For Module 4 Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Rey5
R
Rey5
Community Contributor
Quizzes Created: 1 | Total Attempts: 157
| Attempts: 157 | Questions: 59
Please wait...
Question 1 / 59
0 %
0/100
Score 0/100
1. Extra Credit - Ubuntu Linux and other distributions comes with bundled programs that are referred to as_____

Explanation

Ubuntu Linux and other distributions come with bundled programs that are referred to as "packages". These packages contain software applications, libraries, and other resources that can be easily installed, updated, and managed on the system. These packages are usually in a compressed format and include all the necessary files and instructions for the software to function properly. By using packages, users can conveniently install and uninstall software, ensuring that their system remains organized and up to date with the latest software releases.

Submit
Please wait...
About This Quiz
For Module 4 Exam - Quiz

This 'For Module 4 exam' quiz assesses knowledge on Ubuntu Linux installation, command line operations, user permissions, and system sensitivity. It is designed for learners aiming to master... see moreadministrative tasks and understand Linux's fundamental behaviors. see less

2. When you view the network connection setting in Windows, Linux, and Mac OS X you will see settings for two versions of IP. What are these versions? (2 answers)

Explanation

The network connection settings in Windows, Linux, and Mac OS X display settings for two versions of IP: IPV4 and IPV6. IPV4 is the older version and is still widely used, while IPV6 is the newer version that was developed to address the exhaustion of IPV4 addresses. The correct answer provided lists both versions in the correct order: IPV4, IPV6.

Submit
3. Mac OS X comes preinstalled on a new Mac, but the first time you start it up, you must provide information, user preference information (user name, password, and other information) to complete the setup and configuration

Explanation

When you start up a new Mac for the first time, you are required to provide information such as your user name, password, and other preferences in order to complete the setup and configuration. This information is necessary to personalize your Mac and ensure that it functions properly according to your preferences. Therefore, the statement "Mac OS X comes preinstalled on a new Mac, but the first time you start it up, you must provide information, user preference information (user name, password, and other information) to complete the setup and configuration" is true.

Submit
4. Non-hardware settings common to all users of a computer are located in the System preferences pane.

Explanation

The System preferences pane is where non-hardware settings that are applicable to all users of a computer can be found. This implies that these settings are not specific to any particular user and can be accessed by anyone using the computer. Therefore, the statement that non-hardware settings common to all users of a computer are located in the System preferences pane is true.

Submit
5. Exposé lets you assign actions to certain keys or mouse buttons that will expose all open windows at once, just application windows, or the desktop.

Explanation

Exposé is a feature on certain operating systems that allows users to easily view and manage their open windows. By assigning actions to specific keys or mouse buttons, users can quickly expose all open windows, only application windows, or even just the desktop. This feature enhances productivity and makes it easier to navigate between different windows and applications.

Submit
6. Where Windows has a menu bar at the top of every open window, Mac OS X has a menu bar at the top of the screen containing the menu for the current (active) window.

Explanation

The explanation for the correct answer, which is True, is that in Mac OS X, the menu bar is located at the top of the screen and it contains the menu options for the currently active window. This is different from Windows, where the menu bar is located at the top of each individual open window.

Submit
7. Linux is case sensitive.

Explanation

Linux is case sensitive, which means that it distinguishes between uppercase and lowercase letters. This is important to keep in mind when working with file names, commands, and programming languages on a Linux system. For example, a file named "myfile.txt" is considered different from "MyFile.txt" in Linux. This case sensitivity allows for more precision and flexibility in managing files and executing commands.

Submit
8. Netscape Navigator, by Mosaic Communications, was a free Web browser that inspired Microsoft to develop their own Web browser

Explanation

The statement is true because Netscape Navigator, developed by Mosaic Communications, was indeed a free web browser that had a significant impact on the development of web browsers. Its popularity and success inspired Microsoft to create their own web browser, Internet Explorer, in response. This ultimately led to the "browser wars" between Netscape and Microsoft, shaping the early landscape of the internet.

Submit
9. The Ubuntu shell command, sudo, does not require the root password, even thought it will give you temporary root account privileges for administrative tasks

Explanation

The explanation for the given correct answer is that the sudo command in Ubuntu allows users to execute commands with administrative privileges without needing to know the root password. This is because sudo is configured to grant specific users or groups access to certain administrative tasks. When a user runs a command with sudo, they are temporarily elevated to the root account, allowing them to perform administrative tasks. This adds an extra layer of security by reducing the need for users to have knowledge of the root password, while still allowing them to perform necessary administrative actions.

