cpt 176 final study guide

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Processes are started with a nice value of ____ by default.

0

The file descriptor stdin is represented by the number ____.

0

RAID level ____ is often referred to as disk mirroring.

1

Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.

1024

If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault.

11

Most Parallel SCSI controllers support up to ____ devices.

15

The source code for Linux was released in ____.

1991

In Linux, runlevel ____ is also known as multiuser mode.

2

The file descriptor stderr is represented by the number ____.

2

The recommended size for the /home directory is ____ per user

200 MB

Hard disks can contain a maximum of ____ major partitions

4

The compression algorithm used by the compress utility has an average compression ratio of ____%.

40-50

RAID level ____ is commonly referred to as disk striping with parity.

5

By default, all print jobs have a priority of ____.

50

If no level of compression is specified, the gzip command assumes the number ____.

6

The average compression ratio for gzip is ____%.

60-70

There are ____ different kill signals that the kill command can send to a certain process.

64

The highest priority SCSI device is given a SCSI ID of ____.

7

When using the chmod command, the mode rwx can be represented by the number ____.

7

____ is the metacharacter for command termination

;

You can redirect a file to the standard input of a command using the ____ metacharacter.

<

You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file.

>

The ____ symbol indicates a linked file.

@

The shell that is used by default in Linux is the ____ shell.

BASH

Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics?

Ctrl+g

The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor.

Emacs editor

is software that is distributed free of charge, but the source code is not available.

Freeware

The ____ stipulates that the source code of any software published under its license must be freely available.

GNU General Public License

Which of the following is the greatest expense for companies using Linux?

Hiring people to maintain the Linux system

____ is the most common method of installing Linux.

Installation from a DVD

The two most common desktop environments that are used on Linux are ____ and ____.

KDE; GNOME

HOWTO documents are centrally collected by the

Linux Documentation Project

A(n) ____ service allows users to post messages in forums.

News

The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.

Open Source Software

____ are specific letters that start with a dash ("-").

Options

Most Linux distributions today use ____ as their package manager.

RPM

____ Linux is the most common Linux distribution used today

Red Hat

The ____ kill signal stops a process and then restarts it with the same PID.

SIGHUP

The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory.

SIGQUIT

The ____ field in a cron table contains the absolute pathname to the command to be executed.

SIXTH

Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system?

Stability and security

____ of the GRUB boot loader typically resides on the Master Boot Record.

Stage1

If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.

Tab

____ installation log file(s) is/are created by the Fedora installation program.

Two

The ____ filesystem is compatible with the Windows FAT filesystem.

VFAT

The core component of the GUI in Linux is referred to as ____.

X Windows

____ is a freely available version of X Windows used in many Linux distributions.

XFree86

The test statement ____ would be used to determine if A is numerically greater than B.

[ A -gt B ]

Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?

[1-4]

The ____ escape sequence represents a form feed.

\f

The ____ priority used by the System Log Daemon indicates an error that should be rectified immediately, such as a corrupt system database.

alert

The ____ command can be used to extract, manipulate, and format text using pattern-action statements.

awk

The command that displays the calendar for the current month is ____.

cal

To display the contents of a file called data, use the command ____.

cat data

To move from the /home/joe/test/data to the /home/joe directory, use the ____ command.

cd ../..

Devices that transfer data in a character-by-character fashion are referred to as ____ devices.

character

To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.

chmod 7777 name

Most configuration files on Linux systems are delimited using ____ characters.

colon

Copying a file can be accomplished using the ____ command.

cp

A system process that is not associated with a terminal is called a(n) ____ process.

daemon

A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.

device driver

The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

df

The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.

echo $PS1

You can edit the quotas for certain users by using the ____ command.

edquota

To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.

env

Which Linux command gets you out of your current shell?

exit

To create partitions after installation, you can use the ____ command.

fdisk

After a background process has been started, it can be moved to the foreground by using the ____ command.

fg

Solaris, HP-UX and AIX are all ____ of Unix.

flavors

Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems.

fsck

A(n) ____ service provides an efficient method for transferring files over the Internet.

ftp

When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.

g+r-w

The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors

gedit

To create an encrypted password for use in the /boot/grub/grub.conf, you can use the ____ command

grub-md5-crypt

In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.

image

In the /etc/lilo.conf file, the ____ keyword specifies the file that contains the physical layout of the disk drive.

install

The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.

ioports

CD-ROMs typically use the ____ filesystem type.

iso9660

In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.

kickstart

To create a hard link, you must use the ____ command.

ln

The ____ file in the /proc directory contains statistics on the performance of the processor.

loadavg

The fastest method to search for files in the Linux directory tree is to use the ____ command.

locate

To send a print job to a printer, you must first use the ____ command and specify what to print.

lp

You can restrict who can print to certain printers by using the ____ command.

lpadmin

To see a list of all printers on the system and their status, you can use the -t option to the ____ command.

lpstat

The ____ command can be used to provide a long listing for each file in a certain directory.

