Linux Chapter 2, Linux Chapter 1, Linux Chapter 3, DCOm 142 Linux Final Study, Chapter 0, Linux Ch. 7&8, Linux Chapter 2, Linux Chapter 1, Linux Test chapters 4-9

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What are dot-files in Linux?

A file whose name starts with a dot

Which of the following are risks you take when you browse the Web as an ordinary user on a properly configured Linux system?

A web site with malicious dynamic content could steal your personal data files. Data transferred to or from a web site can be intercepted, possibly exposing sensitive data to theft.

Which of the following two office suites are most closely related to one another?

A, E LibreOffice is derived from OpenOffice.org, so options A and E are correct. GNOME Office and KOffice are independently-created office suites for Linux, while Microsoft Office is a commercial office suite for Windows and Mac OS X. Thus, options B, C, and D are all independent of each other and of LibreOffice and OpenOffice.org.

Which of the following programming languages is most often implemented as a compiled language?

D Of these languages, only C++ is commonly implemented as a compiled language, so option D is correct. The remaining options are all commonly implemented as interpreted languages.

Which of the following operating systems is Linux largely modeled on?

D UNIX

Which of the following is not a function of the Linux kernel?

Displaying common GUI elements such as dialog boxes

Which of the following are valid keywords that identify DNS resolution features in /etc/resolv.conf?

Domain search nameserver

Which of the following pieces of information on user accounts is not normally stored in the /etc/passwd file on modern Linux distributions?

E Although /etc/passwd includes a field for the password, that field normally contains an x value, meaning that the encrypted password is stored in /etc/shadow. Thus, option E is correct. The accounts default shell, default GID number, UID number, and username all appear in /etc/passwd, so options A, B, C, and D are all incorrect.

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?

E The >> operator appends standard output to a file, so option E is correct. The vertical bar (|) is the pipe character; it ties one program's standard output to another's standard input. The 2> operator redirects standard error, not standard output; and it overwrites the target file. The &> operator redirects both standard output and standard error, and it overwrites the target file. The > operator redirects standard output, but it overwrites the target file.

Which of the following are vi editor operation modes?

Ex Command Insert

True

True or false: you can use IRC to get help from any problems from other users in real-time

Question 42 : Which of the following represents the Bash logical operator AND?

&&

Which option of the ls command causes it to view dot files?

-a

Which option with the grep command displays only the number of matching lines in a file?

-c

Question 9 : Which option of the userdel command is used to delete a logged in user's account?

-f

You want to store the sorted output of a file to another file. Which sort option will you use to specify the target file?

-o

Which of the following useradd options is used to create a system account?

-r

What will be the device filename of the first logical partition on the second MBR disk?

/dev/sdb5

The terminal emulator program that would eventually become the Linux kernel was created in

1991

Under which version of the GPL is the Linux kernel distributed?

2

What will be the output of the following line of code? for a in `seq 2 5`; do echo -n $a; done

2345

Ubuntu releases a new version of its OS every _____ months.

6

You're unable to exit the vi editor without saving the changes made to the file by using the :q command. Why?

A ! is not appended with the command. B The :q command only exits the file if the changes are saved.

Which of the following statements are true of a symbolic link?

A A symbolic link refers to another file using its name. B A symbolic link has an l as the first character of its permission string.

What symbol do you place after a command to run the program in the background?

A An ampersand (&), placed after a command typed in Bash, causes the command to run in the background, so option A is correct. The remaining options do not accomplish this task, although option C redirects standard output and option D creates a pipe to the following command on the same line. Option B is completely meaningless, as is option E in this context, although a hash mark (#) does serve as a comment character in Bash scripts.

Which of the following statements are true of functions in Linux scripts?

A Functions can be declared in shell scripts by using the function keyword. B A function is called by its name in a script similar to an ordinary command.

Which of the following options to chown changes the ownership of all the subdirectories of any specified directories, rather than just the files or directories that are explicitly passed to it?

A The -R or --recursive option does as the question specifies, so option A is correct. The --tree, -all, and -t options are all fictitious, so options B, D, and E are all incorrect. Option C is almost correct, but the correct option includes two dashes, not one—that is, it's --recursive, not -recursive.

You want to run the command cat /etc/shadow as root, but your logged in as an ordinary user. Which of the following commands will do the job, assuming that the system is configured to give you root access via the appropriate command?

A The command sudo cat /etc/shadow will give the ordinary user access for the command to run as root.

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

A The free command produces the information specified, so option A is correct. Options B, C, and D are all fictitious program names, at least on Linux. The Linux df command (option E) produces a summary of disk space available and used, not memory, so it's incorrect.

What is the purpose of the system account with a UID of 0?

A The UID 0 is reserved for the root user.

terminal

A _______ is a GUI program in which text-mode programs (including shells) run.

memory leak

A condition in which a program allocates more and more memory but doesn't use the memory it allocates is called a ______ ______ (two words).