Submit
10. Linux is so secure that you do not need to create a password for your user account

Explanation

The statement that Linux is so secure that you do not need to create a password for your user account is false. In fact, it is highly recommended to create a password for your user account in Linux to ensure the security of your system. A password acts as a barrier to unauthorized access and helps protect your personal data and sensitive information from being compromised. Without a password, anyone could potentially gain access to your account and manipulate or steal your data. Therefore, it is essential to set up a strong password for your user account in Linux.

Submit
11. What key combination will quickly open the OS X search utility?

Explanation

The key combination Command-space bar is the correct answer because it is the shortcut to quickly open the OS X search utility. By pressing Command and the space bar simultaneously, the search utility will be launched, allowing users to search for files, applications, and perform various other tasks on their Mac.

Submit
12. The Keyboard preferences pane includes a list of keyboard shortcuts.

Explanation

The statement is true because the Keyboard preferences pane is a feature in the settings of a computer or device that allows users to customize their keyboard settings. This includes options to modify or create keyboard shortcuts, which are combinations of keys that perform specific actions or commands. Therefore, the Keyboard preferences pane does include a list of keyboard shortcuts.

Submit
13. The Apple II computer was the first personal computer with a graphical user interface (GUI).

Explanation

The Apple II computer was not the first personal computer with a graphical user interface (GUI). The first personal computer with a GUI was the Xerox Alto, which was developed in the 1970s. The Apple II, released in 1977, did not have a GUI but instead used a command-line interface. It was not until the release of the Apple Macintosh in 1984 that Apple introduced a personal computer with a GUI.

Submit
14. Any user can shut down Linux from the command prompt.

Explanation

This statement is not true. Shutting down Linux from the command prompt typically requires root or administrative privileges. Regular users do not have the necessary permissions to initiate a system shutdown.

Submit
15. The first time you power on a new Mac this program automatically runs.

Explanation

When you power on a new Mac for the first time, the Mac OS X Setup Assistant automatically runs. This program helps you set up your Mac by guiding you through the initial setup process. It allows you to customize various settings, such as language preferences, network connections, and user accounts. The Setup Assistant is designed to make the initial setup of your Mac quick and easy, ensuring that you can start using your new device without any hassle.

Submit
16. Verify your computer's IP configuration with this utility

Explanation

IPCONFIG is the correct answer because it is a utility command used to verify the IP configuration of a computer. It displays information about the computer's IP address, subnet mask, default gateway, and other network settings. By running IPCONFIG, users can check if their computer is properly connected to the network and troubleshoot any network connectivity issues.

Submit
17. What key combination will cut a selected item?

Explanation

The key combination "Command-X" is used to cut a selected item. Cutting an item removes it from its current location and stores it in the clipboard, allowing it to be pasted elsewhere. This is a common command used in various applications and operating systems to move or transfer data quickly.

Submit
18. What OS X feature would you turn on to encrypt your home folder?

Explanation

File Vault is the correct answer because it is an OS X feature that allows users to encrypt their home folder. By enabling File Vault, all the data in the home folder is encrypted using XTS-AES-128 encryption with a user's login password as the encryption passphrase. This provides an added layer of security and protection for sensitive files and personal information stored in the home folder.

Submit
19. This type of Mac OS X user account can change all system preferences settings and install software in the main application and library folders. It can also create, modify, and delete user accounts. What type of account is this?

Explanation

An administrator account in Mac OS X has the highest level of privileges and permissions. This type of account can change system preferences settings, install software in the main application and library folders, and create, modify, and delete user accounts. It has full control over the system and is responsible for managing and maintaining it.

Submit
20. What type of OS is Darwin, the core of Mac OS X?

Explanation

Darwin, the core of Mac OS X, is based on the UNIX operating system. UNIX is a powerful and versatile operating system known for its stability, security, and scalability. Mac OS X, being built on top of Darwin, inherits these qualities, making it a reliable and robust operating system.

Submit
21. Launch this from the Utilities folder and work at Mac OS X's BASH shell, complete with the prompt

Explanation

The correct answer is "Terminal" because it is a program that allows users to access the command line interface on a Mac computer. It is typically located in the Utilities folder and provides a BASH shell prompt, where users can execute various commands to interact with the operating system and perform tasks.

Submit
22. Apple does not recommend installing antivirus software on a Mac OS system.

