Preview

Unit 1 Lab 3

Satisfactory Essays
Open Document
Open Document
82 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 1 Lab 3
Unit 1 Lab 3
Dominic Vogel
2. c. The GUI application terminates when changing from runlevel 5 to runlevel 3 e. Yes, change with ALT-F3 f. ping –c3 IP where IP is the IP address of a remote system such as the router
g. restart the graphical invironment by entering telinit 5. When changing to runlevel 3, all the graphical applications were terminated and all work in progress was lost. When returning to runlevel 5, scripts restart the graphical applications, resulting in a new login prompt and a new session.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    192.168.0.2 is the next-hop address that is used by R3 to route a packet from the 10.0.0.0 network to the 172.16.0.0 network.…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 1 Labs JM

    • 964 Words
    • 5 Pages

    Exercise 1.4.4 – UCS is a standard of characters, it was created so that there would be…

    • 964 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    2. If not found build ARP request frame containing MAC address, IP Address, and forwarding IP address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 192 Words
    • 1 Page

    11. What is the command to enable RIP on a CISCO router and what mode must be enabled to execute the command?…

    • 192 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Labs

    • 1237 Words
    • 6 Pages

    Would the IP address in Figure 8-1 be valid as a class C address? Why or why not?…

    • 1237 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Wi-Fi wireless networks support ad hoc connections between devices. Ad hoc Wi-Fi networks are pure peer to peer compared to those utilizing wireless routers as an intermediate device.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 1

    • 255 Words
    • 1 Page

    Where do maggots come from? Are they a self-born, spontaneous generation or are they mothered by something or someone? I actually asked myself that question numerous times while finding maggots on few things myself. I also wonder the same about fruit flies. Seems like as soon as I buy fruits, fruit flies fill my house almost the same day while all windows and doors closed. This experiment of maggots was quiet fun and put my personal hypothesis to rest.…

    • 255 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 lab 1

    • 636 Words
    • 4 Pages

    1. try giving the following commands and observe the behavior with each combination of options and arguments.…

    • 636 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 3 lab 3 nt1210

    • 275 Words
    • 1 Page

    Exercise 3.1.1 What would happen if wireless devices were not governed by the Wi- Fi Alliance and each vendor had its own standards and protocols? What impact would this have on your personal life or business communications? If each vendor had their own standards and protocols, we would have a harder time making devices that we use every day to inter-operate. We would to have multiple routers depending on the devices we own and probably would not be able to use internet when we’re in a café, library, or airport because of incompatibility.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Java Heap Size Problem

    • 406 Words
    • 2 Pages

    3. Repeat step 2 on gui.bat also located in the directory the tool was installed to.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays