1. Files in Unix may be a representation of the system's:
2. The notation '.' in an ls listing, is shorthand for:
3. When you type the name of a command, the shell finds it in:
4. The Unix end-of-file character is:
5. What do we get from running this command? echo 'april|may|june|july' | awk -F'|' '{print $3}'
6. In Unix, which of the following are not treated as files?
7. If a file has the permissions '-rwxr-x---', they can be specified as an octal mode of:
8. To display hidden (dot) files, you use the command:
9. True or False: File names that begin with a period are called 'hidden' files--that is, they are only revealed if you issue a special command.
10. The format of a cp command is to specify:
11. In an inode, you usually will find:
12. What's the environment variable for your default shell?
13. To execute commands and programs in the background you type in the command line, they must be followed by:
14. A hidden file is any file whose:
15. To check the Current Date and Time you use:
16. The search path is stored in an environment variable named:
17. When root creates a new account, by default the account password is:
18. To make a file ac2 executable, you use the command:
19. If you accidentally deleted a file FFF with the 'rm FFF' command, you can restore it using:
20. To Rename a file, you use the command:
21. What happens if you try to create a directory with a name that has already been used?
22. To securely copy files between computers, you use:
23. You can change your password with the command:
24. If you want to verify the pathname of the directory you are currently in, you use the command:
25. To create a directory, you use:
26. The mv command:
27. To make a secure encrypted connection to the remote computer, you use:
28. Unix filenames are case sensitive. This is:
29. You display the contents of a text file on the screen using the command:
30. If your (effective) process UID is 0, you can:
31. Unix has the following file/directory permissions:
32. On Unix, you copy a file using the command:
33. To temporarily change your UID, you use the command:
34. To specify an absolute path, the string for the path starts with:
35. To give everybody in your group write permission to the file flog, you do:
36. To refer to your home directory, you use:
37. Which command is used to send and receive mail in Unix?
38. To list directories rather than their contents, in ls you use the flag:
39. Unix uses the N character to separate the directories in the pathname. N is:
40. Once you delete a file in Unix:
41. To refer to the parent of the current working directory, you use:
42. To list only the account name associated with the current login, you use the command:
43. The Unix escape character is:
44. To change the file flog so people who don't belong in your group can't read it, you use the command:
45. The Bourne shell has one file in your home directory that it reads when you log in; this file is:
46. If your account is named myuser, and you changed your password, one way to test that you type the new password correctly is:
47. Which of the following is NOT a scripting language in Unix?
48. A Unix user can belong to:
49. When files are recovered after any sort of problem or failure, if the kernel cannot ascertain the proper location in the file system, the recovered file is placed in the directory:
50. After a fork, the new process...
51. In the /etc/group file, the group with GID 0 contains:
52. Which command is used to make an archive of a directory?
53. The numeric permission equivalent to '-rw-rw----' is:
54. If you wanted to have multiple outputs for a particular command or script which standard base utility would you use?
55. If you use the command 'ls -F', a string that ends in @ is a:
56. To channel the output of one command or program into the input of another, you use:
57. The cal command...
58. To show the grand total, in kilobytes, of all directories (to which you have access) at or below the current point in the file system, you use:
59. chmod allows you to specify permissions for a file using octal numbers. 1000 permission is:
60. You instruct a program to take its input from a previously prepared text file using the input redirection character:
61. When searching the path, if there are two commands with the same name:
62. A good account name for the default user that will need to carry out only non-privileged operations is:
63. The command 'chmod -x /tmp/tmp.tmp' will:
64. What will be the output of the command: basename /var/tmp/myfile.txt
65. To run network services on 'trusted' (numbered below 1024) ports, your effective UID should be:
66. Can a Unix filename contain a space?
67. In Unix, ping works on which protocol?
68. The standard shell of Unix System V is:
69. What does SNMP stand for?
70. To know which tty you are on, you use the command:
71. If you wish to change both owner and group of a file in a two-step process, use these commands:
72. If you execute the following, which users can read the file? chmod 060 file
73. A period, in a Unix file name:
74. Listing directory trees recursively, in ls you use the flag:
75. Passwords may contain:
76. A password security feature of Unix allows N to set an expiration date on users' passwords:
77. What happens to a process accessing a file if you delete the file?
78. Which of the following find commands is correct?
79. The whereis command helps you to locate...
80. What will the following command result in on a SystemV host?: ps -ef | grep '[/]sbin/init'
81. Which of the following is NOT used as a wild-card in the shell?
82. The command 'chmod o+w flog' will...
83. How to retrieve the GECOS information of the user 'sbz' ?
84. What is the primary difference between binaries located in /bin and /sbin versus /usr/bin and /usr/sbin?
85. The command that would append the output from the encrypter to the current contents of the file private and read in the contents of the file top_secret, is:
86. When you execute the command 'cp . newdir', you...
87. To be run by the shell, a shell script needs the following permission(s):
88. How does Unix maintain its time clock?
89. To list the current users logged on to the system you use:
90. What is the default maximum number of open files a user can have?
91. The superuser can:
92. To display or set your terminal characteristics, you use the command:
93. When you first log in to a Unix system, the login program performs various security measures. Which is not one of these security measures?