Explanation

Apple actually recommends installing antivirus software on a Mac OS system. While Macs are generally less susceptible to viruses compared to other operating systems, they are not completely immune. Antivirus software can provide an extra layer of protection against malware, phishing attacks, and other security threats. It is always better to be safe and take precautions to ensure the security of your device and data.

Submit
23. Internet Explorer and FireFox are examples of clients for this service

Explanation

Internet Explorer and Firefox are examples of clients for the World Wide Web service. The World Wide Web is a system of interlinked hypertext documents accessed through the internet. Clients, such as web browsers like Internet Explorer and Firefox, are used to access and view these documents. This service allows users to navigate and interact with websites, access information, and communicate through various web-based applications.

Submit
24. In most cases, this should not be turned on because it bypasses a very important security feature.

Explanation

Automatic Login should not be turned on in most cases because it bypasses a very important security feature. When Automatic Login is enabled, the system automatically logs in to a user account without requiring a password. This means that anyone who has physical access to the computer can easily access all the user's files and applications without any authentication. This poses a significant risk to the security and privacy of the user's data. Therefore, it is recommended to disable Automatic Login to ensure better security.

Submit
25. The Dock icon that appears to  be a box filled with gears opens the Utilities folder.

Explanation

The Dock icon that appears to be a box filled with gears does not open the Utilities folder. This is incorrect because the Dock icon that resembles a box filled with gears actually opens the Applications folder, not the Utilities folder.

Submit
26. If an item has disappeared from the Finder Sidebar it will reappear the next time you restart OS X.

Explanation

The given statement is false. If an item has disappeared from the Finder Sidebar, it will not automatically reappear the next time you restart OS X. The Finder Sidebar is a customizable feature in OS X, and any changes made to it, such as removing an item, will persist even after restarting the system. To bring back a disappeared item in the Finder Sidebar, you would need to manually add it back.

Submit
27. At the Linux command shell, when an ordinary user is logged in the prompt ends with which of the following characters?

Explanation

In Linux command shell, the prompt ending with the character "$" indicates that an ordinary user is logged in. The "$" symbol is typically used to represent a regular user's command prompt, while the "#" symbol is used for the root user or superuser. The "?" and ">" symbols are not commonly used as prompt endings in Linux command shell.

Submit
28. Using this feature of Mac OS X, you can have separated sets of open programs windows for the desktop. It is a handy way to organize different projects or to keep your personal work separate from your professional work.

Explanation

Spaces is the correct answer because it is a feature in Mac OS X that allows users to have separate sets of open program windows for their desktop. This feature is useful for organizing different projects or keeping personal and professional work separate.

Submit
29. This all-powerful account is disabled by default and Apple has tried to ensure that you should never, or rarely, need to use it.

Explanation

The correct answer is "root". Root is an all-powerful account that is disabled by default by Apple. They have made efforts to ensure that users rarely need to use it. Root is a super user account that has unrestricted access and control over the operating system and all its resources.

Submit
30. Which of the following choices will give you a clean installation of Ubuntu Linux?

Explanation

Selecting the option "Erase and use the entire disk" will result in a clean installation of Ubuntu Linux. This option erases all existing data on the disk and allocates the entire disk space for installing Ubuntu, ensuring a fresh and clean installation without any remnants of previous operating systems or data.

Submit
31. Use this Finder view if you need to see a wealth of information about files and folders at a glance, including date modified, size, and kind of object (folder or type of file).

Explanation

The correct answer is "List" because the question is asking for a view that provides detailed information about files and folders, including date modified, size, and type. The List view displays this information in a tabular format, allowing users to easily compare and sort files based on different criteria. The other options, such as Icon, Column, and Cover Flow, do not provide the same level of detailed information in a compact and organized manner.

Submit
32. When you start Finder from the Dock what folder does it open by default?

Explanation

When you start Finder from the Dock, it opens the user's home folder by default. The user's home folder is the main folder associated with the user account on a Mac. It contains various subfolders such as Documents, Downloads, Music, Pictures, etc. Opening the user's home folder allows easy access to personal files and folders specific to that user.

Submit
33. This is the one place in Linux where an ordinary user has full control.

Explanation

The $ prompt is the correct answer because it refers to the command line prompt in Linux. When a user sees the $ prompt, it means that they have access to the command line interface and can execute commands with full control over the system. The $ prompt allows the user to navigate the file system, run programs, and perform various tasks in Linux.

