SlideShare a Scribd company logo
1. Describe the four main parts of the OS X graphical user
interface and how they are used. 2. Discuss the steps you would
take to create a file with the Terminal application in OS X or
Linux.
3. Research why Linux servers usually do not have a graphical
user interface installed. Write down the URL of the website you
used to help come to your conclusion and explain your
reasoning for not installing a GUI.
4. Linux is a stable platform but still has issues and can crash.
Research what are some log files that are useful in Linux for
troubleshooting.
5. Find a website that describes how to troubleshoot a Linux
system that will not boot. Write the URL and one thing you
learned from the site.
6. Explain why you think businesses prefer to use Linux rather
than Windows for server environments.
7. What do you think are some drawbacks of using Linux rather
than Windows for a server?
8. Describe five recommendations for protecting the operating
system. 9. Discuss the three password guidelines you would
recommend that a company use. 10. What are the main
differences between a local policy and a domain policy? 11. A
college requires that all employees use the last four digits of
their Social Security number to access the copier. Which type
of security threat is this? How would you respond to it?
12. You work as an IT support person for a company. The user
complains of slowness when opening files. No virus or malware
is evident after complete scans have been completed. You open
files to test this and find child pornography. What are your next
three steps?
13. Your neighbor asks if he can borrow your application DVD
and code. He promises he will not register the application. How
will you respond to this because it is a personal request and not
a professional one? To whom would you report this, if anyone?
14. What is the purpose of a DMZ? How is it used?

More Related Content

DOCX
1. Early versions of UNIX were available only with a command-driven .docx
PDF
200 IT Secutiry Job Interview Question
DOCX
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
DOCX
Faster Computing was impressed with your presentation. The compa.docx
DOCX
Discussion1) Search scholar.google.com for a company or s
PPTX
System security by Amin Pathan
DOCX
CIS 312 Success Begins / snaptutorial.com
PPTX
MIS Internship.pptx
1. Early versions of UNIX were available only with a command-driven .docx
200 IT Secutiry Job Interview Question
csc3412 Assignment 1Semester 1, 2014Due Date Midnight.docx
Faster Computing was impressed with your presentation. The compa.docx
Discussion1) Search scholar.google.com for a company or s
System security by Amin Pathan
CIS 312 Success Begins / snaptutorial.com
MIS Internship.pptx

Similar to 1. Describe the four main parts of the OS X graphical user interface (20)

DOCX
Essay QuestionsAnswer all questions below in a single document, pr.docx
DOCX
Joseph M Dziak Resume 2015
PDF
l_02sec.pdf
DOCX
RESEARCHED ARGUMENT ESSAY GUIDELINES (Based on Tom Regan’.docx
PDF
Application Of An Operating System Security
DOCX
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
DOCX
View Attachment for all questions. All 21 Questions should be an.docx
DOCX
Definite structured data and unstructured data.Your response shoul.docx
DOC
Lab activity 2 l01 (1)
PDF
Senior Project - Speech
DOCX
i. Pick one topic from this class that most interested you. State th.docx
DOC
Strayer cis 524 week 7 case study 3 security new
DOCX
CIS 560 Inspiring Innovation/tutorialrank.com
PDF
Security in Computing IT
PDF
Linux Administration (Revised Syllabus) [QP / April - 2015]
TXT
New text document
TXT
New text document
DOCX
INTRODUCTION
PPTX
CH12-CompSec4e.pptx
PDF
CIS 560 Effective Communication - tutorialrank.com
Essay QuestionsAnswer all questions below in a single document, pr.docx
Joseph M Dziak Resume 2015
l_02sec.pdf
RESEARCHED ARGUMENT ESSAY GUIDELINES (Based on Tom Regan’.docx
Application Of An Operating System Security
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
View Attachment for all questions. All 21 Questions should be an.docx
Definite structured data and unstructured data.Your response shoul.docx
Lab activity 2 l01 (1)
Senior Project - Speech
i. Pick one topic from this class that most interested you. State th.docx
Strayer cis 524 week 7 case study 3 security new
CIS 560 Inspiring Innovation/tutorialrank.com
Security in Computing IT
Linux Administration (Revised Syllabus) [QP / April - 2015]
New text document
New text document
INTRODUCTION
CH12-CompSec4e.pptx
CIS 560 Effective Communication - tutorialrank.com
Ad

More from sandibabcock (20)

