2.99 See Answer

Question: Type _____ or ________ before a Terminal


Type _____ or ________ before a Terminal command to get root privileges.


> Explain why the function is discontinuous at the given number a. Sketch the graph of the function.

> Evaluate the limit, if it exists. lim x → 0 (4 + h)2 – 16 / h

> (a). A particle starts by moving to the right along a horizontal line; the graph of its position function is shown. When is the particle moving to the right? Moving to the left? Standing still? (b). Draw a graph of the velocity function.

> Use the definition of continuity and the properties of limits to show that the function g (x) = 2 √3-x is continuous on the interval (-∞, 3].

> Use the definition of continuity and the properties of limits to show that the function is continuous at the given number a.

> Evaluate the limit, if it exists. lim x → 4 x2 - 4x / x2 – 3x - 4

> Evaluate the limit, if it exists. Lim x → 5 x2 - 6x + 5/ x - 5

> Sketch the graph of the function and use it to determine the values of for which limx→a f (x) exists.

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> A patient receives a 150-mg injection of a drug every 4 hours. The graph shows the amount f (x) of the drug in the bloodstream after t hours. Find limt→12- f (t) and limt→12+ f (t) and explain the significance of these

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> Use the graph of the function f to state the value of each limit, if it exists. If it does not exist, explain why.

> Explain why each function is continuous or discontinuous. (a). The temperature at a specific location as a function of time (b). The temperature at a specific time as a function of the distance due west from New York City (c). The altitude above sea leve

> Explain in your own words the meaning of each of the following.

> Apple Macs primarily use the __________ display connector type.

> The time it takes to redraw the entire screen is called the __________ .

> Two common projector technologies are LCD and ________________ .

> The __________ bus is the most common expansion slot for video cards.

> Using an aspect ratio of 16:10, the __________ refers to the number of horizontal pixels times the number of vertical pixels.

> DirectX is a(n) _____________ that translates instructions for the video device driver.

> The traditional D-subminiature connector on a video card is called a VGA connector or _________ .

> The size of the projected image at a specific distance from the screen is defined as the projector’s ___________ .

> To provide the optimal display for an LCD monitor, always set it to its ___________ .

> Virtual machines perform better on CPUs with ____________ .

> Before making a credit card purchase on the Internet, be sure the Web site uses the ______________ protocol (that replaced the older SSL protocol), which you can verify by checking for the __________ protocol in the address bar.

> Cloud computing companies provide ____________ that bills users for only what they use.

> A(n) ___________ is a virtual machine running on a hypervisor.

> A(n) __________ translates commands issued by software in order to run it on hardware it wasn’t designed to run on.

> You can use basic ____________ to create and run virtual machines on a local system.

> You can create a(n) _______ or ________ as a restore point for a virtual machine.

> John’s hypervisor enables all five of the virtual machines on his system to communicate with each other through the ____________ without going outside the host system.

> A program that runs multiple operating systems simultaneously is called a(n) __________ .

> A machine running a hypervisor is a(n) ____________ .

> A(n) _________ is a complete environment for a guest operating system to function as though that operating system was installed on its own computer.

> The ______________ applet provides a relative feel for how your computer stacks up against other systems using the Windows Experience Index.

> Many companies authenticate access to secure rooms using an ownership factor such as a(n)_______________ .

> To run a program written for Windows XP in a Windows 7 computer, use _________ if you encounter problems.

> In Windows Vista and Windows 7, you can use the _________ feature to recover previous versions of corrupted or deleted files.

> Use the ________ in Windows 8 to see an aggregation of event messages, warnings, maintenance messages, and quick access to security and maintenance tools.

> The___________ , accessed by pressing CTRL-SHIFT-ESC once, enables you to see all processes and services currently running or to close a process that has stopped working.

> To start Windows using only the most basic and essential drivers and services, use ________ .

> If Windows 7 fails but you have not logged on, you can select _________ to restore the computer to the way it was the last time a user logged on.

> Use the ___________ to check and replace any corrupted critical Windows files such as DLLs.

> Current versions of Windows include a set of repair tools known as the______________ .

> The _________ tool enables you to view and modify the BCD store.

> The _______ command is used by Linux systems to copy entire block volumes.

> A(n) ____________ protects against unauthorized access from the Internet.

> The asterisk is a special character called a(n) _______ that you can use in place of part of a filename when executing a command-line command.

> The ___________ command enables you to restart a computer remotely from the command line.

> Your system knows what program is associated with a particular file by that file’s __________.

> The Terminal _______ command enables you to delete a file.

> The copy command is to move in Windows as cp is to _________ in Linux.

> Extra text you type after a command to modify its operation is called a(n) __________.

> The _________ command is used in Mac OS X to change a password.

> The _____________ tells you it’s ready to receive commands by displaying a specific set of characters called a(n) __________ .

> When you insert an optical disc into your PC, Windows uses the _______ and _________ features to start the disc automatically.

> Most attacks on computer data are accomplished through _____________.

> The process of keeping software updated in a safe and timely fashion is known as_____________ .

> Mac OS X uses __________ and most Linux distributions use ______ to run all sorts of tasks automatically in the background.

> You can use ___________ to disable certain graphical flourishes, such as animations, transparencies, and more.

> In Windows Vista and 7, Microsoft occasionally packaged several updates for Windows together into a(n) _____________ .

> If installing a new driver causes problems in your system, ____________ enables you to roll back the driver to a previously installed version.

> To change which programs and services start with Windows 8/8.1/10, you would use the __________ .

> In Mac OS X, you access updates through the __________ pane in System Preferences

> The __________ tool enables you to create a__________ , a snapshot of your computer’s configuration at a specific point in time.

> In Windows, you use the ____________ applet to uninstall, change, or repair programs.

> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.

> Although not all ____________ is malicious, it can lead to data destruction.

> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.

> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .

> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.

> A(n) __________ is a collection of user accounts that share the same access capabilities.

> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.

> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .

> To log on to a standalone Windows PC, you need a(n)______________ .

> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.

> The _____________ enables you to manage user accounts in Windows.

> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.

> Enable __________ to create Event Viewer entries when a specific file is accessed.

> The __________ tracks everything about your computer, from file types to user preferences.

> Windows 8.1 uses ________ to boot the OS.

> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.

> When you open the Registry Editor, you will see the five _________ on the left side of the window.

> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.

> The ___________ tab in the Task Manager displays overall CPU and memory usage.

> __________ is a command-line version of the Task Manager.

> When programmers need to use objects across multiple applications, they turn to _________ .

> The __________ tab in Task Manager shows applications that will run on boot.

> Windows tracks the installation progress with a set of text files called _________ .

> Antivirus software uses updatable __________ to identify a virus by its______________.

> During the Windows installation, you will need to agree to a legal document called the ____________ .

> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.

> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.

> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .

> If you want to share files and printers over your home network, you can set up a(n) ________ .

> _________ cases are used to make your computer blend in with the rest of your home theater equipment.

> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.

> Windows uses the ____________ tool for migrating user files and settings.

> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.

2.99

See Answer