TCMG 303 EXAM 2 Questions And Answers With
Verified Study Solutions
The workers. Properties file contains parameters that can be set to allow Apache to pass HTTP data to Tomcat.
ANS True
The "cloud" as referred in IT, is an example of virtualization. ANS True
VMware, Hyper-V, and XenApps are all types of software and/or operating system virtualization. ANS True
You must indicate a command interpreter at the start of a shell script. ANS False
The Apache webserver does not support secure data transporting. ANS False
Apache and Tomahawk are two commonly used web servers. ANS False
Perl and Ruby are both programming languages that require a compiler. ANS False
The most common web server used on Unix systems is apache. ANS True
Technological change brings the role of the system administrator, IT, and business together in a new technology or
methodology. ANS True
Applications on X11 run in reverse order than a normal client/server environment. ANS True
A code interpreter is a special software program that executes a single line (line by line) of an input file (source
code) written in some high-level programming language ANS True
The Tomcat webserver allows the use of java servlet and JSP code to be embedded into the HTML code. ANS
True
, Hacker ethics are concerned primarily with sharing, openness, collaboration, and engaging in the hands-on
imperative. ANS True
Software (such as operating systems), hardware (such as data filers), networking (such as switches), and data
centers can all be virtualized. ANS True
C++ is also considered a middle-order programming language because it can support both low-level assembly and
high-level functions or objects. ANS True
The scp command stands for standard copy procedure and is used for quick, unsecure file copying on a Unix server.
ANS False
C++ and Java are both programming languages that require a compiler. ANS True
SSH stands for secure system hypertext and allows for unsecure remote access to a Unix server. ANS False
Ruby, Perl, Emerald, and Diamond are all considered higher-ordered programming languages. ANS False
The "Computer Hacker Attitude" is that access to computers-and anything that might teach you something about
the way the world works-should be unlimited and total. ANS True
The ITIL framework is designed to standardize the selection, planning, delivery and support of IT services to a
business. ANS True
Xclock, Xcalc, and Xterm are all X11 applications. ANS True
Civilization is a process of interaction and integration among the people, companies, and governments of different
nations, a process driven by international trade and investment and aided by information technology. ANS False
Data encryption/decryption in a secured connection is achieved by requiring a private lock and public key. ANS
False
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Nipsey. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.