I would say A because it was talking about something in the present but what they were talking about was in past. so I would think A
Answer:
1. B
2. D
3. C
4. A
5. B
Explanation:
1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."
2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.
3. Virus is a software program that can infect, damage and disrupts the whole computer system.
4. To protect the whole computer system, the software utility which is needed is an Anti-virus.
5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.
Answer:
Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>
Explanation:
Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).
The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.
Answer: D) Identifying GUI's for a particular requirement
Explanation:
Traceability of requirements is helpful except identifying GUI's for a particular requirements as, traceability in project management describe the relationships between two or more element throughout in the development process and outline the relationship between the customer requirement by traceability matrix. And the requirement of traceability is so important because it creating a downstream flow of software and test cases in software requirement but not helpful in GUI identification.
Identify, evaluate, prioritize, and then control