A+ Guide To It Technical Support
10th Edition
ISBN: 9780357108291
Author: ANDREWS, Jean.
Publisher: Cengage,
expand_more
expand_more
format_list_bulleted
Concept explainers
Textbook Question
Chapter 15, Problem 5TC
In question 4 above, your friend is having problems finding the bootmgr file and asks for your help. What is your best response?
a. Use diskpart commands to “unhide” and locate the file.
b. Use the File Explorer options applet to unhide the hidden bootmgr file.
c. Explain to your friend that performing a startup repair is a better option.
d. Explain to your friend that he can use the bootrec command to fix the bootmgr file without
having to copy another file to the computer.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
A user on Windows 10 is using the File Explorer to move a file from the C:data folder to the E:data folder. Disk C: can be formatted using NTFS, whereas disk D: can be formatted with FAT32.What happens to the file's permissions when it is transferred from the D:/ Drive?
Marques wants to create a new partition on a hard disk using the DiskPart utility. He is unsure about the
correct command to be used in this scenario. He knows that it is either CREATE, FORMAT, or NEW.
Which of the following commands should Marques type into the DiskPart command prompt?
help CREATE
b) DiskPart FORMAT
DiskPart CREATE
d)
help
e) Help DiskPart NEW
f) Any of these will work for his task!
An "ls -l" command has described a file as "drwxrwx--x".
While of the following statements about that file are true? Select all that apply.
A. Anyone can list the contents of this file with an "ls" command.
B. The owner can list the contents of this file with an "ls" command.
C. Anyone can access files within this directory if they already know the file name.
D. The group can add new files to the directory.
Chapter 15 Solutions
A+ Guide To It Technical Support
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- In many cases you will likely get better information by simply looking closely at the output you got when trying out the command in the other window. What command could you use to list the files in your fileAsst directory, using an absolute path to the fileAsst directory as part of your command? What command could you use to list the text files (only) in your fileAsst directory, using a relative path to the fileAsstdirectory as part of your command? The /usr/include directory contains a large number of C/C++ header files (all ending with a .h extension). What command would you give to list the names of the header files in that directory that include the string “it” as part of the name? One of the files you should now have in your fileAsst directory is TweedleDee/hatter.txt. Suppose that you wished to copy that file into your current (commandsAsst) directory. What command would you give to make that copy? For this, and for the following questions, You will want to delete all…arrow_forwardWrite the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.arrow_forwardWrite the command that can be used to perform the following: Back up the contents of the /var directory (which contains symbolically linked files) to the second nonrewinding SCSI tape device on the system using the tar utility. Append the file /etc/inittab to the archive created in Exercise 2a. Create a tarball called /stuff.tar.gz that contains all files in the /root/stuff directory. Use the cpio utility to back up all files in the /var directory (which contains symbolically linked files) to the first rewinding IDE tape device that has a block size of 5KB. Perform a full filesystem backup of the /var filesystem using the dump utility and record the event in the /etc/dumpdates file. Create an image of the /dev/sdb4 filesystem to the /sdb4.img file. View the contents of the archives created in Exercises 2a, 2c, 2d, and 2e. Extract the contents of the archives created in Exercises 2a and 2c to the /root directory. Extract the contents of the archives created in…arrow_forward
- Following the execution of the command umask 731, the permissions of all newly created files and folders will be altered.What will the permissions be on all new files in this case? a. rw-rw-rw b.rwxrw-r--c. -- -r--rw d.-- --wx--xarrow_forwardWrite the command that will locate all files that are larger than 10 megabytes in size, and copy each one to the directory "/overflow".arrow_forwardYou noticed a file in your home directory that has a + symbol appended to the mode.What does this indicate?a. Special permissions have been set on the file.b. The file has one or more files on the filesystem that are hard linked to it.c. The sticky bit directory permission has been set on the file and will remain inactiveas a result.d. Additional entries exist within the ACL of the file that can be viewed using thegetfacl command.arrow_forward
- A user runs the fsck command with the -a option on a filesystem that is showing signsof corruption. How would that user locate any files the system was unable to repair?a. Look in the root of the filesystem.b. The system prompts the user for a target location when it comes across a file itcannot repair.c. Mount the filesystem and check the lost+found directory underneath the mountpoint.d. View the contents of the directory /lostþfound.arrow_forwardAnswer all questions else downvote question 1. Create a script where you prompt the user for input, and the value provided will be a user. Loop through each file in that user's home directory (ignore the sub directories) and count the number of times a file contains the word ERROR (hint use 'wc' command to help with counting) and output the total number of errors at the end of the script. Once completed, take a screenshot of the source code of the script, and of the script executing, to execute the script you will need to create your own sample input, please include the sample input as part of your execution screenshot. question 2. What would be your current working directory if you changed directories to /log/././././../media/log/ssh/test/../users/ question 3. What would be your current working directory if you changed directories to /opt/test/usr/www/sbin/boot/pdfs/./spool/share/etc/./bin/.././httpd/arrow_forwardLinux Quiz (Accurate answers please!) Write the command to create a directory Write the command to print "hello World" to the terminal screen Write the command to move to the home directory of user linadm using a relative path. Write the command(s) that will set the color variable and send its value to a sub shell What login ids have access to the sudo command. Extract from the /etc/group file provide a list of all logins that run the bash shell. Include in your list the login name and login id #. Sort the results.arrow_forward
- After typing the ls –F command, you notice a filename that ends with an * (asterisk)character. What does this mean?a. It is a hidden file.b. It is a linked file.c. It is a special device file.d. It is an executable file.arrow_forwardOrson is trying to open an encrypted file on his Windows 10 system. The file was encrypted using EFS, and he opened this as recently as last week.Which of the following is most likely the reason that Orson is unable to open the file? a. Orson reset the password of his Windows user account. b. Orson created a duplicate copy of the file on another partition. c. Orson moved the file from its original folder to a different folder. d. Orson failed to back up the EFS certificate on a smart card.arrow_forwardOn the cmsy255 server, write a bash shell script called usrinfo that displays information about a specified user. Make sure the script file is executable. Also make sure that you can run the script without having to specify the directory. For example, you should NOT have to enter ./usrinfo in order for it to run. The script should: ● ● ● Accept 1 argument from the command line (this is the User ID that you want to display info for) finger the User ID display any lines from the who command that match this User ID display any lines from the ps -ef command that match this User ID In addition, if the number of arguments is not exactly 1, display an appropriate error message and exit with an exit code of 1.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Linux - Tutorial for Beginners in 13 MINUTES! [ UPDATED ]; Author: bai;https://www.youtube.com/watch?v=BMGixkvJ-6w;License: Standard YouTube License, CC-BY
What is Linux?; Author: Techquickie;https://www.youtube.com/watch?v=zA3vmx0GaO8;License: Standard YouTube License, CC-BY
Introduction to Linux and Basic Linux Commands for Beginners; Author: sakitech;https://www.youtube.com/watch?v=IVquJh3DXUA;License: Standard Youtube License