Академический Документы
Профессиональный Документы
Культура Документы
Time : 60 Min
Emp_id: ___________
Marks : 40
777
666
744
711
2. Which of the following command can be used to change the user passwd?
a) User cant change the password
b) passwd
c) passd
d) pwd
3. How can I check the filesystem usage in my system?
a) mount
b) df
c) du
d) du -f
4. With a umask value of 112, what is the default permission assigned to newly
created files?
a) ---x--x-wx
b) -rw-rw-r-c) -r-xr-x-r-d) -rw-rw---5. In UNIX, permissions are associated with files and directories. The command
used to alter these permissions is
a) mv
b) chgrp
c) chmod
d) set
6. How can you search for blank line in a file?
a) $ grep file
b) $ grep ^$ file
c) $ grep [ ] file
d) $ grep [^$] file
7. Process information in the current shell can be obtained using . command.
a) kill
b) bg
c) fg
d) ps
8. Where can I find the printer in the file structure?
a) /etc
b) /dev
c) /lib
d) /printer
9. Which command is used to assign read-write permission to the owner?
a)
b)
c)
d)
chmod
chmod
chmod
chmod
a+r file
o+r file
u=rw file
og-r file
10. The soft link will increase the link counter of the file.(T/F)
a) True
b) false
11. What does the following command do ?
who|wc l
a) List the number of users logged in
b) List the users
c) List the number of users in the system
d) Display the content of who command
12. Which of the following statement is true?
a) The cp command will preserve the meta data of the files
b) The sort command by default sorts in the numeric order
c) The mv command will preserve the meta data of the file
d) The command ps will display the filesystem usage
13. Solaris is the name of a flavor of UNIX from
a)
b)
c)
d)
HP
IBM
Digital Equipment Corp.
Sun Microsystems
14. What would be the current working directory at the end of the following
command sequence?
$ pwd
/home/user1/proj
$ cd src
$ cd generic
$ cd .
$ pwd
a)
b)
c)
d)
/home/user1/proj
/home/user1/proj/src
/home/user1
/home/user1/proj/src/ generic
16. Assuming the files fileA, fileB, fileAB, fileBC and fileABC, exist in a directory,
which files match with the pattern file[ABC]?
a)
b)
c)
d)
18.
19. Which of these commands will set the permissions on file textfile to read and
write for the owner, read for the group, and nothing for everyone else?
a) chmod 046 textfile
b) chmod 640 textfile
c) chmod 310 textfile
d) chmod rw r nil textfile
20. When you use the ln command, which of the following occurs?
a) a file is created that points to an existing file
b) a file is created that is a copy of an existing file
c) a file is moved from one location to another
d) a file is renamed
21. What UNIX command is used to update the modification time of a file?
a) time
b) modify
c) cat
d) touch
22. How do you print the lines between 5 and 10, both inclusive
a) cat filename | head|tail +5
b) cat filename |tail -5 |head +5
c) cat filename |tail +5 |head
d) cat filename |tail -5|head -10
23. Create a new file "new.txt" that is a concatenation of "file1.txt" and "file2.txt"
a) cp file.txt file2.txt new.txt
b) cat file1.txt file2.txt >new.txt
c) mv file[12].txt new.txt
d) ls file1.txt file2.txt|new.txt
24. Which algorithm does UNIX OS uses to schedule a process, if two processes of
the same priority are waiting?
a) Priority Algorithm
b) Round Robin
c) First Come First Serve
b) The count of lines which begin with the pattern echo in file abc
c) The count of lines that ends with the pattern echo in file abc
d) None of the above
32. The system calls in UNIX is written using __________ language
a) C
b) C++
c) Assembly Language
d) Fortran
33. Which of the following enables multi-tasking in UNIX?
a) Time Sharing
b) Multi programming
c) Multi user
d) Modularity
34. The user John logged in and performed the following sequence of command.
What will be the output of the last command?
$ cd project/module1
$pwd
a)
b)
c)
d)
/home/john/project/module1
/home/project/module1
/usr/john/project/module1
project/module1
35. What is the command to display all the files including hidden files in your
current and its subdirectories ?
a) ls aR .
b) ls a
c) ls R
d) ls aR /
36. Which of the following commands can be used to copy files across systems?
a) ssh
b) telnet
c) rsh
d) ftp
37. Which of the following commands is used to take a backup and restore it in
different architecture?
a) ftp
b) backup&restore
c) tar
d) copy
38. Which of the following is considered as the super daemon in Unix?
a) sysinit
b) init
c) inetd
d) proc
39. Which of the following file contains the user password?
a) /etc/passwd
b) /etc/shadow
c) /etc/groups
d) /etc/security/shadow
40. Which of the following files need to be referred for users secondary group?
a) /etc/passwd
b) /etc/shadow
c) /etc/group
d) /etc/profile