PCPROC72023

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354
Across
  1. 1. The process of moving data from RAM to hard disk and back again. This process is also called swapping.
  2. 3. command verifies connectivity between two nodes in a network by sending ICMP packets and measuring response times in milliseconds.
  3. 4. commands to create (make) a directory
  4. 7. A Copy protection technology that makes digital materials accessible only through authorized decryption software or devices
  5. 8. command tests connectivity between two devices and displays the path between them.
  6. 9. A method of searching and organizing files and content on a PC
  7. 10. The amount (percentage) of time the processor spends doing non-idle tasks.
  8. 13. command is used to access a shared folder on the network
  9. 16. A statistical group, often corresponding to a specific type of hardware device or software process (such as the processor or memory).
  10. 17. utility verifies the file system integrity of a hard disk
  11. 18. An interpreted programming language used in a text file, usually human-readable.
  12. 19. command to copy files and directory trees
  13. 20. The percentage of traffic sent and received over a network connection.
  14. 22. A program that processes requests from other applications or users.
  15. 23. command prints the name of the current host/computer.
  16. 27. command shows IP statistics, which includes the following: Current connections, incoming/outgoing connections, active sessions, and the local routing table
  17. 28. command to work with the current directory
  18. 31. A collection of Windows administrative tools, or snap-ins, that you can use to manage a computer.
  19. 35. utility to display running processes on a Linux system.
  20. 36. command displays the About window which shows the version of Windows is running and the build number.
  21. 37. The area located at the bottom of the Windows desktop that displays icons for open and pinned apps. You can right-click the icon for additional actions.
  22. 38. command to display a list of files and subdirectories in a directory.
  23. 39. A security measure that displays an image with the date and time when the computer is locked. You can add preferred apps (such as the calendar) to the lock screen.
  24. 41. A configuration that defines how an application, operating system, or a piece of hardware performs or appears.
  25. 42. An instance of a computer program that is being executed.
  26. 43. The Windows swap file that holds the virtual memory used to supplement the physical memory installed in a computer.
  27. 45. command installs packages on Linux systems that use the Debian Package Manager (dpkg).
  28. 46. A device that tracks the number of times an event or process occurs. A counters records a specific statistic, such as the amount of free memory or the number of bytes sent on a network card.
  29. 48. a set of software that contains executables (and other files) that have been precompiled and configured for a specific hardware architecture and Linux distribution
  30. 49. Software or operating system source code that is distributed under the GNU General Public License free to anyone.
  31. 51. Text files with commands and structures specific to a scripting language.
  32. 52. A congestion that occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions.
  33. 54. A remote management service that allows users to take control of remote computers over a network connection.
Down
  1. 1. Exclusive ownership or holding exclusive rights to something.
  2. 2. The utility that manages swapping data between physical memory and the hard disk.
  3. 4. A framework that provides a common user interface for performing system administration tasks.
  4. 5. A Copy protection technology that Identifies unique properties of a file and compares them to a database of fingerprinted files to track access to materials.
  5. 6. The standard application programming interface for accessing database management systems (DBMS).
  6. 11. A legal contract detailing the terms of use between a software application author or publisher and the end user of that application.
  7. 12. A group of settings that allows you to customize the way the Windows desktop appears.
  8. 14. A Copy protection technology that embeds traceable information into the file.
  9. 15. An example of how a technology can be used in a real-life example.
  10. 21. A security application created by Microsoft and built into Windows.
  11. 24. In some cases, users require *BLANK* or rights to run applications. For example, legacy applications that access the system in certain ways may require running the application as an administrator
  12. 25. Software and hardware security limitations meant to protect digital content and prevent piracy.
  13. 26. command resolves (looks up) the IP address of a hostname
  14. 29. command installs packages on Linux systems that use the Red Hat Package Manager (RPM).
  15. 30. command displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings
  16. 32. A situation that occurs when a computer's virtual memory resources become saturated, leading to a constant state of paging.
  17. 33. physical devices, such as key fobs or USB tokens, that are used for security purposes
  18. 34. Authorization granted to a user or group to access and perform other tasks on a network resource.
  19. 40. command to delete (remove) a directory
  20. 44. Simulated memory that is implemented as a page file on a hard drive.
  21. 47. The condition where the physical memory is so insufficient that data must be continuously moved from physical RAM to disk and back again.
  22. 50. command, when run without any options, displays all accounts currently created on the system
  23. 53. Users who are members of only the *BLANK* group are not able to install applications.