Submit
34. This is the main file management tool in the Mac OS X desktop

Explanation

The Finder is the main file management tool in the Mac OS X desktop. It allows users to navigate through their files and folders, search for specific items, organize files into folders, and perform various file management tasks such as copying, moving, and deleting files. The Finder provides a graphical interface that allows users to easily interact with their files and access different features and settings within the Mac operating system. It is an essential tool for managing and organizing files on a Mac computer.

Submit
35. What important Apple product (with a GUI) was introduced in 1984?

Explanation

The correct answer is Macintosh. In 1984, Apple introduced the Macintosh, an important product with a graphical user interface (GUI). The Macintosh was a groundbreaking computer that popularized the use of GUIs and revolutionized the personal computer industry. It featured a mouse and a graphical operating system, making it more user-friendly and accessible to a wider audience. The Macintosh played a significant role in shaping the future of computing and establishing Apple as a leading technology company.

Submit
36. From this menu you can shut down your computer, access configuration settings, update software, put your Mac to sleep, restart, log out, access recent items, and learn about your Mac

Explanation

The correct answer is "System Preferences" because it is the menu that allows the user to perform various actions such as shutting down the computer, accessing configuration settings, updating software, putting the Mac to sleep, restarting, logging out, accessing recent items, and learning about the Mac. This menu provides a centralized location for managing and customizing the settings and preferences of the Mac operating system.

Submit
37. What folder contains the Utilities folder?

Explanation

The Utilities folder is typically found within the Applications folder. This folder contains various utility applications that are useful for performing different tasks on a computer.

Submit
38. Where can you configure the Mac OS X Firewall settings?

Explanation

The correct answer is the Security Preferences pane. This is where users can configure the Mac OS X Firewall settings. The Security Preferences pane allows users to enable or disable the firewall, as well as customize specific settings such as blocking incoming connections and allowing specific apps or services to bypass the firewall. It provides a centralized location for managing the firewall settings on a Mac computer.

Submit
39. How can you quickly open an extensive list of installed hardware and software in Mac OS X?

Explanation

To quickly open an extensive list of installed hardware and software in Mac OS X, you can go to the Apple menu, then select "About This Mac", and finally click on "More Info". This will provide you with detailed information about the hardware and software installed on your Mac.

Submit
40. Use this preference pane to configure automatic system backups for your iMac.

Explanation

The correct answer is Time Machine because it is a feature in macOS that allows users to automatically back up their iMac. It is a preference pane where users can configure and manage the settings for their automatic system backups. Time Machine is a reliable and user-friendly tool for ensuring that important data and files are regularly backed up and can be easily restored if needed.

Submit
41. Everything is Linux is a __________

Explanation

In Linux, everything is considered a file, including devices, directories, and regular files. This concept is known as the "everything is a file" philosophy. It means that all resources in the Linux operating system can be accessed and manipulated using file system operations. This design simplifies the way programs interact with different resources, as they can use the same set of file system functions to perform operations on various entities. Therefore, the correct answer is "file."

Submit
42. This feature of the Mac OS X desktop allows you to select an open application from an array of miniature graphical windows

Explanation

Exposé is a feature in Mac OS X that allows users to view all open application windows in a thumbnail view, making it easier to select and switch between different applications. It provides a quick and efficient way to navigate through multiple windows and improve productivity. The other options listed - Apple menu, dock, and Finder - are not specifically related to this feature of selecting open applications from miniature graphical windows.

Submit
43. What is the name of the page of the Mac OS X installer that request your personal information; you can skip it, even though it prompts you to go back and complete it?

Explanation

The correct answer is "Registration Information." During the installation process of Mac OS X, there is a page that asks for personal information, such as name, address, and email. However, it is not mandatory to fill out this information, and users have the option to skip it. Even though the page prompts users to go back and complete it, they can proceed without providing the requested information. This page is referred to as "Registration Information."

Submit
44. Test the ability to communicate with another host over a TCP/IP network with this simple utility that sends a small request to an IP address simply asking for a response

Explanation

The correct answer is PING. PING is a utility that tests the ability to communicate with another host over a TCP/IP network. It sends a small request to an IP address and waits for a response. PING is commonly used to check the connectivity between two devices and to measure the round-trip time for packets to travel from the source to the destination and back.

Submit
45. When using Web mail, you must use e-mail client software.

Explanation

This statement is false. When using Web mail, you do not need to use e-mail client software. Web mail is a type of e-mail service that allows users to access their e-mail accounts through a web browser. It eliminates the need for e-mail client software as it provides a web-based interface for sending, receiving, and managing e-mails. Users can access their e-mail accounts from any device with an internet connection without the need for additional software installations.

