27. What control character signals the end of the file ?
Note: This Question is unanswered, help us to find answer for this one
28. Which of the following statements is not true regarding UNIX ?
Answer
Correct Answer:
There can only be one command interpreter.
Note: This Question is unanswered, help us to find answer for this one
29. Which error will you see when an NFS client can no longer access mounted file system?
Answer
Correct Answer:
Stale File Handle
Note: This Question is unanswered, help us to find answer for this one
30. The PID of a process is displayed by the command
Note: This Question is unanswered, help us to find answer for this one
31. The file descriptor of stdin is
Note: This Question is unanswered, help us to find answer for this one
32. What option of the sort filter would you use if you want to save the output on a disk file ?
Note: This Question is unanswered, help us to find answer for this one
33. Which command enables you to concatenate files ?
Note: This Question is unanswered, help us to find answer for this one
34. What is the number of fields in each line in /etc/passwd file?
Note: This Question is unanswered, help us to find answer for this one
35. Which of the following is a responsibility of the system administrator?
Answer
Correct Answer:
a,b and c
Note: This Question is unanswered, help us to find answer for this one
36. Which command is used for splitting a file horizontally?
Note: This Question is unanswered, help us to find answer for this one
37. Which of the following statements is incorrect regarding the UNIX environment?
Answer
Correct Answer:
It does not allow relative path names.
Note: This Question is unanswered, help us to find answer for this one
38. How can a root user find the password of a user who has forgotten his password?
Answer
Correct Answer:
It is not possible
Note: This Question is unanswered, help us to find answer for this one
39. Which of the following statements is incorrect regarding positional parameters ?
Answer
Correct Answer:
The command name is put into the variable $1.
Note: This Question is unanswered, help us to find answer for this one
40. What would be displayed on the screen if the pwd command is entered when the user is in /usr directory?
Answer
Correct Answer:
/home/username
Note: This Question is unanswered, help us to find answer for this one
41. A single command which lists all files in a directory, distinguishing between a directory, executable and symbolic link files is:
Note: This Question is unanswered, help us to find answer for this one
42. Which wild-card matches one character ?
Note: This Question is unanswered, help us to find answer for this one
43. Which option of the sort filter changes the output to reverse order ?
Note: This Question is unanswered, help us to find answer for this one
44. Which of the following shells is typically used for guest logins and in secure systems ?
Note: This Question is unanswered, help us to find answer for this one
45. Which command gives location of the first difference between two files ?
Note: This Question is unanswered, help us to find answer for this one
46. Which command gives all differences between two files ?
Note: This Question is unanswered, help us to find answer for this one
47.
Consider the following file listing of file abc1 for a user abc
-rw------- 1 abc student 10 jan 10:39 abc1
What inference would you make regarding the file access permissions ?
Answer
Correct Answer:
Only the owner has read and write but no execute permissions.
Note: This Question is unanswered, help us to find answer for this one
48. Which of the following is the only filter?
Note: This Question is unanswered, help us to find answer for this one
49. By which command a user can add a password for his login name?
Note: This Question is unanswered, help us to find answer for this one
50. The executable file name for the Bourne shell is :
Note: This Question is unanswered, help us to find answer for this one
51. Which file contains the commands that the system executes when a user logs in?
Answer
Correct Answer:
$HOME/.profile
Note: This Question is unanswered, help us to find answer for this one
52. Which option of the sort filter folds lower case characters to upper case ?
Note: This Question is unanswered, help us to find answer for this one
53. The user passwords are kept in which file on most Unix systems?
Answer
Correct Answer:
/etc/passwd
Note: This Question is unanswered, help us to find answer for this one
54. Which character would be used in the grep filter to specify a pattern which consists of any one of a set of characters?
Note: This Question is unanswered, help us to find answer for this one
55. Which option of the grep filter prints out all those lines that do not match the pattern specified by the regular expression ?
Note: This Question is unanswered, help us to find answer for this one
56. Which character of the grep filter specifies that the pattern preceding it must occur at the end of each line ?
Note: This Question is unanswered, help us to find answer for this one
57. Which screen manipulation command sets the screen back to normal?
Answer
Correct Answer:
tput rmso
Note: This Question is unanswered, help us to find answer for this one
58. You want to specifically search for the character [ . What character(s) would you use in the expression to achieve this ?
Note: This Question is unanswered, help us to find answer for this one
59.
