already compressed. Which of the following statements is true?

    • The file will not be compressed any further than it already was
    • The file changed while you were compressing it
    • The file will actually be uncompressed
    • The compression algorithm needs to be set to the “currently compressed” mode for it to be compressed further
    • The file will be deleted
  12. Question ID 89

    Which of the following commands can be used to compress a file?

    (choose three)

    • bunzip2
    • zip
    • bzip2
    • cat
    • gzip
  13. Question ID 90

    The three main modes of tar are:

    (choose three)

    • Extract
    • Copy
    • Compress
    • List
    • Create
  14. Question ID 91

    In the command tar –czf foo.tar.gz bar, what is the purpose of the f flag?

    • Tells tar to copy only files, and not directories
    • Tells tar to read from the file that follows the flag
    • Tells tar to print the name of each file as it is processed
    • Specifies extra compression is to be used
    • Tells tar to write to the file that follows the flag
  15. Question ID 92

    Which two commands do the same thing?

    (choose two)

    • tar –xzf foo.tar.gz
    • tar –x foo gzip
    • tar –c foo gzip > foo.tar.gz
    • tar –tzf foo.tar.gz
    • tar –czf foo.tar.gz foo
  16. Question ID 112

    Which option for the wc command will print the total number of words in a file?

    • -l
    • -L
    • -w
    • -C
  17. Question ID 113

    Which command can be used to print line numbers?

    • num
    • ln
    • nl
    • sort
  18. Question ID 114

    The command echo “text” > file.txt will create file.txt if it does not already exist.

    True or False?

    • True
    • False
  19. Question ID 115

    The command echo “text” > file.txt will not overwrite file.txt if it already exists.

    True or False?

    • True
    • False
  20. Question ID 116

    The command echo “text” >> file.txt will not overwrite file.txt if it already exists.

    True or False?

    • True
    • False
  21. Question ID 262

    Software is backward compatible if:

    • It still supports old file formats or applications
    • If the next version still works the same way
    • People still use old versions
    • It works across Linux/Mac/Windows
    • It can be upgraded without downtime
  22. Question ID 263

    Apple’s OS X is:

    (choose three)

    • Derived from Linux
    • Only compatible with Apple hardware
    • Able to natively run Windows binaries
    • Derived from FreeBSD
    • Certified as UNIX compatible
    • Primarily used to manage network services
  23. Question ID 264

    Microsoft Windows:

    (choose three)

    • Has a short maintenance cycle
    • Comes in desktop and server variants
    • Has built in virtualization
    • Has a new desktop version every year.
    • Has a Linux compatibility mode
    • Has powerful scripting capabilities
  24. Question ID 265

    Other commercial Unixes:

    (choose two)

    • Are almost obsolete
    • Are tied to their vendor’s hardware
    • Use completely different commands than Linux
    • Are UNIX certified
    • Do not run the GNU tools
  25. Question ID 266

    When choosing a distribution of Linux, you should consider:

    (choose five)

    • Which management tools are provided by the distribution
    • Which distributions are supported by the software you need to run
    • Popularity on social media.
    • The maintenance cycle of the distribution
    • If you need support on the distribution itself
    • Whether or not the distribution is under active development
  26. Question ID 302

    The difference between the GPL and LGPL licenses are:

    • LGPL allows you to distribute the software in binary-only form
    • LGPL is shorter than GPL
    • LGPL allows linking to non GPLed software
    • LGPL applies to web services
    • LGPL was made by the OSI while GPL was made by the FSF
  27. Question ID 303

    Permissive free software licenses:

    (choose three)

    • Can allow software to be used inside closed source software
    • Are not approved by the OSI
    • Are not approved by the FSF
    • Include the GPLv2 and BSD
    • Don’t have a copyleft provision
  28. Question ID 304

    The Creative Commons version of Public Domain licensing is:

    • Attribution-NonCommercial-ShareAlike
    • Attribution-NonCommercial
    • NoAttribution-ShareAlike
    • No Rights Reserved
    • Attribution
  29. Question ID 305

    Your company makes a hardware firewall that runs a custom Linux kernel. What are your obligations under GPLv2?

    • There are no requirements
    • You must make the source to your custom web interface available
    • You must make your hardware designs available
    • You must make the source to your kernel available
    • You must ensure your custom kernel runs on a regular Intel machine
  30. Question ID 306

    Participating in open source projects can improve your technical skills, even if it is not your day job.

    True or False?

    • True
    • False
  31. Question ID 322

    What are tradeoffs of increasing the level of privacy you have in your web browser?

    (choose two)

    • You may get viruses
    • Sites may not work properly
    • Websites may load slower
    • Images won’t load properly
    • You may have to explicitly permit some cookies to be saved
  32. Question ID 323

    Which of the following is a tool that helps you anonymize your Internet browsing?

    • CookieCleaner
    • Web proxy
    • The onion router
    • AnonFirefox
    • iptables
  33. Question ID 324

    Social network “like” buttons can track your activity across the Internet.

    True or False?

    • True
    • False
  34. Question ID 325

    Which of the following are properties of a strong password?

    (choose three)

    • A mix of upper and lower case
    • Long so that it can be reused on multiple sites
    • Includes symbols
    • At least 10 characters long
    • Based on easy to remember items like birthdays
  35. Question ID 326

    What can be done to prevent remote people from running programs on your computer?

    (choose two)

    • Don’t use wireless networks – only wired
    • Use strong passwords on all user accounts
    • Turn on a firewall
    • Block third party cookies
    • Block all cookies
  36. Question ID 343

    The acronym CLI stands for:

    • Computer Link Interpreter
    • Command Line Interpreter
    • Computer Line Interface
    • Command Line Interface
  37. Question ID 344

    Traditional UNIX command options used a single dash, like -a; _______ command options use two dashes like –all.

    • LINUX
    • Kernel
    • GNU
    • shell
  38. Question ID 345

    The acronym GNU stands for:

    • Gnu’s Not Unix
    • Go Next Unit
    • Gnu’s Nearly Unix
    • Good News Unix
  39. Question ID 346

    What one character treats the character that follows it as if it was surrounded by single quotes?

    • /
    • %
    • #
  40. Question ID 347

    The main purpose of using glob characters is to be able to provide a command a list of filenames.

    True or False?

    • True
    • False

Itn 263 Midterm 2019

Class #SectionCreditsDayTimeStartLocationMode
21875ITN 263-30YW4
9:00 a.m.-11:40 a.m.
2021-06-01Virtual and ELI - Real TimeCV
Classes meet in real-time via Zoom on the days and times listed on your class schedule. Your instructor will facilitate live online lectures and discussions. Reliable internet access and a Zoom-capable device are required.
Hybrid Course
13614ITN 263-50YW4
6:00 p.m.-10:30 p.m.
2021-05-17Virtual and ELI - Real TimeCV
Classes meet in real-time via Zoom on the days and times listed on your class schedule. Your instructor will facilitate live online lectures and discussions. Reliable internet access and a Zoom-capable device are required.
Hybrid Course
13525ITN 263-E40W4
0:00 a.m.-0:00 a.m.
2021-05-17Virtual and ELIWW
Online course offered by NOVA Online. This is a fast-paced accelerated 1st 8-week course. Starts May 17.
14058ITN 263-E55W4
0:00 a.m.-0:00 a.m.
2021-06-14Virtual and ELIWW
Online course offered by NOVA Online. This is a fast-paced accelerated 2nd 8-week course. Starts June 14.