UNIX MULTIPLE CHOICE QUESTION Check your Knowledge Press

  • Slides: 53
Download presentation
UNIX MULTIPLE CHOICE QUESTION

UNIX MULTIPLE CHOICE QUESTION

Check your Knowledge Press to Start www. prolearninghub. com

Check your Knowledge Press to Start www. prolearninghub. com

1. Unix is portable because it is written in Java Assembly language C language

1. Unix is portable because it is written in Java Assembly language C language English www. prolearninghub. com

2. The letters BSD represent Berkeley School Design Boston System Design Berkeley Software Development

2. The letters BSD represent Berkeley School Design Boston System Design Berkeley Software Development Boise School Definition www. prolearninghub. com

3. Unix is gaining some popularity again because of U. S. space program The

3. Unix is gaining some popularity again because of U. S. space program The internet Microsoft windows IBM www. prolearninghub. com

4. One of the first software from the GNU project was VI editor C-shell

4. One of the first software from the GNU project was VI editor C-shell EMACS editor AWK program www. prolearninghub. com

5. The free software foundation was established because of BSD LINUX Microsoft GNU project

5. The free software foundation was established because of BSD LINUX Microsoft GNU project www. prolearninghub. com

6. The part of the Unix operating system that interacts with the hardware is

6. The part of the Unix operating system that interacts with the hardware is called GNU project The kernel The shell Linux www. prolearninghub. com

7. The man credited with starting Linux is Linus Torvalds Ken Thompson Linux smith

7. The man credited with starting Linux is Linus Torvalds Ken Thompson Linux smith Richard Stallman www. prolearninghub. com

8. Free. BSD is A) Free B) Not really free C) Both A and

8. Free. BSD is A) Free B) Not really free C) Both A and D D) Include the source code www. prolearninghub. com

9. Which of the following people were not major factors in the development of

9. Which of the following people were not major factors in the development of Unix? A. Dennis Ritchie Ken Thompson Bill Gates Linux Torvalds www. prolearninghub. com

10. Which are the major branches in the Unix family tree? AIX and Solaris

10. Which are the major branches in the Unix family tree? AIX and Solaris BSD and SYS V Sys V and Solaris Linux and BSD www. prolearninghub. com

11. The dmesg command. Shows user login logoff attempts Shows the syslog file for

11. The dmesg command. Shows user login logoff attempts Shows the syslog file for info messages Shows the daemon log messages Kernel log messages www. prolearninghub. com

12. Which command is used to set terminal IO characteristic? tty ctty ptty stty

12. Which command is used to set terminal IO characteristic? tty ctty ptty stty www. prolearninghub. com

13. Which command is used to record a user login session in a file

13. Which command is used to record a user login session in a file macr Read Script None of these www. prolearninghub. com

14. Which command is used to display the operating system name OS Unix Kernel

14. Which command is used to display the operating system name OS Unix Kernel Uname www. prolearninghub. com

15. Identify the command that used to detect Unix version uname -r uname -n

15. Identify the command that used to detect Unix version uname -r uname -n uname -t Kernel www. prolearninghub. com

16. Which command is used to print a file Print ptr Ipr None of

16. Which command is used to print a file Print ptr Ipr None of these www. prolearninghub. com

17. Which command is used to find resource limits to the session? rlimit Ulimit

17. Which command is used to find resource limits to the session? rlimit Ulimit setrlimit getrlimit www. prolearninghub. com

18. Which of the following time stamps need not exist for a file on

18. Which of the following time stamps need not exist for a file on traditional unix file system Access Time Modification time Change time Creation time www. prolearninghub. com

19. Which command is used to set limits on file size usize Flimit Ulimit

19. Which command is used to set limits on file size usize Flimit Ulimit www. prolearninghub. com

20. Which symbol will be used with grep command to match the pattern pat

20. Which symbol will be used with grep command to match the pattern pat at the beginning of a line? ^pat $pat Pat^ Pat$ www. prolearninghub. com

21. Which command is used to sort the lines of data in a file

21. Which command is used to sort the lines of data in a file in reverse order sort sh st Sort-r www. prolearninghub. com

22. The agency that sits between the user and the UNIX system is called

22. The agency that sits between the user and the UNIX system is called the Logic Profile Shell Exrc www. prolearninghub. com

23. Which of the following commands is used to update access and modification times

23. Which of the following commands is used to update access and modification times of a file? grep wc Touch cat www. prolearninghub. com

24. Which command is used to count just the number of characters in a

24. Which command is used to count just the number of characters in a file? wc - 1 wc - c wc - w wc - r www. prolearninghub. com

25. Which of the following commands is used to list contents of directories? Is

25. Which of the following commands is used to list contents of directories? Is Ip dir tar www. prolearninghub. com

26. Which command is used to display a file contents in octal form? cd

26. Which command is used to display a file contents in octal form? cd od of oct www. prolearninghub. com

27. Which of the following files contains information related to password aging? shadow Profile

27. Which of the following files contains information related to password aging? shadow Profile Password All of them www. prolearninghub. com