ls -l

The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture.

make

To find all of the commands that have the word "list" in their name or description, you would type ____.

man -k list

The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.

metacity

The ____ indicates the stability of a Linux kernel.

minor number

The section of an inode that stores permissions is called the ____ of the file.

mode

To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command.

newgrp

You can perform up to ____ different incremental backups using the dump/restore utility.

nine

Which utility can be used to modify runtime configuration files so that they start and stop daemons when entering a particular runlevel?

ntsysv

Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information.

preinstallation checklist

In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing.

process state

To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command.

pwconv

The ____ command will confirm the system directory that you are currently in.

pwd

If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.

read and execute

The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.

rm

The ____ filesystem contains most of the operating system files.

root

The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd.

secure

You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory.

service

To see a list of the environment variables and their current values on a system, you can use the ____ command.

set

In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing.

shell

A Fedora 13 CD installation requires ____ CDs.

six

The ____ section of a filesystem is the section that contains information about the filesystem in general.

super blocks

Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____.

supercomputer

To configure your keyboard, you can use the ____ command from either a GUI or terminal environment and restart X Windows.

system-config-keyboard

The ____ command displays the last five lines of a text file

tail -5

A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.

tarball

Each SCSI device is assigned a unique ID number known as a(n) ____.

target ID

Most files on a Linux system that contain configuration information are ____ files.

text

You can execute ____ main types of Linux commands.

three

The ____ command can be used to replace characters in a file sent via Standard Input.

tr...

Data is read off of hard disks in concentric circles called ____.

tracks

During Linux installation, you need to configure a minimum of ____ user account(s).

two

Linux requires ____ partition(s) at minimum.

two

The chgrp command takes ____ argument(s) at minimum.

two

The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.

udf

You can create user accounts on the Linux system by using the ____ command.

useradd

The ____ command counts the number of lines, words, and characters in a file.

wc

Which Linux command displays your login name?

whoami

If a user has ____ permission for a file, they can open, read, and edit the contents of a file.

write

The ____ option to the ps command displays all processes that do not run on terminals.

x

After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.

xvidtune

The ____ command can be used to display the contents of a compressed file.

zcat

Which is an extended regular expression metacharacter

{}

You can send the standard output of one command to another command as standard input using the ____ shell metacharacter.

|

The ____ metacharacter can also be used to refer to the current user's home directory

~

You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.

$

When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____.

%

The ____ metacharacter indicates background command execution

&

When you append a(n) ____ to a command, the command is run in a background process.

&

The ____ regular expression metacharacter matches 0 or more occurrences of the previous character

*

When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol.

+

In a file's mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

-

To create or edit a user cron table, you can use the ____ option to the crontab command.

-E

To view a list of files and their type, use the ____ switch to the ls command.

-F

To lock an account, you can use the usermod command with the ____ option.

-L

To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command.

-a

When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output.

-c

The lp command uses the ____ option to specify the destination printer name.

-d

To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command.

-e

To remove a package from the system, you can use the ____ option to the rpm command.

-e

When used with the compress command, the ____ option can be used to compress symbolic links.

-f

The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.

-l

To display a list of at Job IDs, you can specify the ____ option to the at command.

-l

When using the cpio utility, the ____ option causes a new archive to be created.

-o

The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.

-p

When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.

-p

You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents.

-r

To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command.

-t

The ____ option can be used with the tar command to extract a specified archive.

-x

The ____ standard support speeds of up to 80 MB/second.

.SCSI-3 Ultra2 Wide

When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed.

.Z

The filename extension given to files compressed with bzip2 is ____.

.bz2

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

/boot

The Linux kernel is stored in the ____ directory.

/boot

The ____ device file represents the second serial port on the system (COM2).

/dev/MAKEDEV

The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).

/dev/hdb1

If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format.

/etc/X11/xorg.conf

The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH.

/etc/profile

After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.

/etc/rc.d/rc.local

The skeleton directory on most Linux systems is ____.

/etc/skel

To verify hardware settings, you can examine the contents of the ____ directory.

/proc

To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.

/proc/meminfo

In the FHS, the ____ directory is the root user's home directory.

/root

In the FHS, the ____ directory contains most system commands and utilities.

/usr

The ____ directory contains system commands and utilities.

/usr

Log files are typically stored in the ____ directory.

/var/log

A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.

0

Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.

#

Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.

#


Kaugnay na mga set ng pag-aaral

Customer Service Quizizz on Questions 11 - 30

View Set

Astronomy Ch. 13 Uranus and Neptune: The outer Worlds of the Solar System

View Set

Chapter 8&9 Antiinfective Agents& Antibiotics

View Set

Analyzing and Evaluating Arguments 100%

View Set

MAR 5625 - Marketing Research and Analytics - Chapter 9

View Set

Topic 1: Understanding Entrepreneurship

View Set

Humángenetika (Hoffmann) fogalmak

View Set

California Real Estate Practice Chapter 12 Rockwell Slides

View Set