Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records?
Which of the following words is used to restrict the records that are returned from a SELECT query based on a supplied criteria for the values in the records?A . LIMITB . FROMC . WHERED . IFView AnswerAnswer: C
Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)?
Which of the following commands should be added to /etc/bash_profile in order to change the language of messages for an internationalized program to Portuguese (pt)?A . export LANGUAGE="pt"B . export MESSAGE="pt"C . export UI_MESSAGES="pt"D . export LC_MESSAGES="pt"E . export ALL_MESSAGES="pt"View AnswerAnswer: D
Which of the following commands can be used to convert text files in one character encoding to another character encoding?
Which of the following commands can be used to convert text files in one character encoding to another character encoding?A . catB . convertC . ddD . iconvE . utf2utfView AnswerAnswer: D
Why is the xhost program considered dangerous to use?
Why is the xhost program considered dangerous to use?A . It makes it difficult to uniquely identify a computer on the network.B . It allows easy access to your X server by other users.C . It logs sensitive information to syslog.D . It makes your computer share network resources without...
How is a display manager started?
How is a display manager started?A . It is started by a user using the command startx.B . It is started like any other system service by the init system.C . It is started by inetd when a remote hosts connects to the X11 port.D . It is started automatically...
What is the purpose of the iconv command?
What is the purpose of the iconv command?A . It converts bitmap images from one format to another such as PNG to JPEC . It verifies that the root directory tree complies to all conventions from the Filesystem Hierarchy Standard (FHS).D . It displays additional meta information from icon files...
CORRECT TEXT
CORRECT TEXT An administrator wants to determine the geometry of a particular window in X, so she issues the __________ -metric command and then clicks on the window.View AnswerAnswer: /usr/bin/xwininfo, xwininfo
Which file contains the date of the last change of a user's password?
Which file contains the date of the last change of a user's password?A . /etc/gshadowB . /etc/passwdC . /etc/pwdlogD . /etc/shadowE . /var/log/shadowView AnswerAnswer: D
What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)
What is true regarding the command userdel --force --remove bob? (Choose TWO correct answers.)A . The user bob is removed from the system's user database.B . The user bob's home directory is removed.C . The locate database is updated to drop files owned by bob.D . All files owned by...
Which command can be used to investigate the properties for a particular window in X by clicking that window?
CORRECT TEXT Which command can be used to investigate the properties for a particular window in X by clicking that window? (Specify ONLY the command without any path or parameters.)View AnswerAnswer: /usr/bin/xwininfo, xwininfo