The command rm -r project
Answer
Correct Answer:
deletes all the files from the directory project.
deletes all the files from the directory project.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
60. Highlight the incorrect statement regarding the uniq command :
Answer
Correct Answer:
It automatically sorts the file that is specified.
Note: This Question is unanswered, help us to find answer for this one
61. By which screen manipulation command can you specify the coordinates for the cursor position ?
Note: This Question is unanswered, help us to find answer for this one
62. You are writing a shell script.For a given condition, you want to terminate a loop. Which command will you use ?
Note: This Question is unanswered, help us to find answer for this one
63. Which filter is used to copy the standard input to the standard output and also to a disk file ?
Note: This Question is unanswered, help us to find answer for this one
64. Which command would you use if you want to display selective fields from a file ?
Note: This Question is unanswered, help us to find answer for this one
65. Which file contains the commands run by all users at login?
Answer
Correct Answer:
/etc/profile
Note: This Question is unanswered, help us to find answer for this one
66. What is the command that can print lines of 1st file matching with 2nd file ?
Note: This Question is unanswered, help us to find answer for this one
67. Which of the following is not a filter ?
Note: This Question is unanswered, help us to find answer for this one
68. You want to declare a variable vs with the value hello. Which of the following declarations is correct ?
Note: This Question is unanswered, help us to find answer for this one
69. What information does the who am i command display?
Answer
Correct Answer:
The user's name.
The time the user logged in.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
70. UNIX is an example of :
Answer
Correct Answer:
Time sharing operating system.
Note: This Question is unanswered, help us to find answer for this one
71. The number of arguments can be known by which variable ?
Note: This Question is unanswered, help us to find answer for this one
72. What communication command allows a user to communicate with another user logged on by splitting the screen and providing two way communication ?
Note: This Question is unanswered, help us to find answer for this one
73. You have two variables, v1 and v2. You want to assign the value of v2 to v1.Which of the following declarations is correct ?
Note: This Question is unanswered, help us to find answer for this one
74. Which command is used to run a command at a specified time ?
Note: This Question is unanswered, help us to find answer for this one
75. In which of the following high level languages most of the UNIX is written?
Note: This Question is unanswered, help us to find answer for this one
76. What is the number of standard file pointers in UNIX?
Note: This Question is unanswered, help us to find answer for this one
77. What is the default UNIX prompt?
Note: This Question is unanswered, help us to find answer for this one
78. Which option of the uniq command would you use to display lines with only one occurence?
Note: This Question is unanswered, help us to find answer for this one
79. Which command invokes a text editor ?
Note: This Question is unanswered, help us to find answer for this one
80. What is the file descriptor for the standard output file ?
Note: This Question is unanswered, help us to find answer for this one
81. Which of the following statements is incorrect regarding variables?
Answer
Correct Answer:
Global variables are created by the global command.
Note: This Question is unanswered, help us to find answer for this one
82. You want to search for the pattern "Newa" or "Newb" or "Newc". Which regular expression will you use with the grep command ?
Note: This Question is unanswered, help us to find answer for this one
83. Which of the following commands can be used to view the calendar of April 2007?
Answer
Correct Answer:
$ cal april 2007
$ cal april 07
$ cal 4 2007
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
84. In UNIX , shell is a program which :
Note: This Question is unanswered, help us to find answer for this one
85. UNIX offers the following benefits :
Answer
Correct Answer:
a,b and c.
Note: This Question is unanswered, help us to find answer for this one
86. Study the following statements and select the incorrect one :
Answer
Correct Answer:
UNIX process priorities cannot be changed by the user.
Note: This Question is unanswered, help us to find answer for this one
87. What is the correct command to delete all files with two character file-names from the directory /user/group2 ?
Answer
Correct Answer:
rm /user/group2/??
Note: This Question is unanswered, help us to find answer for this one
88. Who can change the password of a user account?
Answer
Correct Answer:
The root user
Account owner
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
89. Which of the following statements is incorrect ?
Answer
Correct Answer:
At the core of UNIX is the shell, a program controlling the computer's resources.
