System Administration and IT Infrastructure Services – quiz answers

Coursera Google System Administration and IT Infrastructure Services quiz answers to all weekly questions (weeks 1-6):

  • Week 1: What is System Administration?
  • Week 2: Network and Infrastructure Services
  • Week 3: Software and Platform Services
  • Week 4: Directory Services
  • Week 5: Data Recovery & Backups
  • Week 6: Final Project

You may also be interested in Google IT Support Professional Certificate quiz answers.


Google IT Support Professional Certificate quiz answers

Technical Support Fundamentals – quiz answers

The Bits and Bytes of Computer Networking – quiz answers

Operating Systems and You: Becoming a Power User – quiz answers

IT Security: Defense against the digital dark arts – quiz answers


System Administration and IT Infrastructure Services quiz answers

System Administration and IT Infrastructure Services is Course 4 of the five-course Google IT Support Professional Certificate.

This course will transition you from working on a single computer to an entire fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. We’ll deep dive on cloud so that you’ll understand everything from typical cloud infrastructure setups to how to manage cloud resources. You’ll also learn how to manage and configure servers and how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster.

By the end of this course you’ll be able to: ● utilize best practices for choosing hardware, vendors, and services for your organization ● understand how the most common infrastructure services that keep an organization running work, and how to manage infrastructure servers ● understand how to make the most of the cloud for your organization ● manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP ● choose and manage the tools that your organization will use ● backup your organization’s data and know how to recover your IT infrastructure in the case of a disaster ● utilize systems administration knowledge to plan and improve processes for IT environments

Week 1: What is System Administration? Quiz answers

Welcome to the System Administration course of the IT Support Professional Certificate! In the first week of this course, we will cover the basics of system administration. We’ll cover organizational policies, IT infrastructure services, user and hardware provisioning, routine maintenance, troubleshooting, and managing potential issues. By the end of this module, you will understand the roles and responsibilities of a System Administrator. So let’s get started!

Question 1

Which of the following can be a responsibility of a systems administrator?

  • Setting up new user accounts and machines
  • Maintaining servers
  • Troubleshooting user issues
  • All of the above

A systems administrator has a wide range of responsibilities; this can include, but is not limited to, setting up new user accounts and machines; maintaining servers; and troubleshooting user issues.

Question 2

Which of the following make up IT infrastructure?

  • Hardware and software
  • Network
  • Operating systems
  • All of the above

IT infrastructure encompasses the software, hardware, network, operating systems, and other services required for an organization to operate in an enterprise IT environment.

Question 3

Which of these is considered a server? Check all that apply.

  • A software that provides a service to other software
  • Software that’s only available to the computer it’s installed on
  • Software that provides a service to other machines
  • A computer that provides a service to other computers

Servers are essentially software or computers that provide a service to other software or computers.

Question 4

A KVM switch is used to:

  • switch between multiple computers using one monitor, keyboard, and mouse
  • mount multiple servers into one server rack.
  • allow you to serve web content to many clients.
  • enable you to receive incoming SSH connections.

A KVM switch is a device used to switch between multiple computers using one keyboard and video display, like a monitor and mouse. That’s where the name “KVM” comes from!

Question 5

Which of these server hardware can you stack on top of each other in a server rack?

  • Blade
  • Tower
  • Desktop
  • Rack

A rack and a blade server lay flat and can be stacked on top of each other when you mount them on a server rack.

Question 6

With _, you can access your data, use applications, and more from anywhere in the world, as long as you have an Internet connection.

  • a PAN
  • cloud computing
  • a LAN

The cloud is a network of servers that store and process our data. We refer to the concept of cloud computing as a way to do our daily computer job functions from anywhere, as long as we have an Internet connection.

Question 7

What are the benefits of cloud computing over local computing? Check all that apply.

  • Services are accessible from anywhere in the world.
  • There are smaller starting costs for cloud computing.
  • There are potential long-term costs associated with cloud computing.
  • Software updates are handled by the company providing the service.

Cloud computing has some great benefits, like smaller starting costs, services that are accessible anywhere in the world with an Internet connection, and software updates that are handled by another company.

Question 8

What are the benefits of local computing over cloud computing? Check all that apply.

