TCMG303 Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

The ________ key can be used as a shortcut to find files or directories when used in conjunction with a command.

. tab

Which of the following are parts of the Raspberry Pi hardware?

.. HDMI monitor port. Ethernet port. USB ports. correct: All of the above

What is the highest level in the Unix file structure?

/

What is the name of the file that is used to control the hardware settings on the Pi and what directory is it located in?

/boot/config.txt

Unix is approximately _________ years old.

45

Which option to chmod would give 'rwx' to owner, 'r' to group, and 'r' to everyone else:

744

To get to the start of the file in vi, you would type:

:0

Which of the following definitions best describes a system administrator and their responsibilities in the IT field?

A person that works in the information technology field and supports the infrastructure of a company. The responsibilities of a system administrator includes maintaining server and network hardware, application software such as web and email servers, system performance monitoring, user account management and access control, and cyber security related items.

The _____________ Unix variant was developed in the _____________ by IBM.

AIX, 1980's

Which of the following companies use Unix\Linux servers:

All of the above.

How is the file system structured on the Unix server?

As a hierarchal tree with directories that branch downward, with the root level at the top.

Which of the following is an example of a shell in the Unix operating system?

C shell. Bourne shell. Bash shell. Correct: All of the above.

What does CLI & GUI stand for?

Command Line Interface & Graphic User Interface

Which of the following companies use the Unix/Linux operating system?

Correct: All of the above. Google. Pizza Hut Toyota.

Which is NOT to be considered a benefit of "open source":

Dedicated support structure.

A RPM is used to secure the user account in the Unix operating system.

False

A user cannot change the command line prompt in the Unix operating system.

False

Being an integral part of the operating system used for command line interpretation, Unix shells cannot be customized or programmed.

False

Common user commands such as setdir, lockdir, and ulock for setting and viewing permission bits on directories and files.

False

If set, the sticky bit restricts deletion or renaming of files not owned in shared directories and appears as "P" in the other execute field on the permission settings.

False

Runlevel 4 is used for single-user mode.

False

SUID and SGID are seen as a 't' in the file permissions.

False

Security settings can only be done on files within the user's home directory.

False

Specifying a location of a file based on the root level directory in the file system hierarchy is considered a relative path.

False

The "adduser" command is used to remove an user's account from the operating system.

False

The "sudo" command allows a user to temporarily change to another user in the system.

False

The Raspberry Pi cannot be used with peripherals because of its size.

False

The Unix file system does not support external file systems due to the structure within the operating system not being able to handle foreign file formats.

False

The cron service is the system process which will automatically perform tasks for you according to a set schedule and is configured in the clktab file.

False

The krypton (ksh) shell is different from all other shells and allows for a user to have sudo privileges automatically when used.

False

The nano editor is much harder to use for file editing than the vi editor.

False

The permission setting of 111 allows for everyone to have access to the file or directory.

False

The root level directory (/) is the lowest level in the directory tree.

False

The shutdown -h command is used to reboot the server.

False

The switch user (su) command defaults to the current user therefore is safe to use for executing program files.

False

There are five process states used in the execution of commands within the Unix operating system.

False

Using >> will overwrite an existing file.

False

gzip uses the same format in Unix/Linux as Windows-based zip files.

False

ssh is the preferred way to log in to a system to browse the web.

False

When was the Unix operating system developed and who developed it?

In 1969 by AT&T (Bell Labs).

When was the Linux operating system developed, who developed it, and why was it developed?

In 1991 by Linus Torvalds as an alternative to expensive and proprietary versions of Unix.

Unix/Linux server can be used as a?

Mail server. Database server. Web application server. Correct: All of the above.

What is the name of the preinstalled software tool that is used to load the operating system on the Raspberry Pi?

NOOBS (New Out Of Box Software)

What is the differences between open source and closed source operating systems?

Open source software is developed by a community of users and can be modified easily and closed source software is developed by a private company and is unmodifiable for the most platforms.

What does the Unix command line format consist of?

Prompt, command, options, arguments.

What is a RPM and what is it used for?

RPM stands for Redhat Package Manager, which is a program used for installing, uninstalling, and managing software packages in Unix/Linux.

What operating system does the Raspberry Pi commonly use?

Raspian/Debian OS.

rwsr-xr-x means that

SUID is set

What does the file permission of SGID mean in the Unix operating system?

Set Group ID, is used on executable files to allow the file to be run as if logged into the group.

What does the file permission of SUID mean in the Unix operating system?

Set User ID, is used on executable files to allow the file to be run as the file owner instead of the user logged in.

What does the command "sudo raspi-config" do?

Starts the Raspberry Pi Software Configuration Tool.

What is a sticky bit and how is it used in the Unix operating system?

