Invert Pro

Selamat Datang...

Haiii haiiii Admin kembali lagi.

MULAIJOIN THIS SITE
Showing posts with label lain-lain. Show all posts
Showing posts with label lain-lain. Show all posts

Wednesday, June 15, 2016

Rahasia Sukses Bisnis Internet Marketing Via Twitter


STMIK AMIKOM YOGYAKARTA
E-COMMERCE

S1SI-04
JURUSAN SISTEM INFORMASI
SEKOLAH TINGGI MANAJEMEN INFORMATIKA DAN KOMPUTER
AMIKOM YOGYAKARTA
YOGYAKARTA

2016
Read more

Monday, May 2, 2016

Contoh WebSite + Database (Trial)



Read more

Laporan Ecommerce

This summary is not available. Please click here to view the post.
Read more

Sunday, February 14, 2016

Kunci chapter 1 IT Essentials: PC Hardware and Software

Kunci chapter 1 IT Essentials: PC Hardware and Software




1. Which type of memory is primarily used as cache memory?
SRAM


2. Which two considerations would be of the greatest importance when building a workstation that will run multiple virtual machines?
number of CPU cores amount
of RAM


3. Which two devices are considered input devices?
digital camera
biometric authentication device


4. Which three devices are considered output devices?
headphones
monitor printer

Read more

Wednesday, December 9, 2015

Final Comprehensive Exam (Modules 1 - 16)

Final Comprehensive Exam (Modules 1 - 16)





CORRECT - See section 1.3.3
Linux is written in:
  • C

CORRECT - See section 1.3.3
Source code refers to:
  • A human readable version of computer software

Get Free Traffic


Read more

Wednesday, December 2, 2015

Final Exam (Modules 9 - 16) NDG CISCO


Final Exam (Modules 9 - 16)



CORRECT - See section 9.5.2
The number of users logged in is in a variable called USERS. How would you test to see if 5 users are logged in?
  • test $USERS eq 5

WRONG - See section 9.5.2
Given the following script:
while [ ! f /tmp/foo ]; do
    echo n .
    process_data > /tmp/foo
done
Which of the following are true?
  • /tmp/foo will be removed if it exists

CORRECT - See section 9.5.2
A conditional that lets you make multiple comparisons with a pattern is called:
  • case

CORRECT - See section 9.5.3
What is the meaning of $(( $i + 1)) ?
  • 1 will be added to the i variable

CORRECT - See section 9.5.2
How would you write a test that says if /tmp/foo is a directory or USERS is greater than 5?
  • test d /tmp/foo o $USERS gt 5

CORRECT - See section 10.6
A division of a hard drive may be referred to as a _______ .
  • partition
  • slice

CORRECT - See section 10.6
Which of the following are valid partitioning types?
  • MBR
  • GPT

CORRECT - See section 10.6
The fdisk command is a tool used for working with the MBR partitioned disks.
  • True

CORRECT - See section 10.6
Which of the following is the valid device file name for the first IDE hard drive on the system?
  • /dev/hda

CORRECT - See section 10.8
Which of the following are valid video cable connector types?
  • VGA
  • DVI

CORRECT - See section 11.7
A command that will continuously update statistics about running processes:
  • top

CORRECT - See section 11.6
The following are valid Linux option styles:
  • Traditional Unix with a single dash (-)
  • BSD Unix without a dash
  • GNU long options with two dashes (--)

CORRECT - See section 11.4
Which file contains the information passed to the kernel at boot time?
  • /proc/cmdline

WRONG - See section 11.4
To make changes permanent for kernel parameter files found under /proc/sys, the following file can have entries added to it:
  • /etc/procctl.conf

CORRECT - See section 11.3.2.4
To get a list of all packages installed on a system using RPM Package Management you can execute:
  • rpm -qa

CORRECT - See section 12.3
Which of the following would be considered a host?
  • A printer attached to the network via an IP address

CORRECT - See section 12.7.4
What option to the netstat command has information shown as numbers rather than names?
  • -n

CORRECT - See section 12.7.7
Which of the following commands will allow you to log into the machine server1 with the account name nick?
  • ssh nick@server1

CORRECT - See section 12.7.7.1
The RSA key fingerprint allows the dig command to connect to remote systems.
  • False

CORRECT - See section 13.3
Which files contain user account information?
  • /etc/passwd
  • /etc/shadow

CORRECT - See section 13.7.1
Sudo privileges can be used to specify which user can use the sudo command to execute commands as other users.
  • True

CORRECT - See section 13.7.1
In distributions that do not allow the root user to login directly or via the su command, the installation process automatically configures one user account to be able to use the sudo command to execute commands as if they were executed by the root user.
  • True

CORRECT - See section 13.9
Which of the following commands will display how long the system has been running since the last boot?
  • w
  • uptime

WRONG - See section 13.3.2
The /etc/shadow file contains plain-text passwords.
  • True