Submit
46. You can quickly launch programs that have an icon sitting on this GUI object on the Mac OS X desktop

Explanation

The correct answer is "Dock". The Dock is a GUI object on the Mac OS X desktop that allows users to quickly launch programs. It displays icons of frequently used applications, making it easy for users to access them with just a single click. By clicking on the icon of a program in the Dock, users can open the application without having to search for it in other menus or folders.

Submit
47. This Ubuntu Linux shell command temporarily gives the currently logged on user root account privileges for administrative tasks

Explanation

The "su" command in Ubuntu Linux allows the currently logged on user to temporarily switch to the root user, giving them root account privileges for administrative tasks. This can be useful when performing tasks that require elevated permissions, such as installing software or modifying system files.

Submit
48. You have forgotten the password for your account on your MacBook Pro with Mac OS X. You are locked out of your computer. Which of the following will allow you to reset the password so that you can log on again?

Explanation

The OS X Installation DVD will allow you to reset the password on your MacBook Pro. By booting your computer from the DVD, you can access the password reset utility and create a new password, allowing you to log on to your account again.

Submit
49. If you select the Firewall setting to block all incoming connections you will not be able to browse the Web because web pages will not be downloaded to your computer.

Explanation

If you select the Firewall setting to block all incoming connections, it will only prevent unauthorized access to your computer from external sources. However, it will not affect your ability to browse the web because the firewall does not block outgoing connections. Therefore, you will still be able to download web pages to your computer and browse the internet.

Submit
50. Discover the bottleneck between your computer and another using this utility.

Explanation

TRACERT is a utility that helps identify the bottleneck between a computer and another by tracing the route taken by data packets between them. It shows the IP addresses of the routers through which the packets pass, along with the response times at each hop. By analyzing this information, one can determine the specific network segment or device causing the delay or congestion, allowing for targeted troubleshooting and optimization.

Submit
51. WiFi is an example of wireless wide area network (WWAN) technology.

Explanation

WiFi is not an example of wireless wide area network (WWAN) technology. WiFi, also known as wireless local area network (WLAN), is a technology that allows devices to connect to a local network wirelessly within a limited range. WWAN, on the other hand, refers to wireless networks that cover large areas, such as cellular networks.

Submit
52. If you have an Internet Connection, what message box will appear soon after you complete a new installation?

Explanation

After completing a new installation with an Internet connection, a message box appearing with "Software Update" is expected. This message box prompts the user to update the software to the latest version available. This is a common practice in many software installations to ensure that the user has the most up-to-date and secure version of the software.

Submit
53. You have the appearance preferences pane open; which of the following will quickly return you to the main System Preferences window?

Explanation

The "Show all button" will quickly return you to the main System Preferences window. This button is typically located at the top left corner of the appearance preferences pane and is used to navigate back to the main System Preferences window, where you can access other preference panes and settings.

Submit
54. This service may be the most important service on the internet because many people who have no other use for internet use it.

Explanation

E-mail is the correct answer because it is a service that is widely used by people who may not have any other use for the internet. It allows individuals to send and receive messages, making it an essential communication tool for both personal and professional purposes. Unlike other services like the World Wide Web, FTP, or IMAP, e-mail is accessible to a larger population and serves as a primary means of communication for many individuals.

Submit
55. If you work with data that you must protect from snooping, turn this feature on so that clever hackers cannot access the swap file in an effort to read confidential data.

Explanation

The correct answer is "Master Password." This is because a master password is used to protect sensitive data from unauthorized access. In this context, if you work with data that needs to be protected from snooping, enabling the master password feature would prevent clever hackers from accessing the swap file and reading confidential information.

Submit
56. This Mac OS X feature is a secure database of user's passwords.

Explanation

Secure Virtual Memory is a feature in Mac OS X that ensures the confidentiality of user's data by encrypting it when it is stored in the computer's virtual memory. This prevents unauthorized access to sensitive information such as passwords. While Keychain is a password management system, File Vault is a disk encryption program, and Master Password is a term not directly related to this feature. Therefore, Secure Virtual Memory is the correct answer as it specifically addresses the secure storage of passwords in the virtual memory of Mac OS X.

Submit
57. Check the version of MAC OS X by opening this desktop object and selecting About This Mac

Explanation

To check the version of MAC OS X, you need to open the Apple menu, which is located on the top left corner of the screen. From there, you can select the "About This Mac" option, which will provide you with information about the current version of the operating system. The other options mentioned, such as Dock, Exposé, and Finder, are not relevant to checking the version of MAC OS X.