  • Updates can be handled at anytime.
  • There are potential long-term costs associated with local computing.
  • Services are handled by another organization, so that makes your organization dependent on a third party.
  • You have complete control of the IT infrastructure.

With local computing, you’re in complete control of your IT infrastructure and can update and secure your organization at anytime.

Week 1 Graded Assessment

Week 2: Network and Infrastructure Services quiz answers

In the second week of this course, we’ll learn about network and infrastructure services. We will cover what IT infrastructure services are and what their role is in system administration. We’ll also learn about server operating systems, virtualization, network services, DNS for web services, and how to troubleshoot network services. By the end of this module, you will know the most common IT infrastructure services you’ll encounter when handling system administration tasks.

Intro to IT Infrastructure Services

Question 1

Which of the following is considered a physical infrastructure service? Check all that apply.

  • Laptop
  • Desktop
  • Rack server
  • Operating systems

Physical infrastructure services are comprised of the physical hardware that an organization uses in their IT environment.

Question 2

Which of these is considered a network service? Check all that apply.

  • Wireless Internet
  • DNS
  • Blade server
  • Ethernet cables

Network services are comprised of networking components that an organization uses in their IT environment, like network protocols, network hardware, etc.

Question 3

Which of these is considered a software service? Check all that apply.

  • Chat applications
  • Word processors
  • Email applications
  • Wireless Internet

Software services are comprised of the software that an organization uses in its IT environment.

Physical Infrastructure Services

Question 1

If you’re running a server, which one of the follow operating systems would be best suited for your server?

  • Windows 10
  • Ubuntu Server
  • MacOS
  • Ubuntu

When running a server, it’s best to use a server operating system that’s been specifically optimized for server performance.

Question 2

What are the benefits of virtualizing servers? Check all that apply.

  • Better hardware resource utilization
  • Easier maintenance
  • Lower costs
  • Better performance than a dedicated server

Virtualizing servers offer lots of benefits, like enabling hardware to be better utilized, easier to maintain, and generally lower in cost.

Question 3

Which of the following do you need in order to SSH to a machine? Check all that apply.

  • An SSH client on the machine you want to connect from
  • A VPN connection
  • An SSH server on the machine you want to connect to
  • A virtual server to connect to

To make an SSH connection from one machine to another, you need to have an SSH client on the machine you want to connect from, along with an SSH server on the machine you want to connect to.

stopping and starting services—-

System-Administration-IT-Infrastructure

Week 2 Graded Assessment

Week 3: Software and Platform Services quiz answers

In the third week of this course, we’ll explore software and platform services. We’ll cover what types of software and platform services you may encounter in a tech role and how to manage them. We’ll learn how to configure email services, security services, file services, print services, and platform services. We’ll explore ways to troubleshoot platform services and common issues to look out for. By the end of this module, you’ll understand how to setup and manage the IT infrastructure services to help a business stay productive, keep information secure, and deliver applications to its users.

File, Print, and Platform Services

Question 1

What are the benefits of setting up an NFS server? Check all that apply.

  • Connecting to printers
  • Storing files on a network drive
  • Enabling files to be shared over a network
  • Serving web content

A network file storage, or NFS, server is used to store files on a network, and allow them to be shared with others.

Question 2

What methods could you use to set up printing in an organization? Check all that apply.

  • Directly connecting a printer
  • Setting up a print server
  • Using a cloud service to set up printers
  • Setting up an NFS server

From small to large organizations, you have lots of ways to set up a printer.

Question 3

When you have a web server, what service is used to enable HTTP requests to be processed?

  • An HTTP server
  • The web server
  • HTTP status codes
  • A database server

HTTP servers, like Apache web server, are used to process HTTP requests.

Question 4

You can use a(n) ______________to store large amounts of customer data for a website.

  • NFS server
  • HTTP server
  • database server
  • DNS server

Databases, like MySQL and PostgresSQL, are widely used to store data.

Software Services

Question 1

What are some communication services you can utilize in your organization? Check all that apply.

  • Email
  • Chat applications
  • DNS
  • Phones

Communication services, like chat applications, emails, and phone calls, allow you to communicate with others in an organization.

Question 2

What’s the difference between POP3 and IMAP? Check all that apply.

  • POP3 can only download email to one local device.
  • IMAP can only download email to one local device.
  • POP3 is used for sending emails.
  • IMAP can download emails onto multiple devices.