94. In an ls listing, 'l' 's' and '-' indicate:
95. If you use the command sequence: echo 'hello'>file; ln file newfile; rm file; What will happen when you run: cat newfile
96. How would you print the content of the file in a reverse?
97. A user reports a problem. In order to gain access to his account in the most secure and non obtrusive way, you...
98. You inspect the last access time (atime) instead of the last modification time (mtime) in ls output by using the following switch to ls:
99. In Unix, a filename cannot have the following character:
100. If FFF is a file, the command 'touch FFF' will:
101. Which of the following is not contained in the inode structure?
102. Which of the following would you use to set yourself as the superuser in a secure way?
103. Changing a file's permissions...
104. If your umask is 007 it means that default files are created with the permissions:
105. To set a file so that anybody can read it but only root can modify it without changing the file's owner, you use chmod's octal permissions of:
106. chmod allows you to specify permissions for a file using octal numbers. 4000 permission is:
107. How do you determine the runlevel of the running system?
108. When you check a file's permissions, and there's an 'S' in the place of 'x' in the owner permissions section of the ls command, it means that the:
109. True or False: Multiple usernames on Unix are allowed to have the same UID.
110. To change the flog file permissions so that others besides you could neither read nor write to it, you do:
111. The file oldies-goldies has the details of the sale of books.The records are sorted on the names of the authors and are as follows Alexandre Dumas Alexandre Dumas Alexandre Dumas Gerald Durrell Giovanni Guareschi Giovanni Guareschi James Herriot Louisa May Alcott Louisa May Alcott Louisa May Alcott Based on the above information, what will be the output of the command uniq -u oldies-goldies ?
112. Which keystroke combination sends or signals an interrupt request to a process ?
113. Which command will you use to count the number of words in a file?
114. The main objective of a time-sharing operating System like UNIX is to :
115. Which command gives information about space being used by files and directories ?
116. The chmod command :
117. Which of the following locations store the information about the currently installed Software on a local system?
118. What will be the result of command '' rm -r directory/* ''?
119. What is the exit code of a successful command ?
120. Which variable contains the system prompt ?
121. The mv command :
122. Which of the following commands can be used to change group ownership of a file/directory?
123. Which option used along with find prompts the user for confirmation before any operation is performed on a file ?
124. The command rmdir c-prog will not work if :
125. The command ls | more displays a list of :
126. Which special variable will display the exit status of the last executed command in Bourne or Korn shell?
127. Which variable will display the list of the positional parameters?
128. Which option of the uniq command would you use to display only those lines which have a multiple occurrence ?
129. Point out the incorrect statement regarding standard input , output and error :
130. Which option of the sort filter performs a numeric sort ?
131. You want to read through the reference manual.What command will you use ?
132. You want to make a new directory.What command will you use ?
133. Which UNIX command provides the type of information contained in a particular file ?
134. Which of the following statements regarding file naming is incorrect?
135. Which type of users can be associated with each file in UNIX ?
136. Which of the following commands can be used to communicate directly with other users by sending messages?
137. Which screen manipulation command sets the screen to reverse video?
138. Consider the following command cat re* Which of the following files will not be displayed by this command ?
139. Suppose you have a file named trans and you want to display fields two to four. Which of the following commands will you use ?
140. Which of the following files is configured for login name, login directory and login shell variables?
141. Which option used along with the find command allows one to perform operations on the files that are located by the find command ?
142. Which filter will you use to translate a set of charaters to another ?
143. The wc filter :
144. Which command will symbolically link two files in a directory?
145. Which command compresses a file?
146. What is the default standard error file ?
147. Which of the following commands can be used to add the read and write permissions to the user and group classes of a file named abc?
148. Which command identifies the current working directory ?
149. Mounting a file system means :
150. What is the file descriptor for the standard error file ?
151. With regard to UNIX, a process is :
152. Which of the following is incorrect about the restrictions imposed by the restricted shell ?
153. Which of the following characters can be used to run multiple commands on a single line?
154. Which command will you use to see your current group?
155. Which command will delete a directory only if it is empty ?
156. Using which command can you move to a different directory?
157. Pipes is/are :
158. Which command would make the scope of a shell variable global to the subshells ?
159. Which of the following statements is incorrect ?
160. Who can change the password of a user account?
161. What is the correct command to delete all files with two character file-names from the directory /user/group2 ?
162. Study the following statements and select the incorrect one :
163. UNIX offers the following benefits :
164. In UNIX , shell is a program which :
165. Which of the following commands can be used to view the calendar of April 2007?
166. You want to search for the pattern 'Newa' or 'Newb' or 'Newc'. Which regular expression will you use with the grep command ?
