Transcript net node
LINUX
MULTIPLE CHOICE
QUESTION
Check your Knowledge
Press to Start
www.prolearninghub.com
1) The system calls in UNIX is
written using which language ?
C language
C++
Assembly
Java
www.prolearninghub.com
2) What is property of UNIX ?
Multi user
Multi tasking
Multi programming
All of above
www.prolearninghub.com
3) Solaris is product of ?
IBP
IBM
Sun Microsystems
Microsoft
www.prolearninghub.com
4) What is meaning of ILP32 ?
32 bit Integrated, Long
& Pointer
32 bit Integer, Lost &
Pointer
32 bit Integer, Long &
Point
32 bit Integer, Long &
Pointer
www.prolearninghub.com
5) Kernel is known as core of
operating system.
True
False
www.prolearninghub.com
6) Identify the true
functionality of shell ?
A) Authenticates user
B) Interprets commands
C)Allocates time and
memory to programs
Only A and B
www.prolearninghub.com
7) A process can only run
in ___ ?
Background
Front end
Both side
None of these
www.prolearninghub.com
8) Which of the following below
are true functionalities of Kernel?
Allocates time and
memory to programs
Authenticates user
Interprets commands
All choices are correct
www.prolearninghub.com
9) Layer one of the OSI model is
Network layer
Transport layer
Link layer
Physical layer
www.prolearninghub.com
10) SVR was developed by:
Sun microsystems
AT & T
University of Barkley
Sun and AT&T jointly
www.prolearninghub.com
11) Which of these is not a
Unix Flavor?
BSD
MAC
AIX
IRIX
www.prolearninghub.com
12) Identify the false statement.
Unix supports multiple
users
Linux is an open source
operating system and the
source code is shared
Shell takes care of inter
process communication
Shell provides the feature
of I/O Redirection
www.prolearninghub.com
13) x86-32 uses which
programming model?
IP16
IP32
ILP16
ILP32
www.prolearninghub.com
14) Which of the following
NIS clients, finds and stores
information about an NIS
domain and server?
ypwhich
ypbind
ypcat
yppoll
www.prolearninghub.com
15) Which of the following is the
BEST way to set up SSH(Secure
Shell) for communicating between
System without needing passwords?
A) Use ssh-keygen for
generating public-private
keys.
B) Disable passwords on
specific accounts that will
use SSH.
Both A and B
None of these
www.prolearninghub.com
16) Which of the following
command kill all the process
including shell ?
A) kill kill 0
B) kill -9 kill 0
C) kill -s kill 0
Both B and C
www.prolearninghub.com
17) Which of the following
statement is true ?
echo $$ return PID of login
shell and echo $? return status
of last command
echo $$ return status of last
command and echo $? return
PID of login shell
echo $$ and echo $? return
some integer value of no
significance
All of the statements are false
www.prolearninghub.com
18) Priority of the process can be
changed using which of the
following command ?
Nice
renice
chproiity
None of these
www.prolearninghub.com
19) What does GNU stand for?
GNU's not Unix
Greek Needed Unix
General Unix
None of these
www.prolearninghub.com
20) How can we find the
path of file.
By which command
By where command
By wexec command
None of these
www.prolearninghub.com
21) Command used to count
number of character in a file is
grep
wc
count
cut
www.prolearninghub.com
22) Which of these commands
could you use to show one page of
output at a time?
Less
sed
Pause
grep
www.prolearninghub.com
23) Which commands will give
you information about how
much disk space each file in
the current directory uses?
Is-I
IS-Ia
du
Is-a
www.prolearninghub.com
24) Name that command which
use to copy files
ssh
telnet
ftp
none
www.prolearninghub.com
25) to change default
permissions for files and
directories at the time of
creation we use:
Chmod
Chown
Umask
chgrp
www.prolearninghub.com
26) To see online manuals we use:
Man
Manual
*Man
%man
www.prolearninghub.com
27) For writing the first 20 lines
of file to screen we use ____
Command.
