Across
- 1. The process of moving data from RAM to hard disk and back again. This process is also called swapping.
- 3. command verifies connectivity between two nodes in a network by sending ICMP packets and measuring response times in milliseconds.
- 4. commands to create (make) a directory
- 7. A Copy protection technology that makes digital materials accessible only through authorized decryption software or devices
- 8. command tests connectivity between two devices and displays the path between them.
- 9. A method of searching and organizing files and content on a PC
- 10. The amount (percentage) of time the processor spends doing non-idle tasks.
- 13. command is used to access a shared folder on the network
- 16. A statistical group, often corresponding to a specific type of hardware device or software process (such as the processor or memory).
- 17. utility verifies the file system integrity of a hard disk
- 18. An interpreted programming language used in a text file, usually human-readable.
- 19. command to copy files and directory trees
- 20. The percentage of traffic sent and received over a network connection.
- 22. A program that processes requests from other applications or users.
- 23. command prints the name of the current host/computer.
- 27. command shows IP statistics, which includes the following: Current connections, incoming/outgoing connections, active sessions, and the local routing table
- 28. command to work with the current directory
- 31. A collection of Windows administrative tools, or snap-ins, that you can use to manage a computer.
- 35. utility to display running processes on a Linux system.
- 36. command displays the About window which shows the version of Windows is running and the build number.
- 37. The area located at the bottom of the Windows desktop that displays icons for open and pinned apps. You can right-click the icon for additional actions.
- 38. command to display a list of files and subdirectories in a directory.
- 39. A security measure that displays an image with the date and time when the computer is locked. You can add preferred apps (such as the calendar) to the lock screen.
- 41. A configuration that defines how an application, operating system, or a piece of hardware performs or appears.
- 42. An instance of a computer program that is being executed.
- 43. The Windows swap file that holds the virtual memory used to supplement the physical memory installed in a computer.
- 45. command installs packages on Linux systems that use the Debian Package Manager (dpkg).
- 46. A device that tracks the number of times an event or process occurs. A counters records a specific statistic, such as the amount of free memory or the number of bytes sent on a network card.
- 48. a set of software that contains executables (and other files) that have been precompiled and configured for a specific hardware architecture and Linux distribution
- 49. Software or operating system source code that is distributed under the GNU General Public License free to anyone.
- 51. Text files with commands and structures specific to a scripting language.
- 52. A congestion that occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions.
- 54. A remote management service that allows users to take control of remote computers over a network connection.
Down
- 1. Exclusive ownership or holding exclusive rights to something.
- 2. The utility that manages swapping data between physical memory and the hard disk.
- 4. A framework that provides a common user interface for performing system administration tasks.
- 5. A Copy protection technology that Identifies unique properties of a file and compares them to a database of fingerprinted files to track access to materials.
- 6. The standard application programming interface for accessing database management systems (DBMS).
- 11. A legal contract detailing the terms of use between a software application author or publisher and the end user of that application.
- 12. A group of settings that allows you to customize the way the Windows desktop appears.
- 14. A Copy protection technology that embeds traceable information into the file.
- 15. An example of how a technology can be used in a real-life example.
- 21. A security application created by Microsoft and built into Windows.
- 24. In some cases, users require *BLANK* or rights to run applications. For example, legacy applications that access the system in certain ways may require running the application as an administrator
- 25. Software and hardware security limitations meant to protect digital content and prevent piracy.
- 26. command resolves (looks up) the IP address of a hostname
- 29. command installs packages on Linux systems that use the Red Hat Package Manager (RPM).
- 30. command displays all current TCP/IP network configuration values and refreshes the DHCP and DNS settings
- 32. A situation that occurs when a computer's virtual memory resources become saturated, leading to a constant state of paging.
- 33. physical devices, such as key fobs or USB tokens, that are used for security purposes
- 34. Authorization granted to a user or group to access and perform other tasks on a network resource.
- 40. command to delete (remove) a directory
- 44. Simulated memory that is implemented as a page file on a hard drive.
- 47. The condition where the physical memory is so insufficient that data must be continuously moved from physical RAM to disk and back again.
- 50. command, when run without any options, displays all accounts currently created on the system
- 53. Users who are members of only the *BLANK* group are not able to install applications.