POP3 allows you to only download email to one device, which you may want to use if you want added privacy with your emails. IMAP allows you to download email onto multiple devices, which is the email protocol that’s widely used today.

Question 3

True or false: Commercial-use and personal-use software licenses are essentially the same thing.

  • True
  • False

Most software distributors have separate agreements for businesses. Before purchasing or installing any software, you should check the license agreement for the software.

Question 4

What are the differences between TLS and SSL? Check all that apply.

  • TLS is the successor to SSL.
  • TLS is more secure than SSL.
  • SSL is more secure than TLS.
  • SSL is the successor to TLS.

While TLS and SSL are used interchangeably, they do have differences. For example, the latest versions of TLS are more secure than SSL.

Troubleshooting Platform Services

Question 1

HTTP status codes that begin with 4xx, like 404, indicate errors on:

  • The client-side
  • The server-side
  • Nowhere; these codes are successful
  • Redirections

4xx HTTP status codes indicate an issue with the client, like entering a bad URL or accessing something they aren’t authorized to.

Question 2

HTTP status codes that begin with 5xx, like 501, indicate errors on:

  • The client-side
  • The server-side
  • Nowhere; these codes are successful
  • Redirections

5xx HTTP status codes indicate an issue with the server serving the web content.

# The ServerName directive sets the request scheme, hostname and port that
# the server uses to identify itself. This is used when creating
# redirection URLs. In the context of virtual hosts, the ServerName
# specifies what hostname must appear in the request’s Host: header to
# match this virtual host. For the default virtual host (this file) this
# value is not decisive as it is used as a last resort host regardless.
# However, you must set it for any further virtual host explicitly.
#ServerName www.example.com

ServerAdmin [email protected]
DocumentRoot /var/www/ourcompany

<Directory /var/www/ourcompany>
    Options +Includes
    XBitHack on
</Directory>

# Available loglevels: trace8, ..., trace1, debug, info, notice, warn,
# error, crit, alert, emerg.
# It is also possible to configure the loglevel for particular
# modules, e.g.
#LogLevel info ssl:warn

ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined

# For most configuration files from conf-available/, which are
# enabled or disabled at a global level, it is possible to
# include a line for only one particular virtual host. For example the
# following line enables the CGI configuration for this host only
# after it has been globally disabled with "a2disconf".
#Include conf-available/serve-cgi-bin.conf

vim: syntax=apache ts=4 sw=4 sts=4 sr noet

Week 3 Graded Assessment

Week 4: Directory Services quiz answers

In the fourth week of this course, we’ll learn about directory services. Specifically, we’ll cover how two of the most popular directory services, Active Directory and OpenLDAP, work in action. We’ll explore the concept of centralized management and how this can help SysAdmins maintain and support all the different parts of an IT infrastructure. By the end of this module, you will know how to add users, passwords, and use group policies in Active Directory and OpenLDAP.

Active Directory

Question 1

What is Active Directory? Check all that apply.

  • An open-source directory server
  • A Windows-only implementation of a directory server
  • Microsoft’s implementation of a directory server
  • An LDAP-compatible directory server

Active Directory is Microsoft’s Windows-specific implementation of a directory server. It’s fully LDAP compatible, so it works with any LDAP-supported client, though it has some features unique to the Windows ecosystem.

Question 2

How is an Organizational Unit different from a normal container?

  • It’s not; it’s just a different name for a container x
  • It can hold other objects
  • It can only hold other containers
  • It can hold additional containers

An Organizational Unit is a special type of container that can hold other containers.

Question 3

When you create an Active Directory domain, what’s the name of the default user account?

  • Superuser
  • Root
  • Username
  • Administrator

The default account in an AD domain is Administrator.

Question 4

True or false: Machines in the Domain Controllers group are also members of the Domain Computers group.

  • True
  • False

While Domain Controllers are technically computers, they’re not included in the Domain Computers group. The Domain Computers group holds all computers joined to a domain for an organization, except for the Domain Controllers, which belong in the DC group.

Question 5

In what way are security groups different from distribution groups?