Note: This Question is unanswered, help us to find answer for this one
90. Which command would make the scope of a shell variable global to the subshells ?
Note: This Question is unanswered, help us to find answer for this one
91. Pipes is/are :
Answer
Correct Answer:
a special feature by which the standard output of a command or user program can be sent as the standard input to another command or user program
Note: This Question is unanswered, help us to find answer for this one
92. Using which command can you move to a different directory?
Note: This Question is unanswered, help us to find answer for this one
93. Which command will delete a directory only if it is empty ?
Note: This Question is unanswered, help us to find answer for this one
94. Which command will you use to see your current group?
Note: This Question is unanswered, help us to find answer for this one
95. Which of the following characters can be used to run multiple commands on a single line?
Note: This Question is unanswered, help us to find answer for this one
96. Which of the following is incorrect about the restrictions imposed by the restricted shell ?
Answer
Correct Answer:
The user is not allowed to see the listing of files in his working directory.
Note: This Question is unanswered, help us to find answer for this one
97. With regard to UNIX, a process is :
Answer
Correct Answer:
a program in a state of execution.
Note: This Question is unanswered, help us to find answer for this one
98. What is the file descriptor for the standard error file ?
Note: This Question is unanswered, help us to find answer for this one
99. Mounting a file system means :
Answer
Correct Answer:
Providing a link to the filesystem to be mounted so that it appears as a local subdirectory.
Note: This Question is unanswered, help us to find answer for this one
100. Which command identifies the current working directory ?
Note: This Question is unanswered, help us to find answer for this one
101. Which of the following commands can be used to add the read and write permissions to the user and group classes of a file named abc?
Answer
Correct Answer:
chmod ug -rw abc
Note: This Question is unanswered, help us to find answer for this one
102. What is the default standard error file ?
Note: This Question is unanswered, help us to find answer for this one
103. Which command compresses a file?
Answer
Correct Answer:
compress
zip
pack
1-2-3
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
104. Which command will symbolically link two files in a directory?
Answer
Correct Answer:
ln -s f1 f2
Note: This Question is unanswered, help us to find answer for this one
105. The wc filter :
Answer
Correct Answer:
counts the number of words in a disk file or in the standard input
counts the number of characters in a disk file or in the standard input
counts the number of lines in a disk file or in the standard input
1-2-3
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
106. Which filter will you use to translate a set of charaters to another ?
Note: This Question is unanswered, help us to find answer for this one
107. Which option used along with the find command allows one to perform operations on the files that are located by the find command ?
Note: This Question is unanswered, help us to find answer for this one
108. Which of the following files is configured for login name, login directory and login shell variables?
Answer
Correct Answer:
/etc/passwd
Note: This Question is unanswered, help us to find answer for this one
109. Suppose you have a file named trans and you want to display fields two to four. Which of the following commands will you use ?
Note: This Question is unanswered, help us to find answer for this one
111. Which screen manipulation command sets the screen to reverse video?
Answer
Correct Answer:
tput smso
Note: This Question is unanswered, help us to find answer for this one
112. Which of the following commands can be used to communicate directly with other users by sending messages?
Note: This Question is unanswered, help us to find answer for this one
113. Which type of users can be associated with each file in UNIX ?
Answer
Correct Answer:
a,b and c.
Note: This Question is unanswered, help us to find answer for this one
114. Which of the following statements regarding file naming is incorrect?
Answer
Correct Answer:
are not case sensitive.
Note: This Question is unanswered, help us to find answer for this one
115. Which UNIX command provides the type of information contained in a particular file ?
Answer
Correct Answer:
more filename
Note: This Question is unanswered, help us to find answer for this one
116. You want to make a new directory.What command will you use ?
Note: This Question is unanswered, help us to find answer for this one
117. You want to read through the reference manual.What command will you use ?
Note: This Question is unanswered, help us to find answer for this one
118. Which option of the sort filter performs a numeric sort ?
Note: This Question is unanswered, help us to find answer for this one
119. Point out the incorrect statement regarding standard input , output and error :
Answer
Correct Answer:
The three standard files have a file descriptor 0 - standard output file 1 - standard input file 2 - standard error file
Note: This Question is unanswered, help us to find answer for this one
120. Which option of the uniq command would you use to display only those lines which have a multiple occurrence ?
Note: This Question is unanswered, help us to find answer for this one
121. Which variable will display the list of the positional parameters?
Note: This Question is unanswered, help us to find answer for this one
122. Which special variable will display the exit status of the last executed command in Bourne or Korn shell?
Note: This Question is unanswered, help us to find answer for this one
123.
The command ls | more displays a list of :
Answer
Correct Answer:
all the files in the current directory one line at a time.
all the files in the current directory one screen at a time. 0.10
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
124.