The sticky bit restricts deletion or renaming of files not owned and is commonly used with shared directories such as /var/tmp and /tmp.

A Unix shell is a command line interpreter for user commands.

True

A path in the Unix file system is a unique location to a file or directory.

True

A relative path is a file or directory location based on the user's current location within the file system.

True

A system administrator manages the computer systems in an organization. The responsibilities of a system administrator and network administrator often overlap; however, the system administrator is more geared to the computer hardware and less on the network

True

APT, Yum, and OpenPKG are well-known RPMs.

True

An absolute path is always a valid way to navigate in a Unix directory structure.

True

An absolute path is the best solution for direct file access in the Unix file system.

True

Dot dot (..) is used to navigate up a directory level.

True

Every directory in the Unix file system contains a dot (.) and dot dot (..) which are short-cuts that can be used by the user when navigating the file system.

True

Initialization files that are in the user's home directory and executed at login can be used for setting variables, aliases and customized commands.

True

Most Linux distributions are free.

True

Seven runlevelsare supported in the standardUnix kernel.

True

The RPM verifies authenticity, ownership, and validity of the software package being installed.

True

The Raspberry Pi basically has two types of interfaces by a user: command line and graphical (menus).

True

The Unix operating system has the ability to run multiple process through CPU time sharing making it highly efficient.

True

The ability to run multiple processes using CPU time sharing is the power and efficiency behind the Unix\Linux operating systems.

True

The basic command line parameters include the system prompt, command name, option flag, options, and filename or path.

True

The command to change a user password in the Unix/Linux operating system is $ passwd <user>.

True

The grep command is used search a text file and locate matching string patterns to that specified by the user.

True

The nano editor is another default editor delivered with the Unix/Linux operating system, but is limited in functionality compared to other editors.

True

The set user ID bit is used on executable files to allow the executable to be run as the file owner rather than as the user logged in.

True

The shell script is designed to be run by the Unix shell to perform operations such as file manipulation, program execution, capture user input, and/or output data.

True

The standard Unix Kernel support seven different runlevels.

True

The sticky bit is used to allow only the owner or root to delete or rename a file in a shared public directory such as /tmp.

True

The sudo command allows a user to run a program with the privileges of another user, usually root.

True

The switch user (su) command allows the current user to temporarily become another user in order to execute a file.Yes.

True

The top, uptime, and ps commands are used for system performance monitoring in the Unix operating system.

True

The vi editor is one of the default file editors that comes with the Unix/Linux operating system.

True

Vi and nano are common Unix/Linux file editors.

True

The switch user (su) command allows the current user to temporarily become another user in order to execute a file.

Uses direct inter-processor communication of devices (hardware seen as files) making it very efficient and easy to integrate. Provides portability, stability, reliable, and better security. Provides multiuser, multitasking, and multiprocessing. Correct: All the above.

Do you have your Raspberry Pi already and ready to start the Unix adventure?

Yes.

What is a cron job?

a service that allows for specific tasks to be accomplished automatically at a given date and time.

Which of the following is a command used to navigate around in the file system?

cd - change directory rmdir - remove a directory ls - list directory content cp - copy file or directory pwd - print working directory mv - move file or directory mkdir - make a new directory rm - remove file All of the above.

Which command is used to change file or directory permissions:

chmod

To switch between modes in vi, you use the ________ key.

escape

You would most definitely find the SGID bit set on directories that contain:

executable files

The default user that comes already established on the Raspberry pi is called "raspberry" with a password of "root".

false

The SUID bit

is shown as 's' in the file permissions and allows the file to be executed as the file owner.

What is the default user and password on the Raspberry Pi?

pi/raspberry

You would most definitely find the sticky bit set on files in a directory that contain:

public or log files

Which command would list all RPM packages installed:

rpm -qa

Which command will delete a new user on the server:

sudo deluser username

This is used to add to the available amount of RAM in a system:

swap

ssh is directly used for all of the following except:

to offload local processing

The vi editor has two modes: insert mode and command mode.

true

All of the following are text editors in Unix except:

word

What other special character is used to chain commands and redirect the output of one command into another:

|


Conjuntos de estudio relacionados

Praxis Mathematics - Content Knowledge (5161) Chapter 23 - Polynomials Quiz Questions

View Set

Art History Exam 3, Egypt and Ancient Greece

View Set

MARK3336 Ch. 12 Video: Prime Day Is a "dress rehearsal" for Amazon Logistics

View Set

MKTG 4390 (Personal Selling : Butler) EXAM 1

View Set

Chapter 13 UNDERSTANDING RESEARCH RESULTS: STATISTICAL INFERENCE

View Set

Chapter 9 Nail structure and growth

View Set