LibreOffice

A program comes to the documentation file text read me. ODT. what program can you use to read this file?

Which of the following are true of memory leak in Linux?

A program with memory leak fails to return memory after it's done with it. & A program with memory leak keeps requesting for more memory.

FAQ

A question that is posed often, perhaps with an associated answer, is known as a ____. (Specify the acronym)

#

A symbol found in the root shell prompt by default is __.

On which of the following CPU types does Linux run? Each correct answer represents a complete solution. Choose all that apply.

ARM x86 x64

Which of the following is true of Unicode? Each correct answer represents a complete solution. Choose all that apply.

ASCII is a subset of Unicode. It is a text encoding method.

On which of the following CPU types does Linux run? (Select all that apply.)

All: a. x86 b. x86-64 c. Itanium d. PowerPC

repository

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

phishing

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as ____.

Which Linux distribution are you most likely to find in use on a cell phone?

Android

A symbol found in the root shell prompt by default is __.

Answer: #

To obtain a color-coded file listing, if your distribution doesn't produce one by default, you would type ls _____.

Answer: --color

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

Answer: --interactive or -i

The _________ option to tar causes it to back up only the specified low-level filesystem; if another filesystem is mounted within the directory you say to back up, those files will be ignored.

Answer: --one-file-system

You can type useradd ____ nemo as root to create the nemo account without creating a home directory for nemo.

Answer: -M

You can type Xorg ________, as root, to have X create a default configuration file that you can then modify.

Answer: -configure

The user arnold is currently logged in. Despite this fact, you want to delete his account without first logging him off. You don't want to delete arnold's files. To accomplish this goal, you type userdel ___ arnold.

Answer: -f or --force

What can you use to search man pages for key words? (Which option)

Answer: -k The -k is the option to search for keywords in man pages.

To refer to the file afile.txt in the directory one level above the current one, you would type ___afile.txt.

Answer: ../

The file that associates usernames with UID numbers in Linux is ___________. (Provide the complete path to the file.)

Answer: /etc/passwd

A file has a symbolic mode of -rw-r-----. The file's octal mode is _______.

Answer: 640

You've created a script, sensitive, and you want to be sure that no other ordinary user of the computer can read, write, or execute it, but you must be able to read, write, and execute it. To do so, you type chmod ______ sensitive. (Specify the octal mode.)

Answer: 700

The character that separates fields on each line of /etc/passwd is ___.

Answer: :

What type of information can netstat provide?

Answer: A, B, C netstat can provide information on network interfaces similar to what ifconfig provides (option A), routing table data similar to what route provides (option B), and a list of open ports (option C). It can not provide round-trip network packet travel time similar to what ping provides (option D) or the identities of broken routers similar to what traceroute provides (option E).

What term refers to the worldwide system of servers that translates between IP addresses and hostnames?

Answer: B The question describes the Domain Name System (DNS), so option B is correct. The Dynamic Host Configuration Protocol (DHCP) delivers network configuration information to computers when they boot, so option A is incorrect. The Transmission Control Protocol/Internet Protocol (TCP/IP) is the overarching standard used for most networking purposes, so option C is incorrect. IP version 6 (IPv6) is an addressing system that supports immensely more addresses than does the older IPv4, so option D is incorrect. The Secure Shell (SSH) is an encrypted remote login protocol, so option E is incorrect.

Which of the following programs enable root to set the ownership of files? (Select all that apply.)

Answer: B, D command updates a file's time stamps, but does not change its ownership, so option E is incorrect.touch command can change various account features, but not file ownership, so option C is incorrect. The usermod command enables changing the mode (permissions) of files, but not their ownership, so option A is incorrect. The chmod, it enables you to change the ownership of files, so option D is also correct. The root command is a text-mode tool for changing the ownership and group association of files, so option B is correct. Nautilus is a GUI file manager, and when it's run as chownThe

What program can you use to manually bring up a network interface in Linux?

Answer: D The ifconfig program does as the question specifies (among other things), so option D is correct. The iwlist command displays information on Wi-Fi networks but does not bring up a network interface, so option A is incorrect. The route command displays or modifies routing tables, but does not bring up a network interface, so option B is incorrect. The telnet command is a remote-access and network diagnostic tool, but it does not bring up a network interface, so option C is incorrect. The traceroute command produces network diagnostic information, but it does not bring up a network interface, so option E is incorrect.

You want to create a directory called ~/Documents/papers, but you're not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn't already exist?

Answer: E The -p option to mkdir creates parent directories if they don't already exist, so option E is correct. The -a, --recursive, -R, and -r options are all fictitious, so options A, B, C, and D are all incorrect.

The _____ filesystem is very old but is supported by almost every OS, making it a good choice for interoperability.

