1. The administrative information of a file is stored in
Correct : C. inode
2. The -t option to ls is used for
Correct : A. sort according to time
3. The systems internal name to file is
Correct : B. i-number
4. The first tow bytes in each directory entry are
Correct : B. connection between name of file and its contents
5. The rm command removes
Correct : A. directory entries
6. primary parts oc c comipler is in
Correct : B. /lib
7. The basic program such as who and ed resids in
Correct : C. /bin
8. various administrative fils such as password file in
Correct : D. /etc
9. Short lived files created during execution are stored in
Correct : A. /tmp
10. which of following features of UNIX may be used for IPC
Correct : D. all of these
11. In a system 5 peole are currently using VI editor, then no. of currosonding rocesses will be
Correct : B. 5
12. the command echo welcome >/dev/tty
Correct : D. a&c
13. dev/nul
Correct : D. all of these
14. The advantage of binary files over text file is
Correct : D. all of these
15. UNIX uses ls to list files in a directory. The corresponding command in MS environment is
Correct : C. dir
16. For some file the access permissions are modified to 764. Which of the following interpretation is valid:
Correct : C. every one can read, group including owner can write, owner alone can execute
17. Which directory under the root contains the information on devices
Correct : B. /dev
18. Which option makes the command to ask the user for confirmation before removing each file
Correct : A. rm-i
19. which opttion deletes all files in the current directory and all its subdirectories
Correct : B. rm-r
20. which option is used for forcing removal operation
Correct : C. rm-f
21. which option in used for deleting everything in current directory and below.
Correct : D. rm-rf
22. which command is used for renaming a file
Correct : A. mv
23. which command is used for displaying contents of a file
Correct : B. cp
24. which command is used for copying a file
Correct : C. rm
25. Which command is used to determine a type of file
Correct : B. file
26. Whcich command is used for word count
Correct : C. wc
27. The command for changing file owener is
Correct : A. chown
28. The command for changing group owner is
Correct : B. chgrp
29. The vi editor is working in which mode of following
Correct : D. all of these
30. command mode allows operation of
Correct : A. copy and delete
31. Input mode is used for
Correct : A. to show text
32. ex mode is used for
Correct : A. handling files and erform substitution
33. :x is used for
Correct : A. saving and editing
34. :q is used for
Correct : B. editing and aborting
35. :w is used for
Correct : D. saving
36. !cmd is used for
Correct : C. to runs cmd and return to command prompt
37. which of the following are archive command
Correct : D. all of these
38. which command is used for creating an archive
Correct : A. tar -c
39. whicj command is used for displaying file in archieve
Correct : C. tar-t
40. which command is used for extracting file sfrom arcieve
Correct : B. tar-x
41. Which command is used for specifying archieve arch
Correct : D. #name?
42. the file access permission types are
Correct : D. all of these
43. it --- means
Correct : A. no permission
44. it --- x means
Correct : B. execute only
45. it -w- means
Correct : C. writable only
46. it -wx means
Correct : D. writable and executable
47. it r-- means
Correct : A. readable
48. it r-x means
Correct : B. readable and executable
49. it rw- means
Correct : C. readable and writable
50. It rwx means
Correct : D. readable, writable and executable
51. The command that can be used to restrict incoming messages to a user is
Correct : B. mesg
52. The sort command in UNIX
Correct : A. used to sort a file
53. Which of the following keys is used to replace a single character with new text?
Correct : B. s
54. The tail command in UNIX
Correct : A. can be used to look at the tail or bottom of the file
55. Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?
Correct : B. chmod u x emp[l-3]
56. Which command will be used with vi editor to append text at end of line?
Correct : B. is
57. Which command is used to display the device name of the terminal you are using?
Correct : C. tty
58. Which command allows you to view your file 24 lines at a time ?
Correct : A. more
59. The tar command in UNIX
Correct : C. both a and b
60. Which of the following commands is used to rename a file?
Correct : C. mv
61. Which of the following calls never returns an error?
Correct : A. getpid
62. Which of the following commands is used to count the total number of lines,words and characters contained in a file?
Correct : B. wc
63. The cc command makes a total of
Correct : D. 4 pass
64. Which command will be used with vi editor to move back to the beginning of a word
Correct : A. b
65. Mounting a file system results in the loading of
Correct : B. super block
66. When a process makes a system call ,its mode changes from
Correct : A. user to kernel
67. Which of the following files contains information related to password aging?
Correct : C. password
68. Which of the following are character special files?
Correct : B. printer
69. To allow only one user to work with a particular file at a particular time ,one has to
Correct : C. locking
70. A popular boot loader used by most Linux distributions to boot Linux is called
Correct : B. lilo
71. LILO can also be used to boot other operating systems as well such as ……..
Correct : D. all of these
72. LILO can be installed to either ……..of Linux root partition.
Correct : C. both a and b
73. What is LILO ?
Correct : C. linux loader
74. LILO’s configuration file is
Correct : A. /etc/lilo.conf
75. Other boot loaders which can be used to load Linux exist:
Correct : C. both a and b
76. The kernel itself is a program that usually lives in the root partition of the UNIX filesystem. Most Linux distributions call it
and it often a symbolic link to the real kernel file which lives in “/boot”.
Correct : A. /vmlinuz
77. After the kernel is brought in from disk into main memory, it begins execution and one of the first things it does is …………
Correct : B. initialize the system’s hardware.
78. All those cryptic messages you see fly by when the Linux kernel first starts up are messages from the initializing and configuring your hardware.
Correct : C. compiled-in kernel drivers
79. The first program the kernel attempts to execute after basic system initialization is complete is called
Correct : B. init
80. init’s job after basic system initialization is
Correct : C. both a and b
81. The actual program which the Linux kernel executes as the init process can be specified via the command line parameter.
Correct : B. "init"
82. The system start-up scripts are executed by
when the system starts up and it is these scripts which are responsible for completing the bootstrap process of the UNIX system.
Correct : A. init
83. Styles of system start-up scripts…
Correct : C. both a and b
84. All start-up scripts are typically kept in a directory named which usually lives somewhere under “/etc”
Correct : A. init.d
85. Each start-up script can usually accept at least two command line arguments:
Correct : A. start and stop
86. Steps in boot process
Correct : D. all of these
87. Hardware configuration while booting includes
Correct : D. all of these
88. Environment variables can be accessed by
Correct : C. shell scripts
89. Which of the following shell scripts looping features does not recognize the break command?
Correct : D. none of the above
90. Which of the following is not a filter?
Correct : A. cat
91. Shell functions
Correct : D. are not executed by new shell
92. The shell does the following in Unix
Correct : A. is the user interface
93. "bash" is an example of a
Correct : B. shell
94. Which of the following is not a component of a user account?
Correct : D. kernel
95. The Superuser can
Correct : D. all the above
96. Who needs to possess the superuser account?
Correct : B. system administrator
97. To use a Unix system with a GUI you need this type of window to enter Unix commands
Correct : A. terminal
98. Multiple Unix commands can be put into a file to form a program. This is called a
Correct : B. script
99. To get to the on-line reference manual, you use this command