The command rmdir c-prog
will not work if :
Answer
Correct Answer:
a and b. 0.10
Note: This Question is unanswered, help us to find answer for this one
125. Which option used along with find prompts the user for confirmation before any operation is performed on a file ?
Note: This Question is unanswered, help us to find answer for this one
126. Which of the following commands can be used to change group ownership of a file/directory?
Note: This Question is unanswered, help us to find answer for this one
127. The mv command :
Answer
Correct Answer:
a,b and c
Note: This Question is unanswered, help us to find answer for this one
128. Which variable contains the system prompt ?
Note: This Question is unanswered, help us to find answer for this one
129. What is the exit code of a successful command ?
Note: This Question is unanswered, help us to find answer for this one
130. What will be the result of command '' rm -r directory/* ''?
Answer
Correct Answer:
It will remove all the files but not the directory
Note: This Question is unanswered, help us to find answer for this one
131. Which of the following locations store the information about the currently installed Software on a local system?
Answer
Correct Answer:
/var/adm/sw/products
Note: This Question is unanswered, help us to find answer for this one
132. The chmod command :
Answer
Correct Answer:
changes the access permissions of a file or directory.
Note: This Question is unanswered, help us to find answer for this one
133. Which command gives information about space being used by files and directories ?
Note: This Question is unanswered, help us to find answer for this one
134. The main objective of a time-sharing operating System like UNIX is to :
Answer
Correct Answer:
Minimize the user response time.
Note: This Question is unanswered, help us to find answer for this one
135. Which command will you use to count the number of words in a file?
Note: This Question is unanswered, help us to find answer for this one
136. Which keystroke combination sends or signals an interrupt request to a process ?
Note: This Question is unanswered, help us to find answer for this one
137.
The file oldies-goldies has the details of the sale of books.The records are sorted on the names of the authors and are as follows
Alexandre Dumas
Alexandre Dumas
Alexandre Dumas
Gerald Durrell
Giovanni Guareschi
Giovanni Guareschi
James Herriot
Louisa May Alcott
Louisa May Alcott
Louisa May Alcott
Based on the above information, what will be the output of the command
uniq -u oldies-goldies ?
Answer
Correct Answer:
Gerald Durrell James Herriot
Note: This Question is unanswered, help us to find answer for this one
138. To change the flog file permissions so that others besides you could neither read nor write to it, you do:
Answer
Correct Answer:
chmod go= flog
Note: This Question is unanswered, help us to find answer for this one
139. True or False: Multiple usernames on Unix are allowed to have the same UID.
Note: This Question is unanswered, help us to find answer for this one
140. When you check a file's permissions, and there's an "S" in the place of "x" in the owner permissions section of the ls command, it means that the:
Answer
Correct Answer:
uid bit is set
Note: This Question is unanswered, help us to find answer for this one
141. How do you determine the runlevel of the running system?
Note: This Question is unanswered, help us to find answer for this one
142. chmod allows you to specify permissions for a file using octal numbers. 4000 permission is:
Answer
Correct Answer:
Set user ID on execution (SUID)
Note: This Question is unanswered, help us to find answer for this one
143. To set a file so that anybody can read it but only root can modify it without changing the file's owner, you use chmod's octal permissions of:
Note: This Question is unanswered, help us to find answer for this one
144. If your umask is 007 it means that default files are created with the permissions:
Answer
Correct Answer:
read+write for the owner or group and no permissions or everyone else
Note: This Question is unanswered, help us to find answer for this one
145. Changing a file's permissions...
Answer
Correct Answer:
does not change its modification time but will change it's inode's ctime
Note: This Question is unanswered, help us to find answer for this one
146. Which of the following would you use to set yourself as the superuser in a secure way?
Answer
Correct Answer:
/bin/su -
Note: This Question is unanswered, help us to find answer for this one
147. Which of the following is not contained in the inode structure?
Answer
Correct Answer:
File name
Note: This Question is unanswered, help us to find answer for this one
148. If FFF is a file, the command 'touch FFF' will:
Answer
Correct Answer:
update the access and modification times of FFF to the current time
Note: This Question is unanswered, help us to find answer for this one
149. In Unix, a filename cannot have the following character:
Note: This Question is unanswered, help us to find answer for this one
150. You inspect the last access time (atime) instead of the last modification time (mtime) in ls output by using the following switch to ls:
Note: This Question is unanswered, help us to find answer for this one
151. A user reports a problem. In order to gain access to his account in the most secure and non obtrusive way, you...
Answer
Correct Answer:
investigate as root
Note: This Question is unanswered, help us to find answer for this one
152. How would you print the content of the file in a reverse?
Note: This Question is unanswered, help us to find answer for this one
153. If you use the command sequence: echo "hello">file; ln file newfile; rm file; What will happen when you run: cat newfile
Answer
Correct Answer:
The text "hello" will be printed
Note: This Question is unanswered, help us to find answer for this one
154. In an ls listing, 'l' 's' and '-' indicate:
Answer
Correct Answer:
Symbolic link, Socket, Regular file
Note: This Question is unanswered, help us to find answer for this one
155. When you first log in to a Unix system, the login program performs various security measures. Which is not one of these security measures?
Answer
Correct Answer:
login checks if a minimum amount of time passed since your last login
Note: This Question is unanswered, help us to find answer for this one
156. To display or set your terminal characteristics, you use the command:
Note: This Question is unanswered, help us to find answer for this one
157. The superuser can:
Answer
Correct Answer:
none are correct
Note: This Question is unanswered, help us to find answer for this one
158. What is the default maximum number of open files a user can have?
Answer
Correct Answer:
It depends on the Unix implementation.
Note: This Question is unanswered, help us to find answer for this one
159. To list the current users logged on to the system you use:
Note: This Question is unanswered, help us to find answer for this one
160. How does Unix maintain its time clock?
Answer
Correct Answer:
epoch format
Note: This Question is unanswered, help us to find answer for this one
161. To be run by the shell, a shell script needs the following permission(s):
Answer
Correct Answer:
read and execute
Note: This Question is unanswered, help us to find answer for this one
162. When you execute the command 'cp . newdir', you...
Answer
Correct Answer:
get an error or the directory is copied as a regular file
Note: This Question is unanswered, help us to find answer for this one
163. The command that would append the output from the encrypter to the current contents of the file private and read in the contents of the file top_secret, is:
Answer
Correct Answer:
encrypter < top_secret >> private
Note: This Question is unanswered, help us to find answer for this one
164. What is the primary difference between binaries located in /bin and /sbin versus /usr/bin and /usr/sbin?
Answer
Correct Answer:
Binaries located in /bin and /sbin are expected to be on the root partition to be available for single user or repair modes.
Note: This Question is unanswered, help us to find answer for this one
165. How to retrieve the GECOS information of the user 'sbz' ?
Answer
Correct Answer:
grep sbz /etc/passwd
Note: This Question is unanswered, help us to find answer for this one
166. Which of the following is NOT used as a wild-card in the shell?
Note: This Question is unanswered, help us to find answer for this one
167. What will the following command result in on a SystemV host?: ps -ef | grep "[/]sbin/init"
Answer
Correct Answer:
Will display only the init process
Note: This Question is unanswered, help us to find answer for this one
168. The whereis command helps you to locate...
Answer
Correct Answer:
all are correct
Note: This Question is unanswered, help us to find answer for this one
169. Which of the following find commands is correct?
Answer
Correct Answer:
find . -name "taco*" -exec rm {} \;
Note: This Question is unanswered, help us to find answer for this one
170. What happens to a process accessing a file if you delete the file?
Answer
Correct Answer:
The process continues to access the file via its inode
Note: This Question is unanswered, help us to find answer for this one
171. A password security feature of Unix allows N to set an expiration date on users' passwords:
Answer
Correct Answer:
N is the superuser
Note: This Question is unanswered, help us to find answer for this one
172. Passwords may contain:
Answer
Correct Answer:
Any character, and the system distinguishes between upper and lower case characters
Note: This Question is unanswered, help us to find answer for this one
173. Listing directory trees recursively, in ls you use the flag:
Note: This Question is unanswered, help us to find answer for this one
174. If you execute the following, which users can read the file? chmod 060 file
Answer
Correct Answer:
Only members of the file's group, except for the file's owner.