  • They’re the exact same thing.
  • Security groups are used for computers, while distribution groups are used for users.
  • Security groups are used for users, while distribution groups are used for computers.
  • Security groups can be used to provide access to resources, while distribution groups are only used for email communication.

They’re both groups, but a security group can be used to permit members of the group to access a resource, while a distribution group is only used for email communication.

Question 6

What’s the difference between changing a password and resetting a password?

  • Changing a password requires the previous password.
  • Changing a password does not require the previous password.
  • Resetting a password locks the account.
  • They’re the same.

When changing a password, the previous password must be supplied first. When resetting the password, an administrator is able to override this and set the password without knowledge of the previous one.

Question 7

True or false: Joining a computer to Active Directory involves joining the computer to a workgroup.

  • True
  • False

Joining a computer to Active Directory means binding it, or joining it, to the domain. An AD computer account is then created for it. A workgroup is a collection of standalone computers, not joined to an AD domain.

Question 8

Joining a computer to an AD domain provides which of the following advantages? Check all that apply.

  • Centralized authentication
  • More detailed logging
  • Centralized management with GPOs
  • Better performance

Active Directory can be used to centrally manage computers that are joined to it by pushing Group Policy Objects. Computers joined to a domain will also authenticate, using Active Directory user accounts instead of local accounts, providing centralized authentication, too.

Question 9

What are Group Policy Objects?

  • Special types of containers
  • Special types of computers groups
  • Special types of user groups
  • Settings for computers and user accounts in AD

GPOs are objects in AD that hold settings and preferences, which can be applied to user accounts or computer accounts. GPOs allow for centralized management of accounts and computers.

Question 10

What’s the difference between a policy and a preference?

  • They’re the exact same thing.
  • A policy is used to set a preference.
  • A policy is enforced by AD, while a preference can be modified by a local user.
  • A policy can be modified by a local user, while a preference is enforced by AD.

Policies are settings that are enforced and reapplied regularly, while preferences are defaults for various settings, but can be modified by users.

Question 11

With a brand new AD domain, what do you need to change before you can target groups of users and machines with GPOs?

  • Nothing; the default configuration is good to go.
  • You need to place users and computers into new OUs.
  • You need to create an administrator account.
  • You need to rename the default groups.

Since GPOs can only be applied to sites, domains, and OUs, and because the default users and computers groups in AD are not OUs, GPOs cannot target these groups directly. In order to target specific groups of users or computers, new OUs need to be created, and users or accounts need to be added to them.

Question 12

Select the right order of enforcement of GPOs:

  • Site – Domain – OU
  • OU – Domain – Site
  • Domain – Site – OU
  • Site – OU – Domain

When GPOs collide, they’re applied according to site first and domain second. Then, any OUs are applied from least specific to most specific.

Question 13

What can we use to determine what policies will be applied for a given machine?

  • gpupdate
  • A control panel
  • A test domain
  • An RSOP report

Question 14

How does a client discover the address of a domain controller?

  • It’s pushed via an AD GPO.
  • It sends a broadcast to the local network.
  • It makes a DNS query, asking for the SRV record for the domain.
  • It’s provided via DHCP.

The client will make a DNS query, asking for the SRV record for the domain. The SRV record contains address information for domain controllers for that domain.

Question 15

Which of the following could prevent you from logging into a domain-joined computer? Check all that apply.

  • You’re unable to reach the domain controller.
  • Your computer is connected to Wifi.
  • The user account is locked.
  • The are time and date are incorrect.

If the machine is unable to reach the domain controller for whatever reason, it wouldn’t be able to authenticate against AD. Since AD authentication relies on Kerberos for encryption, authentication against AD will depend on the time being synchronized to within five minutes of the server and client. And of course, if the user account is locked, you won’t be able to authenticate to the account or log into the computer.

Centralized Management and LDAP

Question 1

Which of these are examples of centralized management? Check all that apply.

  • Role-based access control
  • Centralized configuration management
  • Copying configurations to various systems
  • Local authentication

Role-based access control makes it easier to administer access rights by changing role membership and allowing for inheritance to grant permissions (instead of granting each permission individually for each user account). Centralized configuration management is an easier way to manage configurations for services and hardware. By centralizing this, it becomes easier to push changes to multiple systems at once.

Question 2

Which of these are components of an LDAP entry? Check all that apply.

