SURVEY OF OPERATING SYSTEMS
6th Edition
ISBN: 9781260096002
Author: Holcombe
Publisher: RENT MCG
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 7, Problem 9MCQ
Program Description Answer
The all-powerful account which is used by the OS, but disabled of interactive users is “Root”.
Hence, the correct answer is option “D”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
QUESTION 1
A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on all the computers. The administrator wants all the computers in the new office to have a consistent configuration. Which of the following features included in Windows 10 would be appropriate to complete this task?
a.
Application programmer interface
b.
Automatic updates
c.
Multiple Activation Key
d.
Group Policy
The Windows 10 computers in your office are configured such that the files saved in the Documents folder
can be viewed and edited by students singing in using different user accounts. The documents are visible in
the Documents folder of each user.
Which of the following user profiles does this configuration demonstrate?
a) The default profile
b) The Microsoft One Folder profile
c) A roaming profile
d)
A mandatory profile
e) The Office profile
f) The public profile
A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on
all the computers. The administrator wants all the computers in the new office to have a consistent
configuration.
Which of the following features included in Windows 10 would be appropriate to complete this task?
a)
Multiple Activation Key
b) Group Policy
c) Automatic updates
d) Application programmer interface
e) The Consistent Configuration tool
f) None of the above!
Chapter 7 Solutions
SURVEY OF OPERATING SYSTEMS
Ch. 7 - In a safe environment, such as your home, you can...Ch. 7 - Prob. 2KTQCh. 7 - Prob. 3KTQCh. 7 - Prob. 4KTQCh. 7 - Prob. 5KTQCh. 7 - Prob. 6KTQCh. 7 - Prob. 7KTQCh. 7 - Prob. 8KTQCh. 7 - Prob. 9KTQCh. 7 - Prob. 10KTQ
Ch. 7 - When did the first Apple Mac OS appear? a. 1976 b....Ch. 7 - Prob. 2MCQCh. 7 - Prob. 3MCQCh. 7 - Prob. 4MCQCh. 7 - Prob. 5MCQCh. 7 - Which of the following is one of the four views...Ch. 7 - Prob. 7MCQCh. 7 - Prob. 8MCQCh. 7 - Prob. 9MCQCh. 7 - Prob. 10MCQCh. 7 - Prob. 11MCQCh. 7 - What keyboard shortcut can you use to force an...Ch. 7 - A Sharing Only type of account is not allowed to...Ch. 7 - Prob. 14MCQCh. 7 - Prob. 15MCQCh. 7 - Prob. 1EQCh. 7 - Prob. 2EQCh. 7 - Prob. 3EQCh. 7 - Prob. 4EQCh. 7 - Prob. 5EQ
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Which registry hive is loaded first during Windows startup?arrow_forwardYou have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are NOT able to install new software on the computer. Which of the following DEFAULT Windows 10 groups do these accounts belong to? a) Administrators b) Power Rangers c) Workers d) Device Owners e) Power Users f) Aliens g) Usersarrow_forwardProject 8-1: HANDS-ON PROJECTS Research Antivirus Software For Windows machines, the built-in Windows Defender is considered to be a fairly decent solution for home users, but it does have inherent weaknesses. Several good antivirus solutions are available on the market today, some of which is OS agnostic (meaning they work for multiple operating systems)and some of which are customized to a specific OS. Many also have free versions. In this project, you research options for two different operating systems: From the following list, select two operating systems for which you will research antivirus options: Windows, Linux, OS X, Android, Chrome OS, or UNIX. Research and select three antivirus solutions for your chosen operating systems. Compare features, cost, reported effectiveness, and feedback from reviewers. Create a table or spreadsheet comparing the pros and cons of each alternative. Which would you choose and why?arrow_forward
- Which prompt does the root user receive when logged in to the system?a. $b. @c. #d. !arrow_forwardLinux provides near-identical counterparts to several Unix commands. Why does this happen, and what causes it?arrow_forwardWhich of the following is true of group accounts? (Choose all that apply.) a. They organize users for easier assignment of resource permissions. b. They can be used only to assign permissions, not rights. c. Each group has a password assigned. d. You can select a group scope in Active Directory but not in Windows 10.arrow_forward
- QUESTION 30 Which of the following statements is not true of the Administrator account? a. It is the most powerful local user account possible. b. It can be renamed. c. It cannot be deleted. d. It is not visible on the sign-in screen.arrow_forwardWhich one of the following statements about the Windows protection ring model is FALSE? It provides a level of access control and granularity. Kernel mode restricts access to all resources. As you move toward the outer bounds of the model, the numbers increase, and the level of trust decreases. It provides the operating system with various levels at which to execute code or restrict its access.arrow_forwardWhich of the following software is loaded in the booting process? a. Database O b. Programming Language O c. Operating System O d. Antivirus Software Next parrow_forward
- It has been brought to the attention of a local administrator working on Windows 10 that they would want to make use of a corporate messaging application in order to communicate with users who are members of an Active Directory domain.When he tried to get into the software, however, he was met with an error message that informed him that he lacked the required permissions.What are some possible solutions to this issue?arrow_forwardThe final permission bit in Unix based systems is the _________ bit. Select one: a. Sticky b. Root c. Superuser d. Set user e. Kernelarrow_forwardCreate a menu-driven script that will let your user choose among the following: A: List the files in your current working directoryB: Display the calendar this monthC: Display the date todayD: Display the current working directoryE: Exit The script will not stop asking the user to choose [A-D] not unless the user decided to exit [E].arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,