28. Which command will be used with vi editor to replace text from cursor

28. Which command will be used with vi editor to replace text from cursor to right? r R s S www. prolearninghub. com

29. Which of the following commands is used to rename a file? rename remove

29. Which of the following commands is used to rename a file? rename remove mv ren www. prolearninghub. com

30. Which of the following is not a filter? cat grep wc None of

30. Which of the following is not a filter? cat grep wc None of these www. prolearninghub. com

31. To find the block size on your file system the command is Blksz

31. To find the block size on your file system the command is Blksz Szblk Chksz Cmchk www. prolearninghub. com

32. Each entry in inode table is of size 64 kb 32 bytes 64

32. Each entry in inode table is of size 64 kb 32 bytes 64 bytes www. prolearninghub. com

33. The program contained in boot block, that loads kernel into memory is called

33. The program contained in boot block, that loads kernel into memory is called Disk Bootstrap program Mater boot program Shell program None of these www. prolearninghub. com

34. The state of the file system is contained in Boot block A special

34. The state of the file system is contained in Boot block A special block created by Book Block Super block None of these www. prolearninghub. com

35. Which file gets executed when we use the passwd command /etc/passwd /etc/pwd /bin/passwd

35. Which file gets executed when we use the passwd command /etc/passwd /etc/pwd /bin/passwd www. prolearninghub. com

36. The command cal j 1997 would give the output as The calendar of

36. The command cal j 1997 would give the output as The calendar of jan, june and july 1997 Only calender of jan 1997 An error None of bove www. prolearninghub. com

37. The output of command banner “Unix shell programming” would be A banner showing

37. The output of command banner “Unix shell programming” would be A banner showing ‘unix’, ’shell’ and ‘programming’ words displayed in separate lines A banner showing ‘unix shell’ in one single line A banner showing ‘unix shell programming’ in one line nothing www. prolearninghub. com

38. To see the last access time of various files in a file system

38. To see the last access time of various files in a file system the command is Is-Iu Is-I s-acc s-mt www. prolearninghub. com

39. To ascertain what are the contents of the file in your the system

39. To ascertain what are the contents of the file in your the system the best way would be Do a cat command on each file and find its contents Use the command cat* Use the command file* None of these www. prolearninghub. com

40. Which of these is not a command of Unix related with DOS Dosdir

40. Which of these is not a command of Unix related with DOS Dosdir a: proj Doscp/HOME/Proj/Prg a: / Doscopy trial a: / Dosls www. prolearninghub. com

41. Unix OS was first developed by Dosdir a: proj Doscopy trial a: /

41. Unix OS was first developed by Dosdir a: proj Doscopy trial a: / Doscp/HOME/Proj/Prg a: / dosls www. prolearninghub. com

42. Which of the following is the main limitation for not running a Web

42. Which of the following is the main limitation for not running a Web server over a small home network connected to the Internet with a cable modem: Hardware limitations Software limitations Service agreement with ISP Security risk www. prolearninghub. com

43. Which of the following is not an advantage of Apache over other mail

43. Which of the following is not an advantage of Apache over other mail servers: Apache is modular. Apache's installation is simple. Apache can be ported to every known and stable operating system. www. prolearninghub. com

44. Which of the following is NOT an advantage of WN over Apache: WN

44. Which of the following is NOT an advantage of WN over Apache: WN supports newer technologies than Apache. WN is wholly HTTP compliant. WN supports newer design tools, like Server Side Includes, than Apache. WN has a smaller disk footprint than Apache www. prolearninghub. com

45. Which mail process is first used when mail is send for the sender's

45. Which mail process is first used when mail is send for the sender's mail client program: TA MDA MBA MUA www. prolearninghub. com

46. Which of the following is the most used mail server: qmail exim postfix

46. Which of the following is the most used mail server: qmail exim postfix sendmail www. prolearninghub. com

47. Which of the following is the most secure remote access service: telnet rsh

47. Which of the following is the most secure remote access service: telnet rsh rlogin ssh www. prolearninghub. com

48. Which of the following entries in the /etc/inetd. conf file define the data

48. Which of the following entries in the /etc/inetd. conf file define the data flow method used by the service: service and socket Service socket and protocol Flag www. prolearninghub. com

49. Which of the following configuration files provides the path name for each of

49. Which of the following configuration files provides the path name for each of the servers and identifies the port on which each service listens for connections: /etc/inetd. conf /etc/services x 0. host /etc/svc www. prolearninghub. com

50. The mv command changes Only the directory entry and i-node Only the i-node

50. The mv command changes Only the directory entry and i-node Only the i-node number None of the above www. prolearninghub. com

The Results

The Results