  • Uncommon Name
  • Common Name
  • Organizational User
  • Distinguished Name

The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

Question 3

What’s does the LDAP Bind operation do exactly?

  • Modifies entries in a directory server
  • Looks up information in a directory server
  • Authenticates a client to the directory server
  • Changes the password for a user account on the directory server

The Common Name contains a descriptor of the object, like the full name for a user account. A Distinguished Name is the unique name for the entry, and includes the attributes and values associated with the entry.

Question 4

Which of the following are authentication types supported by the LDAP Bind operation? Check all that apply.

  • Anonymous
  • Simple
  • Complex
  • SASL

Bind operations support three different mechanisms for authentication: (1) Anonymous, which doesn’t actually authenticate at all, and allows anyone to query the server; (2) Simple, which involves sending the password in plaintext; and (3) SASL, or Simple Authentication and Security Layer, which involves a secure challenge-response authentication mechanism.

Introduction to Directory Services

Question 1

What does a directory server provide?

  • A real-time communication service
  • A network time service
  • A lookup service for an organization
  • A replication service

A directory service allows members of an organization to lookup information about the organization, like network resources and their addresses.

Question 2

What benefits does replication provide? Check all that apply.

  • Redundancy
  • Enhanced security
  • Increased capacity
  • Decreased latency

Directory server replication grants you redundancy by having multiple copies of the database being served by multiple servers. The added servers that provide lookup services also reduce the latency for clients querying the service.

Question 3

What’s the most popular directory services protocol used today?

  • Directory Access Protocol
  • Directory System Protocol
  • Lightweight Directory Access Protocol
  • Directory Operational Binding Management Protocol

LDAP is the most popular and widely used directory access protocol today.

Week 4 Graded Assessment

Week 5: Data Recovery & Backups quiz answers

In the fifth week of this course, we’ll learn about data recovery and backups. In any tech role, it’s important to know how to backup and recover data — it’s even more important for system administration. We will also learn about common corporate practices like designing a disaster recovery plan and writing post-mortem documentation. By the end of this module, you’ll know the tradeoffs between on-site and off-site backups, understand the value and importance of backup and recovery testing, know different options for data backup (as well as the risks) and understand the purpose and contents of a disaster recovery plan.

Disaster Recovery Plans

Question 1

What elements should a disaster recovery plan cover? Check all that apply.

  • Detection measures
  • Preventative measures
  • Recovery measures
  • Drastic measures

A disaster recovery plan shouldn’t only have recovery procedures; it should include detection measures so that you can be made aware of an incident, along with preventative measures to help avoid a disaster in the first place.

Question 2

Why are detection measures included in a disaster recovery plan?

  • They aren’t
  • Because it’s important to know when a disaster occurs
  • Because they prevent data loss
  • Because they make recovering from data loss easier

The sooner you can be alerted that an incident is going on, the quicker you can take measures to stop it.

Question 3

What are good preventative measures to incorporate in your organization? Check all that apply.

  • Monitoring and alerting systems
  • Redundant systems
  • Regular backups
  • Accessible and up-to-date documentation

Good documentation is considered a preventative measure, since it can avoid costly mistakes and make handling outages or system failures easier.

Question 4

What are good detection measures to incorporate in your organization? Check all that apply.

  • Environmental monitoring
  • Backing up firewall rules
  • Redundant power supplies
  • System performance monitoring

Monitoring the environmental conditions in a server room will alert you if things might cause problems for your equipment. System performance monitoring can also alert you to anomalies in requests or traffic to a server.

Question 5

What are good recovery measures to incorporate in your organization? Check all that apply.

  • Restoring server configs from backup
  • Following detailed recovery plan documentation
  • Monitoring for internet line outages
  • Maintaining redundant servers

Maintaining backups of server configs will make restoring a damaged system much quicker and easier. Detailed documentation on how exactly to do this will also speed up this process.

Planning for Data Recovery

Question 1

How can you recover from an unexpected data loss event? Check all that apply.

  • Write a post-mortem report.
  • Recover data from damaged devices.
  • Restore data from backups.
  • Design a disaster recovery plan.

Question 2

Where is it best to store backups, physically?

