PCPROC72023

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455
Across
  1. 1. Software and hardware security limitations meant to protect digital content and prevent piracy.
  2. 4. command, when run without any options, displays all accounts currently created on the system
  3. 6. Software or operating system source code that is distributed under the GNU General Public License free to anyone.
  4. 7. command displays the About window which shows the version of Windows is running and the build number.
  5. 8. command tests connectivity between two devices and displays the path between them.
  6. 13. command prints the name of the current host/computer.
  7. 18. A configuration that defines how an application, operating system, or a piece of hardware performs or appears.
  8. 19. Simulated memory that is implemented as a page file on a hard drive.
  9. 21. The amount (percentage) of time the processor spends doing non-idle tasks.
  10. 23. utility to display running processes on a Linux system.
  11. 28. command installs packages on Linux systems that use the Debian Package Manager (dpkg).
  12. 31. An interpreted programming language used in a text file, usually human-readable.
  13. 32. A program that processes requests from other applications or users.
  14. 33. command to delete (remove) a directory
  15. 34. command is used to access a shared folder on the network
  16. 35. A collection of Windows administrative tools, or snap-ins, that you can use to manage a computer.
  17. 38. command verifies connectivity between two nodes in a network by sending ICMP packets and measuring response times in milliseconds.
  18. 39. In some cases, users require *BLANK* or rights to run applications. For example, legacy applications that access the system in certain ways may require running the application as an administrator
  19. 44. The process of moving data from RAM to hard disk and back again. This process is also called swapping.
  20. 45. An example of how a technology can be used in a real-life example.
  21. 48. A situation that occurs when a computer's virtual memory resources become saturated, leading to a constant state of paging.
  22. 49. The Windows swap file that holds the virtual memory used to supplement the physical memory installed in a computer.
  23. 51. A security measure that displays an image with the date and time when the computer is locked. You can add preferred apps (such as the calendar) to the lock screen.
  24. 53. A security application created by Microsoft and built into Windows.
  25. 54. command resolves (looks up) the IP address of a hostname
Down
  1. 2. physical devices, such as key fobs or USB tokens, that are used for security purposes
  2. 3. utility verifies the file system integrity of a hard disk
  3. 5. command shows IP statistics, which includes the following: Current connections, incoming/outgoing connections, active sessions, and the local routing table
  4. 9. A device that tracks the number of times an event or process occurs. A counters records a specific statistic, such as the amount of free memory or the number of bytes sent on a network card.
  5. 10. Authorization granted to a user or group to access and perform other tasks on a network resource.
  6. 11. A remote management service that allows users to take control of remote computers over a network connection.
  7. 12. A Copy protection technology that makes digital materials accessible only through authorized decryption software or devices
  8. 14. A Copy protection technology that Identifies unique properties of a file and compares them to a database of fingerprinted files to track access to materials.
  9. 15. A Copy protection technology that embeds traceable information into the file.
  10. 16. A framework that provides a common user interface for performing system administration tasks.
  11. 17. commands to create (make) a directory
  12. 20. A congestion that occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions.
  13. 22. The condition where the physical memory is so insufficient that data must be continuously moved from physical RAM to disk and back again.
  14. 24. A statistical group, often corresponding to a specific type of hardware device or software process (such as the processor or memory).
  15. 25. The area located at the bottom of the Windows desktop that displays icons for open and pinned apps. You can right-click the icon for additional actions.
  16. 26. An instance of a computer program that is being executed.
  17. 27. The utility that manages swapping data between physical memory and the hard disk.
  18. 29. command to copy files and directory trees
  19. 30. command installs packages on Linux systems that use the Red Hat Package Manager (RPM).
  20. 36. A group of settings that allows you to customize the way the Windows desktop appears.
  21. 37. Users who are members of only the *BLANK* group are not able to install applications.
  22. 40. command displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings
  23. 41. A legal contract detailing the terms of use between a software application author or publisher and the end user of that application.
  24. 42. Text files with commands and structures specific to a scripting language.
  25. 43. command to display a list of files and subdirectories in a directory.
  26. 44. a set of software that contains executables (and other files) that have been precompiled and configured for a specific hardware architecture and Linux distribution
  27. 46. command to work with the current directory
  28. 47. A method of searching and organizing files and content on a PC
  29. 50. The percentage of traffic sent and received over a network connection.
  30. 52. Exclusive ownership or holding exclusive rights to something.
  31. 55. The standard application programming interface for accessing database management systems (DBMS).