The head
The header
Can use both
None of these
www.prolearninghub.com
28) To clear the screen ____
command used.
A) clear
B) %clear
C) clrscr
Either A or C
www.prolearninghub.com
29) SVR4 stands for:
System Five Release 4
System Version Release 4
System Five Relocated 4
Storage Files Five
Release 4
www.prolearninghub.com
30) Lp0 device file is
used to access ?
Tape drive
Printer
Mouse
floppy
www.prolearninghub.com
31) Select the most priority
tasking in multi-tasking
Modularity
Time sharing
Multi tasking
Multi sharing
www.prolearninghub.com
32) To control LINUX
functionalities we use:
Shell command
C
Java
Shell script
www.prolearninghub.com
33) What control character signals
the end of the input file ?
Ctrl + s
Ctrl + z
Ctrl + n
Ctrl + d
www.prolearninghub.com
34) Which command in LINUX
is used for description of any
command ?
Help
Man
Detail
Shortdetail
www.prolearninghub.com
35) Which one of the following string
will print by this program?
#include<stdio.h>
#include<pthread.h>
int main()
{
printf(“prolearninghub\n");
pthread_exit("Bye");
printf("Linux");
return 0;
}
Linux
prolearninghub
bye
None of these
www.prolearninghub.com
For the below mentioned code,
int main() {
int fd;
fd = open(“logfile”, O_CREAT|O_RDWR, 0600);
lseek(fd, 5, SEEK_CUR);
write(fd, “Hello”, 5);
return 0;
}
36) What is the logfile size now if
it’s initially was 1024 bytes?
5
1024
1029
1034
www.prolearninghub.com
Code snippet (file1 size is 2024)
f1 = fopen (file1, RDWR, RWX)
lseek(f1,1024,SEEK_SET)
write(f1,buf,10)
37) What is offset now?
1024
1034
2034
2054
www.prolearninghub.com
38) Identify the system which does
not support proc file system?
IBM AIX
QNX
Solaries
None of the mentioned
www.prolearninghub.com
39) Obtaining of the PID can be
done by the utility
ps
pgrep
pidof
All of the mentioned
www.prolearninghub.com
40) Which one of the following
contains various bits of
information about the state of
power management?
A) /proc/acpi
B) /proc/apm
both A and B
None of the mentioned
www.prolearninghub.com
41) The 32-bit internet address
10000000 00001010 00000010
00011110 will be written in dotted
decimal notation as
128.10.2.30
210.20.2.64
168.10.2.30
None of these
www.prolearninghub.com
42) Which class network is used
for a collection of a small
number of networks with a
large number of nodes?
Class A
Class B
Class C
All the classes
www.prolearninghub.com
43) What type of addressing
format is used by Class A network
Net.Net.Net.Node
Net.Net.Node.Node
Net.Node.Net.Node
Net.Node.Node.Node
www.prolearninghub.com
44) What types of installations
require a special boot disk?
NFS
FTP
PCMCIA
All of above
www.prolearninghub.com
45) What command is used to assign
executable permission to the owner
of the file named "letter"?
chmod ugo + x letter
chmod u + x letter
chmod u + w letter
chmod g + x letter
www.prolearninghub.com
46) What command is used to
compare the files?
ccp
du
cmp
comp
www.prolearninghub.com
47) Which command we can use to
view inode numbers
-i
-s
-j
-k
www.prolearninghub.com
48) Which of the following NIS
clients returns the name of the
NIS server used by the NIS client?
ypwhich
ypbind
ypcat
yppoll
www.prolearninghub.com
49) The hierarchy of a series of
directories branching in a user
system starts from
home
root
/home
/root
www.prolearninghub.com
50) The _______ file contains
all the information on users
who may log into your system
/etc/passwd
/etc/password
/etc
/etc/pass
www.prolearninghub.com
The Results