Which statement is true regarding the user exec and privileged exec mode?
A. They both require the enable password
B. User exec is a subset of the privileged exec
C. The '?' only works in Privileged exec
D. They are identica

1 Answer

Answer :

User exec is a subset of the privileged exec

Related questions

Description : What is an administrative (privileged) user? (for DBA

Last Answer : Oracle DBAs and operators typically use administrative accounts to manage the database and database instance. An administrative account is a user that is granted SYSOPER or SYSDBA privileges. SYSDBA ... and special operating system groups. This password file is created with the orapwd utility.

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : A subset of a network that includes all the routers but contains no loops is called ________ a. spanning tree b. spider structure c. spider tree d. special tree

Last Answer : a. spanning tree

Description : The subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : One subset of a network that includes all the routers but contains no loops is called ________ A. spanning tree B. spider structure C. spider tree D. special tree

Last Answer : A. spanning tree

Description : The Token Ring implementation works on the __ mode. A. Contention B. Reservation C. Round Robin D. None

Last Answer : C. Round Robin

Description : One of the disadvantages of user level threads compared to Kernel level threads is (1) If a user level thread of a process executes a system call, all threads in that process are ... privileges. (4) The library procedures invoked for thread management in user level threads are local procedures.

Last Answer : If a user level thread of a process executes a system call, all threads in that process are blocked.

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : Both of above

Description : True or False: Hockey is a privileged sport?

Last Answer : I have always thought just the opposite, at least initially its seems as if it was mostly blue collar types who lived in areas where cold winters are the norm. Perhaps that is different now. ... fighting is a bit of unnecessary theatre but other than that, I think the skill level is spectacular.

Description : Dynamic routing protocol enable routers to a. Dynamically discover and maintain routes b. Distribute routing updates to other routers c. Reach agreement with other routers about the network topology d. All of the above

Last Answer : d. All of the above

Description : The ………………………. protocol was originally developed as a mechanism to enable diskless hosts to be remotely booted over a network as workstations. A. RARP B. ARP C. DHCP D. BOOTP

Last Answer : D. BOOTP

Description : A transmission mode that can transmit data in both the directions but transmits in only one direction at a time. a) simplex b) half duplex c) full duplex d) semi-duplex

Last Answer : b) half duplex

Description : Should app makers be able to require you to enable tracking or track your activity without your knowledge?

Last Answer : .

Description : Which of the following statement is incorrect? a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in synchronous transmission. b. Half ... in online activities d. Batch processing is the prefered processing mode for telecommunication operation.

Last Answer : Batch processing is the prefered processing mode for telecommunication operation.

Description : How to enable offline mode in google chrome android app?

Last Answer : There is an option on your android app for chrome to access data offline later. Actually this feature is not named as a menu button called offline or online. To use this feature you have to ... is ON. Using this feature you can access most frequently checking documents even in offline mode later on.

Description : Regarding a VDU, Which statement is more correct? a. It is an output device b. It is an input device c. It is a peripheral device d. It is hardware item

Last Answer : It is a peripheral device

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... . d. The procedures performed do not enable the accountant to express any form of assurance.

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information

Description : Which of the following is incorrect regarding a compilation engagement? a. The CPA uses his auditing expertise to collect, classify and summarize financial information. b. The CPA should exercise due ... form. d. The procedures performed do not enable the accountant to express any form of assurance

Last Answer : The CPA uses his auditing expertise to collect, classify and summarize financial information.

Description : Cdma2000 works in TDD mode only. a) True b) False

Last Answer : b) False

Description : W-CDMA works in FDD mode only. a) True b) False

Last Answer : b) False

Description : Which of the following are true characteristics of SaaS service model? A. The software applications are maintained by the vendor. B. They can be scaled up or down on demand. C. SaaS applications are cost-effective since they do not require any maintenance at end user side. D. All of the above

Last Answer : All of the above

Description : My ipod won't let me access my mail? It says "The user name or password for "imap.apple.yahoo.com" is incorrect" and I know my password and username are both correct.

Last Answer : you should try the apple support forums.

Description : Should we privileged people of the US cut some slack to those immigrants from 3rd world nations on possible body odor?

Last Answer : answer:I've heard these same comments most frequently made about the French and last I checked, they're not exactly a Third World country (many apparently don't believe in either frequent bathing nor in ... conference for movement theater performers.) And this was in a week or two in the summer :).

Description : If you got to choose to grow up privileged or disadvantaged, which you honestly choose?

Last Answer : You can be rich and end up being lonely and unhappy? You can be the happiest person but you might be poor so honestly speaking, as long as I’m happy it doesn’t matter. I think I would choose to be raised in a family of privilege and then help out the poor? Sounds fair :)

Description : What can I do to understand the less privileged?