CORRECT - See section 13.3.3
Which command can be used to view the /etc/passwd file entries?
  • getent

CORRECT - See section 14.12
Which command can be used to determine a user's most recent log in?
  • last

CORRECT - See section 14.7
Which of the following files contains encrypted user password information?
  • /etc/shadow

CORRECT - See section 14.8.2
Which of the following files contains user IDs?
  • /etc/passwd

WRONG - See section 14.3
Which of the following files does the groupadd command use to determine the new GID when a GID isn't specified?
  • /etc/shadow

CORRECT - See section 14.12.1
Which of the following commands, run as root, will prevent the user bob from logging in?
  • usermod -L bob

CORRECT - See section 15.6
The chmod command can be used on a file by:
  • The file owner and root

CORRECT - See section 15.6
Which option for the chown command can be used to change the owner of a directory and all the files and directories below it?
  • -R

CORRECT - See section 15.6
The chown command will only accept one file at a time as an argument.
  • False

CORRECT - See section 15.9
The "execute" permission is never set on files by default.
  • True

CORRECT - See section 15.7
The user owner of a file will always have the same or higher permissions as "other".
  • False

CORRECT - See section 16.8.3
A source and a hard link must be part of the same filesystem.
  • True

CORRECT - See section 16.8.3
Deleting a source file will break an associated symbolic link.
  • True

CORRECT - See section 16.8.3
A source file and a symbolic link must be part of the same file system.
  • False

CORRECT - See section 16.8.1
Which of the following commands would create a hard link, link to file?
  • ln file link

CORRECT - See section 16.8.2
Which of the following commands would create a symbolic link, link to file?
  • ln -s file link
Read more

Wednesday, November 25, 2015

JAWABAN NDG LINUX CHAPTER 15 - CHAPTER 16


JAWABAN NDG LINUX CHAPTER 15 - CHAPTER 16





WRONG - See section 15.7.2
Which of the following commands set "other" permissions on file to r-x?
  • chmod o=r+x file
Read more

Wednesday, November 18, 2015

JAWABAN NDG LINUX CHAPTER 13 - CHAPTER 14

NDG LINUX CHAPTER 13 - CHAPTER 14







CHAPTER 13



CORRECT - See section 13.3
Which files contain user account information?
  • /etc/passwd
  • /etc/shadow
Read more

Tuesday, November 10, 2015

Summary Chapter 1 - 4 Bahasa Indonesia

RINGKASAN CHAPTER (SUMMARY CHAPTER)








Materi:

Read more

Thursday, October 22, 2015

NDG LINUX CHAPTER 9

NDG Linux Essentials - CISCO Networking Academy - Questions and Answers 



CORRECT - See section 9.4
Which are appropriate editors for writing shell scripts?
  • nano
  • vi
Read more

Thursday, October 15, 2015

NDG LINUX CHAPTER 8


NDG Linux Essentials - CISCO Networking Academy - Questions and Answers

CORRECT - See section 8.4.5
Channel 2 is:
  • STDERR

CORRECT - See section 8.4.4
Which of the following commands will append its output to output.file?
  • echo Testing >> output.file

Read more

Thursday, October 8, 2015

NDG LINUX CHAPTER 5 - CHAPTER 7

NDG Linux Essentials - CISCO Networking Academy - Questions and Answers













CHAPTER 05

WRONG - See section 5.3.7
To search the man page sections for the keyword example, which of the following command lines could you execute?
  • man -k example
  • man -f example
Read more

Tuesday, October 6, 2015

NDG Linux CISCO Chapter 1 - Chapter 4



CORRECT - See section 1.3.3
Open source means:
·         You can view the software's source code
·         You can modify the software's source code

CORRECT - See section 1.3.1
The bootloaders job is to:
·         Load the kernel after the computer is powered on

CORRECT - See section 1.3.3
Open source licenses differ, but generally agree that:
·         You should have access to the source code of software
·         You should be able modify the software as you wish

CORRECT - See section 1.3
Linux is not Unix because:
·         It hasn't undergone certification
Read more

Wednesday, August 26, 2015

5 Soundtrack Battle Of Surabaya (2015)


Sinopsis Battle Of Surabaya. Film animasi 2D ini karya (STMIK AMIKOM Yogyakarta) yang di produksi oleh MSV Pictures. Cerita dari film ini diadaptasi dari peristiwa yang terjadi di Kota Surabaya pada 10 November 1945. Menceritakan perjalanan dari petualangan seorang semir sepatu yang bernama Musa. Musa merupakan salah satu pejuang arek – arek Suroboyo yang mengikuti pertempuran dahsyat pada 10 November 1945 di Surabaya. Biar tidak penasaran, dan tetap lebih mengagumkan, sebaiknya nontoh deh film nya di bioskop – bioskop terdekat di kotamu, atau bisa langsungdownload Film Battle Of Surabaya setelah movie nya beredar.
Read more