Note: This Question is unanswered, help us to find answer for this one
175. If you wish to change both owner and group of a file in a two-step process, use these commands:
Answer
Correct Answer:
chgrp and chown
Note: This Question is unanswered, help us to find answer for this one
176. To know which tty you are on, you use the command:
Note: This Question is unanswered, help us to find answer for this one
177. What does SNMP stand for?
Answer
Correct Answer:
Simple Network Management Protocol
Note: This Question is unanswered, help us to find answer for this one
178. The standard shell of Unix System V is:
Note: This Question is unanswered, help us to find answer for this one
179. In Unix, ping works on which protocol?
Note: This Question is unanswered, help us to find answer for this one
180. Can a Unix filename contain a space?
Note: This Question is unanswered, help us to find answer for this one
181. To run network services on "trusted" (numbered below 1024) ports, your effective UID should be:
Note: This Question is unanswered, help us to find answer for this one
182. What will be the output of the command: basename /var/tmp/myfile.txt
Answer
Correct Answer:
myfile.txt
Note: This Question is unanswered, help us to find answer for this one
183. The command 'chmod -x /tmp/tmp.tmp' will:
Answer
Correct Answer:
remove execution permission from the file tmp.tmp in /tmp
Note: This Question is unanswered, help us to find answer for this one
184. A good account name for the default user that will need to carry out only non-privileged operations is:
Note: This Question is unanswered, help us to find answer for this one
185. When searching the path, if there are two commands with the same name:
Answer
Correct Answer:
the one that is found first in the path will be executed
Note: This Question is unanswered, help us to find answer for this one
186. You instruct a program to take its input from a previously prepared text file using the input redirection character:
Note: This Question is unanswered, help us to find answer for this one
187. chmod allows you to specify permissions for a file using octal numbers. 1000 permission is:
Answer
Correct Answer:
Sticky bit
Note: This Question is unanswered, help us to find answer for this one
188. To show the grand total, in kilobytes, of all directories (to which you have access) at or below the current point in the file system, you use:
Note: This Question is unanswered, help us to find answer for this one
189. The cal command...
Answer
Correct Answer:
shows a simple calendar
Note: This Question is unanswered, help us to find answer for this one
190. To channel the output of one command or program into the input of another, you use:
Note: This Question is unanswered, help us to find answer for this one
191. If you use the command 'ls -F', a string that ends in @ is a:
Answer
Correct Answer:
symbolic link
Note: This Question is unanswered, help us to find answer for this one
192. If you wanted to have multiple outputs for a particular command or script which standard base utility would you use?
Note: This Question is unanswered, help us to find answer for this one
193. The numeric permission equivalent to '-rw-rw----' is:
Note: This Question is unanswered, help us to find answer for this one
194. Which command is used to make an archive of a directory?
Answer
Correct Answer:
tar cvf <directory.tar> <directory>
Note: This Question is unanswered, help us to find answer for this one
195. After a fork, the new process...
Answer
Correct Answer:
inherits its current directory from its parent process
Note: This Question is unanswered, help us to find answer for this one
196. When files are recovered after any sort of problem or failure, if the kernel cannot ascertain the proper location in the file system, the recovered file is placed in the directory:
Answer
Correct Answer:
lost+found
Note: This Question is unanswered, help us to find answer for this one
197. A Unix user can belong to:
Answer
Correct Answer:
more than one group
Note: This Question is unanswered, help us to find answer for this one
198. Which of the following is NOT a scripting language in Unix?
Note: This Question is unanswered, help us to find answer for this one
199. If your account is named myuser, and you changed your password, one way to test that you type the new password correctly is:
Answer
Correct Answer:
su myuser
Note: This Question is unanswered, help us to find answer for this one
200. The Bourne shell has one file in your home directory that it reads when you log in; this file is:
Note: This Question is unanswered, help us to find answer for this one
201. To change the file flog so people who don't belong in your group can't read it, you use the command:
Answer
Correct Answer:
chmod o-r flog
Note: This Question is unanswered, help us to find answer for this one
202. To list only the account name associated with the current login, you use the command:
Note: This Question is unanswered, help us to find answer for this one
203. To refer to the parent of the current working directory, you use:
Note: This Question is unanswered, help us to find answer for this one
204. Once you delete a file in Unix:
Answer
Correct Answer:
it is gone forever
Note: This Question is unanswered, help us to find answer for this one
205. Unix uses the N character to separate the directories in the pathname. N is:
Note: This Question is unanswered, help us to find answer for this one
206. To list directories rather than their contents, in ls you use the flag:
Note: This Question is unanswered, help us to find answer for this one
207. Which command is used to send and receive mail in Unix?
Note: This Question is unanswered, help us to find answer for this one
208. To refer to your home directory, you use:
Note: This Question is unanswered, help us to find answer for this one
209. To give everybody in your group write permission to the file flog, you do:
Answer
Correct Answer:
chmod g+w flog
Note: This Question is unanswered, help us to find answer for this one
210. To specify an absolute path, the string for the path starts with:
Note: This Question is unanswered, help us to find answer for this one
211. To temporarily change your UID, you use the command:
Note: This Question is unanswered, help us to find answer for this one
212. On Unix, you copy a file using the command:
Note: This Question is unanswered, help us to find answer for this one
213. Unix has the following file/directory permissions:
Answer
Correct Answer:
Read, write, execute
Note: This Question is unanswered, help us to find answer for this one
214. If your (effective) process UID is 0, you can:
Answer
Correct Answer:
all are correct
Note: This Question is unanswered, help us to find answer for this one
215. You display the contents of a text file on the screen using the command:
Note: This Question is unanswered, help us to find answer for this one
216. Unix filenames are case sensitive. This is:
Answer
Correct Answer:
Always true
Note: This Question is unanswered, help us to find answer for this one
217. To make a secure encrypted connection to the remote computer, you use:
Note: This Question is unanswered, help us to find answer for this one
218. The mv command:
Answer
Correct Answer:
moves a file to a new location
Note: This Question is unanswered, help us to find answer for this one
219. To create a directory, you use:
Note: This Question is unanswered, help us to find answer for this one
220. If you want to verify the pathname of the directory you are currently in, you use the command:
Note: This Question is unanswered, help us to find answer for this one
221. You can change your password with the command:
Note: This Question is unanswered, help us to find answer for this one
222. To securely copy files between computers, you use:
Note: This Question is unanswered, help us to find answer for this one
223. What happens if you try to create a directory with a name that has already been used?
Answer
Correct Answer:
you get an error message
Note: This Question is unanswered, help us to find answer for this one
224. To Rename a file, you use the command:
Note: This Question is unanswered, help us to find answer for this one
225. If you accidentally deleted a file FFF with the 'rm FFF' command, you can restore it using:
Answer
Correct Answer:
there's no way to reverse a delete operation on Unix
Note: This Question is unanswered, help us to find answer for this one
226. To make a file ac2 executable, you use the command:
Answer
Correct Answer:
chmod +x ac2
Note: This Question is unanswered, help us to find answer for this one
227. When root creates a new account, by default the account password is:
Answer
Correct Answer:
There are no "default" passwords on Unix
Note: This Question is unanswered, help us to find answer for this one
228. The search path is stored in an environment variable named:
Note: This Question is unanswered, help us to find answer for this one
229. To check the Current Date and Time you use:
Note: This Question is unanswered, help us to find answer for this one
230. A hidden file is any file whose:
Answer
Correct Answer:
first character of the filename is a '.'
Note: This Question is unanswered, help us to find answer for this one
231. To execute commands and programs in the background you type in the command line, they must be followed by:
Note: This Question is unanswered, help us to find answer for this one
232. What's the environment variable for your default shell?
Note: This Question is unanswered, help us to find answer for this one
233. In an inode, you usually will find:
Answer
Correct Answer:
all are correct
Note: This Question is unanswered, help us to find answer for this one
234. True or False: File names that begin with a period are called "hidden" files--that is, they are only revealed if you issue a special command.
Note: This Question is unanswered, help us to find answer for this one
235. To display hidden (dot) files, you use the command:
Note: This Question is unanswered, help us to find answer for this one
236. If a file has the permissions "-rwxr-x---", they can be specified as an octal mode of:
Note: This Question is unanswered, help us to find answer for this one
237. In Unix, which of the following are not treated as files?
Answer
Correct Answer:
In Unix, everything is a file
Note: This Question is unanswered, help us to find answer for this one
238. What do we get from running this command? echo "april|may|june|july" | awk -F'|' '{print $3}'
Note: This Question is unanswered, help us to find answer for this one
239. The Unix end-of-file character is:
Answer
Correct Answer:
Control-D
Note: This Question is unanswered, help us to find answer for this one
240. When you type the name of a command, the shell finds it in:
Answer
Correct Answer:
all are correct
Note: This Question is unanswered, help us to find answer for this one
241. The notation '.' in an ls listing, is shorthand for:
Answer
Correct Answer:
the current location in the directory hierarchy
Note: This Question is unanswered, help us to find answer for this one
242. Files in Unix may be a representation of the system's:
Answer
Correct Answer:
All are correct
Note: This Question is unanswered, help us to find answer for this one