DOCX
2. Session 11 contains the Final Prezi Presentation.  There are diff.docx
DOCX
2. In generaI, how do the gods and goddesses described in the myth.docx
DOCX
2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx
DOCX
2. What are the components of the communication process Describe a .docx
DOCX
2. Supply of InsuranceSuppose there are two risk averse individual.docx
DOCX
2-4 double-spaced typewritten pages for each.Topic 1.docx
DOCX
2. Charismatic Leadership It is true that charisma has no g.docx
DOCX
2. What information could not be told from this map3. After revie.docx
DOCX
2-13CreatingaSolutionofKnownMolarityIn this a.docx
DOCX
2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx
DOCX
2-3 page essay question selected from one out of three possible .docx
DOCX
2) CompareContrast the life of an indentured servant with that of a.docx
DOCX
2 part task APA FormatPart 1The role of the nurse educator requ.docx
DOCX
2 pages Comparison and Contrast and one page for sourcesPage No .docx
DOCX
2 PagesAPA StyleYou have been promoted to a member of the mana.docx
DOCX
2 points Question 2 The EPAs Superfund Trust was establis.docx
DOCX
2 parts 1st. part is answer this QACompared to other countries.docx
DOCX
2 parts 1st. part is answer this QAGive an example from someth.docx
DOCX
2 pagesOne of the functions of HR is to develop and manage employe.docx
DOCX
2 POwer Point slides with at least 200 words of speaker notes .docx
2. Session 11 contains the Final Prezi Presentation.  There are diff.docx
2. In generaI, how do the gods and goddesses described in the myth.docx
2-3 pages APA Style APA Journal citationBlount, R L, Drabman, R S.docx
2. What are the components of the communication process Describe a .docx
2. Supply of InsuranceSuppose there are two risk averse individual.docx
2-4 double-spaced typewritten pages for each.Topic 1.docx
2. Charismatic Leadership It is true that charisma has no g.docx
2. What information could not be told from this map3. After revie.docx
2-13CreatingaSolutionofKnownMolarityIn this a.docx
2-3 page APA with 3-4 cites Prepare a 2-3 page paper using APA f.docx
2-3 page essay question selected from one out of three possible .docx
2) CompareContrast the life of an indentured servant with that of a.docx
2 part task APA FormatPart 1The role of the nurse educator requ.docx
2 pages Comparison and Contrast and one page for sourcesPage No .docx
2 PagesAPA StyleYou have been promoted to a member of the mana.docx
2 points Question 2 The EPAs Superfund Trust was establis.docx
2 parts 1st. part is answer this QACompared to other countries.docx
2 parts 1st. part is answer this QAGive an example from someth.docx
2 pagesOne of the functions of HR is to develop and manage employe.docx
2 POwer Point slides with at least 200 words of speaker notes .docx
Ad

Recently uploaded (20)

PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Updated Idioms and Phrasal Verbs in English subject
PDF
Trump Administration's workforce development strategy
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Module 4: Burden of Disease Tutorial Slides S2 2025
Paper A Mock Exam 9_ Attempt review.pdf.
Supply Chain Operations Speaking Notes -ICLT Program
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Yogi Goddess Pres Conference Studio Updates
Microbial disease of the cardiovascular and lymphatic systems
Microbial diseases, their pathogenesis and prophylaxis
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
What if we spent less time fighting change, and more time building what’s rig...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Updated Idioms and Phrasal Verbs in English subject
Trump Administration's workforce development strategy

1. Describe the four main parts of the OS X graphical user interface

  • 1. 1. Describe the four main parts of the OS X graphical user interface and how they are used. 2. Discuss the steps you would take to create a file with the Terminal application in OS X or Linux. 3. Research why Linux servers usually do not have a graphical user interface installed. Write down the URL of the website you used to help come to your conclusion and explain your reasoning for not installing a GUI. 4. Linux is a stable platform but still has issues and can crash. Research what are some log files that are useful in Linux for troubleshooting. 5. Find a website that describes how to troubleshoot a Linux system that will not boot. Write the URL and one thing you learned from the site. 6. Explain why you think businesses prefer to use Linux rather than Windows for server environments. 7. What do you think are some drawbacks of using Linux rather than Windows for a server? 8. Describe five recommendations for protecting the operating system. 9. Discuss the three password guidelines you would recommend that a company use. 10. What are the main differences between a local policy and a domain policy? 11. A college requires that all employees use the last four digits of their Social Security number to access the copier. Which type of security threat is this? How would you respond to it? 12. You work as an IT support person for a company. The user complains of slowness when opening files. No virus or malware is evident after complete scans have been completed. You open
  • 2. files to test this and find child pornography. What are your next three steps? 13. Your neighbor asks if he can borrow your application DVD and code. He promises he will not register the application. How will you respond to this because it is a personal request and not a professional one? To whom would you report this, if anyone? 14. What is the purpose of a DMZ? How is it used?