Search
.Management Sciences
A. Shadow
B. password
C. profile
D. All the three
Related Mcqs:
- Which of command is used to copy a file ?
- A. copy B. cp C. cpio D. tar...
- What can he used to set up a firewall on a Linux system ?
- A. netstat B. route C. trace D. ipchains...
- The IP address are based on________________?
- A. 16-bit addresses B. 32-bit addresses C. 64-bit addresses D. 8-bit addresses...
- Which of the following NIS clients returns the name of the NIS server used by the NIS client ?
- A. ypwhich B. ypbind C. ypcat D. yppoll...
- What command is used to assign executable permission to the owner of the file named “letter” ?
- A. chmod ugo + x letter B. chmod u + x letter C. chmod u + w letter D. chmod g + x letter...
Recent Comments