Last Answer : Lately I have been speaking to someone who has gone through a lot of hardship and trauma, and all I want is to understand what living in a country with a lot of crime, abuse, lack of ... were traumatic, that they are willing to share about trips or honest work I would really love to listen.

Description : Working papers prepared by a CPA in connection with an audit engagement are owned by the CPA, subject to certain limitations. The rationale for this rule is to a. Protect the ... d. Establish a continuity of relationship with the client whereby indiscriminate replacement of CPAs is discouraged.

Last Answer : Provide the CPA with evidence and documentation which may be helpful in the event of a lawsuit.

Description : The working papers prepared by a CPA in connection with an audit engagement are owned by the CPA, subject to certain limitations. The rationale for this rule is to a. Protect the ... d. Establish a continuity of relationship with the client whereby indiscriminate replacement of CPAs is discouraged

Last Answer : Provide the CPA with evidence and documentation which may be helpful in the event of a lawsuit

Description : In matriarchal societies women are a. Key decision-makers. b. Hold the privileged positions. c. Community leaders. d. All of the above.

Last Answer : d. All of the above.

Description : __________ is the value of the benefit that is given up by selecting one alternative rather than another 1. Benefit loss 2. Opportunity cost 3. Privileged cost 4. Selection cost 5. Exchange loss

Last Answer : Opportunity cost

Description : __________ is the value of the benefit that is given up by selecting one alternative rather than another. A)Benefit loss B)Opportunity cost C)Privileged cost D)Selection cost E)Exchange loss

Last Answer : B)Opportunity cost

Description : The public school is __________ (A) a comprehensive school for bright children in which the tuition is free. (B) a specialized school for talented children in which the tuition fee is quite low. (C) a ... children in which the tuition fee is very high. (D) a common boarding school for all children.

Last Answer : (C) a private school for privileged children in which the tuition fee is very high.

Description : System calls are usually invoked by using: (A) A privileged instruction (B) An indirect jump (C) A software interrupt (D) Polling

Last Answer : (C) A software interrupt

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : An advantage of a network is You can get hacked You can share peripherals You need to remember your password All of the mentioned

Last Answer : You can share peripherals

Description : Communiction circuits that transmit data in both directions but not at the same time are operating in a. a simplex mode b. a half duplex mode c. a full duplex mode d. an asynchronous mode

Last Answer : a half duplex mode

Description : Gigabit Ethernet access methods include _______ mode. A) half-duplex B) full-duplex C) both (a) and (b) D) neither (a) nor (b)

Last Answer : both (a) and (b)

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : Mobile Marketing is a subset of Mobile Advertising  TRUE  FALSE

Last Answer :  TRUE

Description : Select operator is not a unary operator. ii) Project operator chooses subset of attributes or columns of a relation. A) i-True, ii-False B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : C) i-False, ii-True

Description : Reflexivity property says that X Y is true if Y is …………………. A) Subset of X B) Null set of X C) Super set of Y D) Subset of Y

Last Answer : A) Subset of X

Description : Which of the following statements is true? (A) Smart cards do not require an operating system. (B) Smart cards and PCs use some operating system. (C) COS is smart card operating system. (D) The communication between reader and card is in full duplex mode.

Last Answer : (C) COS is smart card operating system

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : The standard ASCII A. is version II of ASC B. is used only in US and Canada C. has 132 characters including 32 control characters D. is subset of 8-bit EBCDIC code

Last Answer : C. has 132 characters including 32 control characters

Description : When installing applications in iPhone, why does some apps require Apple ID but some others don’t If we enter our Apple ID, does it potentially cause risk as the application own can know our password How to check this security concern?

Last Answer : The application will not be given your Apple ID password when you are prompted to enter it in the app store for download. Typically, if it does not ask for your password, you most likely have ... the word "open" that means that app is already downloaded onto your current device. Hope this helps!

Description : Could someone make an app that can recognize who the user is and give him a mulligan if he gets one or two letters off in his/her password?

Last Answer : answer:Not that I know of any superb app like that If you have troubles remembering your passwords, why don't you just note them down? Either on your computer or your phone or ... convenient. I suggest you note down like this: For example: Fluther Username: talljasperman Password: password

Description : I have totally forgotten my password for my user account on my computer and do not know what to do?

Last Answer : Did you ever write it down anywhere? Tell anyone? I'd start there first. (Don't know if you have already ?) Then, do you have any other account on the computer that you can access, or ... sure there's a way to manually override accounts inside another. And if no wait for @FutureMemory's response