167. Which of the following statements is incorrect regarding variables?
168. What is the file descriptor for the standard output file ?
169. Which command invokes a text editor ?
170. Which option of the uniq command would you use to display lines with only one occurence?
171. What is the default UNIX prompt?
172. What is the number of standard file pointers in UNIX?
173. In which of the following high level languages most of the UNIX is written?
174. Which command is used to run a command at a specified time ?
175. You have two variables, v1 and v2. You want to assign the value of v2 to v1.Which of the following declarations is correct ?
176. What communication command allows a user to communicate with another user logged on by splitting the screen and providing two way communication ?
177. The number of arguments can be known by which variable ?
178. UNIX is an example of :
179. What information does the who am i command display?
180. You want to declare a variable vs with the value hello. Which of the following declarations is correct ?
181. Which of the following is not a filter ?
182. What is the command that can print lines of 1st file matching with 2nd file ?
183. Which file contains the commands run by all users at login?
184. Which command would you use if you want to display selective fields from a file ?
185. Which filter is used to copy the standard input to the standard output and also to a disk file ?
186. You are writing a shell script.For a given condition, you want to terminate a loop. Which command will you use ?
187. The find command :
188. By which screen manipulation command can you specify the coordinates for the cursor position ?
189. Highlight the incorrect statement regarding the uniq command :
190. The command rm -r project
191. You want to specifically search for the character [ . What character(s) would you use in the expression to achieve this ?
192. Which screen manipulation command sets the screen back to normal?
193. Which character of the grep filter specifies that the pattern preceding it must occur at the end of each line ?
194. Which option of the grep filter prints out all those lines that do not match the pattern specified by the regular expression ?
195. Which character would be used in the grep filter to specify a pattern which consists of any one of a set of characters?
196. The user passwords are kept in which file on most Unix systems?
197. Which option of the sort filter folds lower case characters to upper case ?
198. Which file contains the commands that the system executes when a user logs in?
199. The executable file name for the Bourne shell is :
200. By which command a user can add a password for his login name?
201. Which of the following is the only filter?
202. Consider the following file listing of file abc1 for a user abc -rw------- 1 abc student 10 jan 10:39 abc1 What inference would you make regarding the file access permissions ?
203. Which command gives all differences between two files ?
204. Which command gives location of the first difference between two files ?
205. Which of the following shells is typically used for guest logins and in secure systems ?
206. Which option of the sort filter changes the output to reverse order ?
207. Which of the following is not a valid file command ?
208. Which wild-card matches one character ?
209. A single command which lists all files in a directory, distinguishing between a directory, executable and symbolic link files is:
210. What would be displayed on the screen if the pwd command is entered when the user is in /usr directory?
211. Which of the following statements is incorrect regarding positional parameters ?
212. How can a root user find the password of a user who has forgotten his password?
213. Which of the following statements is incorrect regarding the UNIX environment?
214. Which command is used for splitting a file horizontally?
215. Which of the following is a responsibility of the system administrator?
216. What is the number of fields in each line in /etc/passwd file?
217. Which command enables you to concatenate files ?
218. What option of the sort filter would you use if you want to save the output on a disk file ?
219. The file descriptor of stdin is
220. The PID of a process is displayed by the command
221. Which error will you see when an NFS client can no longer access mounted file system?
222. Which of the following statements is not true regarding UNIX ?
223. What control character signals the end of the file ?
224. Which of the following commands will you use to send the contents of a file named abc to a user named Raven by mail?
225. The shell variable that defines internal field separator is.
226. What communication command provides communication to another user logged on by writing to the bottom of their terminal ?
227. Which of the following commands can be used to see the detailed information on how to use a particular command?
228. Which command will you use to see the available routes and their status?
229. The command to restore files and directories from magnetic tape is :
230. Which of the following statements is not true regarding the grep filter?
231. Which of the following statements is incorrect regarding processes ?
232. The command to take a backup of files and directories on magnetic tape is:
233. The UNIX command
234. Which key combination instructs the shell to terminate the session ?
235. Which command prints the current working directory ?
236. Which command is used for changing the ownership of a file or directory?
237. What is the user id of a root user?
238. ____ is not a selection command.
239. In unix/linux, text files and binary files are considered to be ____ files.
240. Unix and linux are operating systems designed to run on ________.
241. Unix is called a(n) ___________ operating system because it can run on a desktop pc or a server.
242. Unix uses a ____ to keep track of which processes are using shared program code.
243. Unix uses the ____ page replacement algorithm.
244. The ____ command removes duplicate lines from a file.
245. Freebsd is a(n) _____-based operating system.
246. To append output to an existing file, you use ____.
247. To display the contents of a file called data, use the command ____.
248. If you execute ____, the contents of file1 are sorted and the results are stored in file2.
249. Unix and linux are ____ systems, which allow one user to execute more than one program at a time.
250. Default permissions are determined by the _____.