  • On-site
  • Off-site
  • In a safe
  • Across multiple locations

Ideally, backups should be stored in multiple physical locations to reduce the risk of a catastrophe causing you to lose your backups. Typically, data would be backed up somewhere locally, and the backups would be replicated and stored off-site.

Question 3

Which of these should be included in your backups? Check all that apply.

  • Firewall configurations
  • A downloads folder
  • Family vacation photos
  • Sales databases

Critical data for an organization, like firewall configs and relevant databases, should be included in the backup plans.

Question 4

What’s magnetic tape backup media best suited for?

  • Long-term archival data
  • Low-latency cached data
  • Cheap backup systems
  • Quick and efficient backups

Magnetic tape media is very cheap, but it’s also super slow and inconvenient to retrieve data from. This makes it a good option for archiving old data that won’t be needed often.

Question 5

Why is it important to test backups and restoration procedures? Check all that apply.

  • To reduce the size of backup data
  • To speed up the backup-and-restore process
  • To ensure backups work and data can be restored from them
  • To ensure that relevant data is included in the backups

It’s super important to test backups and restore procedures to ensure that they actually work! Backup archives could be corrupt or inconsistent, preventing proper restoration. Restore procedures are just as important to test, to ensure that critical data can be extracted from backups if a disaster strikes. Disaster testing can also reveal any gaps in your backup coverage without risking real-world data loss.

Question 6

Which of the following backup types are most space-efficient?

  • Full backups
  • Differential backups
  • Incremental backups

Incremental backups are the most efficient. While they start with a full backup, on subsequent runs, they only backup the parts of files that have changed since the last run.

Question 7

True or false: You can use a RAID array and use rsync to copy critical data to it for backups.

  • True
  • False

A RAID array isn’t a replacement for a backup system because it doesn’t protect against data corruption or deletion.

Post-Mortems

Question 1

What’s the intent behind writing a post-mortem?

  • To assign blame for mistakes
  • To assign legal liability
  • To learn from mistakes and improve in the future
  • To scare people into avoiding risky behavior

A post-mortem is meant to analyze what happened around an incident to identify what went wrong so it can be avoided in the future.

Question 2

What should the timeline in a post-mortem include? Check all that apply.

  • Actions taken before, during, and after the event
  • A detailed analysis of the incident, including root cause and scope
  • Detailed dates and times
  • A summary of the incident and how long it lasted

The timeline should include actions taken leading up to, during, and after the incident, along with the dates and times when these actions were taken.

Week 5 Graded Assessment

Week 6: Final Project quiz answers

Congratulations, you’ve made it to the final week in the course! The last week of this course is dedicated to the final project. For the final project, you will apply all the skills you’ve learned in this course by providing systems administration consultation. You will assess the IT infrastructure of three fictitious (but very real-life based!) companies and provide recommendations and advice about how to support their IT infrastructure. By the end of this project, you will demonstrate the skills and problem-solving techniques of a SysAdmin. Good luck!

Week 6 Graded Assessment

Related content

Google Data Analytics Professional Certificate Course 1: Foundations – Cliffs Notes

How to break into information security

How to get CCNA certification

IT career paths – everything you need to know

Network security risk mitigation best practices

Professional ethical hacking body of knowledge

The GRC approach to managing cybersecurity

The Security Operations Center (SOC) career path

What do ethical hackers do?

What is the Google Cybersecurity Professional Certificate?

Back to DTI Courses

1st Annual University of Ottawa Supervisor Bullying ESG Business Risk Assessment Briefing

Disgraced uOttawa President Jacques Frémont ignores bullying problem

How to end supervisor bullying at uOttawa

PhD in DTI uOttawa program review

Rocci Luppicini – Supervisor bullying at uOttawa case updates

The case for policy reform: Tyranny

The trouble with uOttawa Prof. A. Vellino

The ugly truth about uOttawa Prof. Liam Peyton

uOttawa engineering supervisor bullying scandal

uOttawa President Jacques Frémont ignores university bullying problem

uOttawa Prof. Liam Peyton denies academic support to postdoc

Updated uOttawa policies and regulations: A power grab

What you must know about uOttawa Prof. Rocci Luppicini

Why a PhD from uOttawa may not be worth the paper it’s printed on

Why uOttawa Prof. Andre Vellino refused academic support to postdoc

Supervisor Bullying

Text copying is disabled!