Submit
58. If you have this set, you can use it to unlock any account on a computer and access any encrypted home folder when a user forgets a login password.

Explanation

File Vault is the correct answer because it is a feature in macOS that allows users to encrypt their entire home folder, providing an additional layer of security for their data. When a user forgets their login password, having File Vault enabled on their computer ensures that their encrypted home folder remains inaccessible, protecting their sensitive information. Therefore, File Vault is the set that can be used to unlock any account on a computer and access any encrypted home folder when a user forgets a login password.

Submit
59. If you have a mix of Windows versions on a home or small business network, this may be your easiest option for sharing files from a Windows 7 computer to computers with other Windows versions

Explanation

The Public Folder is the easiest option for sharing files from a Windows 7 computer to computers with other Windows versions on a home or small business network. This folder allows users to easily share files and folders with other users on the same network without the need for complicated network configurations or permissions. It provides a convenient and straightforward way to share files and collaborate with others on the network.

Submit
View My Results

Quiz Review Timeline (Updated): Oct 29, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Oct 29, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • May 17, 2014
    Quiz Created by
    Rey5
Cancel
  • All
    All (59)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Extra Credit - Ubuntu Linux and other distributions comes with bundled...
When you view the network connection setting in Windows, Linux, and...
Mac OS X comes preinstalled on a new Mac, but the first time you start...
Non-hardware settings common to all users of a computer are located in...
Exposé lets you assign actions to certain keys or mouse buttons...
Where Windows has a menu bar at the top of every open window, Mac OS X...
Linux is case sensitive.
Netscape Navigator, by Mosaic Communications, was a free Web browser...
The Ubuntu shell command, sudo, does not require the root password,...
Linux is so secure that you do not need to create a password for your...
What key combination will quickly open the OS X search utility?
The Keyboard preferences pane includes a list of keyboard shortcuts.
The Apple II computer was the first personal computer with a graphical...
Any user can shut down Linux from the command prompt.
The first time you power on a new Mac this program automatically runs.
Verify your computer's IP configuration with this utility
What key combination will cut a selected item?
What OS X feature would you turn on to encrypt your home folder?
This type of Mac OS X user account can change all system preferences...
What type of OS is Darwin, the core of Mac OS X?
Launch this from the Utilities folder and work at Mac OS X's BASH...
Apple does not recommend installing antivirus software on a Mac OS...
Internet Explorer and FireFox are examples of clients for this service
In most cases, this should not be turned on because it bypasses a very...
The Dock icon that appears to  be a box filled with gears opens...
If an item has disappeared from the Finder Sidebar it will reappear...
At the Linux command shell, when an ordinary user is logged in the...
Using this feature of Mac OS X, you can have separated sets of open...
This all-powerful account is disabled by default and Apple has tried...
Which of the following choices will give you a clean installation of...
Use this Finder view if you need to see a wealth of information about...
When you start Finder from the Dock what folder does it open by...
This is the one place in Linux where an ordinary user has full...
This is the main file management tool in the Mac OS X desktop
What important Apple product (with a GUI) was introduced in 1984?
From this menu you can shut down your computer, access configuration...
What folder contains the Utilities folder?
Where can you configure the Mac OS X Firewall settings?
How can you quickly open an extensive list of installed hardware and...
Use this preference pane to configure automatic system backups for...
Everything is Linux is a __________
This feature of the Mac OS X desktop allows you to select an open...
What is the name of the page of the Mac OS X installer that request...
Test the ability to communicate with another host over a TCP/IP...
When using Web mail, you must use e-mail client software.
You can quickly launch programs that have an icon sitting on this GUI...
This Ubuntu Linux shell command temporarily gives the currently logged...
You have forgotten the password for your account on your MacBook Pro...
If you select the Firewall setting to block all incoming connections...
Discover the bottleneck between your computer and another using this...
WiFi is an example of wireless wide area network (WWAN) technology.
If you have an Internet Connection, what message box will appear soon...
You have the appearance preferences pane open; which of the following...
This service may be the most important service on the internet because...
If you work with data that you must protect from snooping, turn this...
This Mac OS X feature is a secure database of user's passwords.
Check the version of MAC OS X by opening this desktop object and...
If you have this set, you can use it to unlock any account on a...
If you have a mix of Windows versions on a home or small business...
Alert!

Advertisement