Answer: FAT

The _____ library provides drivers to control scanners. (Provide the acronym for the library's name.)

Answer: SANE

Postfix is a server that implements the ______ protocol. (Provide the protocol's acronym

Answer: SMTP

The files afile.txt and AFile.TXT can both exist on a Linux filesystem because these filesystems are ____________.

Answer: case-sensitive

The command _______ :users somefile.txt changes the group affiliation of somefile.txt to users.

Answer: chown

The /proc/______ pseudo-file holds data on your CPU, such as its model name and clock speed.

Answer: cpuinfo

You want to delete the oldproj group, so you type ______ oldproj.

Answer: groupdel

The first process to be run by the Linux kernel is normally called _______

Answer: init

The character __ identifies a symbolic link in the 10-character symbolic permission string that's associated with a file.

Answer: l (Lower case L) Found on pg 142

A condition in which a program allocates more and more memory but doesn't use the memory it allocates is called a ______ ______ (two words).

Answer: memory leak

A(n) _________ environment means that a person cannot deny actions, and the sudo command helps establish this environment.

Answer: nonrepudiation

The process that launched a given process is known as the ________ process

Answer: parent

An attempt to acquire sensitive data directly from victims by posing as a trusted Web site or authority is known as ____.

Answer: phishing

An Internet site that hosts software that you can install with yum, APT, or a similar tool is known as a __________.

Answer: repository

UIDs below 500 or 1000 (depending on the distribution) are reserved for use by __________ accounts.

Answer: system

A _______ is a GUI program in which text-mode programs (including shells) run

Answer: terminal

To learn who is currently logged into the computer and what programs they're currently running, you can type _____.

Answer: w

You can use the ____ command to count the characters, words, and lines in a text file.

Answer: wc

You can type _____ to learn your current username and nothing more?

Answer: whoami

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

Answer: | (pipe)

What type of information will you find in /etc/passwd for ordinary user accounts? (Select all that apply)

Answers A, C, E ....

Which of the following are examples of embedded computing devices? (Select all that apply.)

Automobiles, televisions, dvrs

Which of the following statements are true of virtualization? Each correct answer represents a complete solution. Choose all that apply.

B Entire servers can be masked using virtualization. & It allows creation of simulated hardware.

How can you browse to a new node using the standard info documentation reader?

B Select a link using the arrow keys and then press the Enter key.

Which of the following statements are true of beta software? Each correct answer represents a complete solution. Choose all that apply.

B This software version's release comes after the alpha software. D It is more stable than the alpha software.

You want to copy the contents of the ~/important directory, including all its subdirectories, to /media/usb. What command can you type to accomplish this goal?

B To copy an entire directory tree, you must use a recursive copy parameter, such as --recursive, -R, or -r. (An archive copy, as in --archive or -a, will also work.) Of the options shown here, only B includes one of these parameters, so it is correct. Option A lacks any parameters to cp, so it won't work. Option C's -u option performs an update copy—it copies files only if the original file is newer than any file of the same name at the target location. Option D's -i performs an interactive copy, querying the user before overwriting existing files. Option E's -f option forces cp to overwrite existing files without prompting.

Which of the following is the most common type of interface for internal hard disks on desktop computers today?

C SATA The Serial Advanced Technology Attachment (SATA) interface is the dominant type of internal hard disk interface today, so option C is correct. The older Parallel ATA (PATA) interface was once common, but has long been surpassed in popularity by SATA, so option A is incorrect. The Small Computer Systems Interface (SCSI) interface once dominated on high-end installations and is still in use, but is not popular on desktop systems, so option B is incorrect. Enhanced Integrated Device Electronics (EIDE) is another name for PATA, so option D is incorrect. The Universal Serial Bus (USB) is a common interface for external devices, including hard disks and many other devices, but the question specifies an internal interface, so option E is incorrect.

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation?

D The Hierarchical File System (HFS) was used by Mac OS prior to Mac OS X. It doesn't support features required by Linux in its main filesystem, so option D is the correct answer. JFS, ext4fs, ReiserFS, and XFS are all Linux-native filesystems (either developed explicitly for Linux or converted from other Unix-like OSes), so options A, B, C, and E are all incorrect.

Which of the following is not a Linux command shell program?

D The login program handles text-mode logins, but it isn't a shell program, so option D is correct. The remaining options are all Linux shell programs, so options A, B, C, and E are all incorrect. (Option E, bash, is the default shell for most distributions.)

You type touch afile.txt in a directory that contains no files. What will be the effect?

D The touch command updates a file's time stamps or creates a new empty file if one doesn't already exist. Since the latter case is described by the question, a new file will be created, as described in option D. Since touch doesn't copy files, option A is incorrect. Option B would be correct if there were an explicit reference to your home directory in the file specification, but the command as stated works on a file in the current directory, so option B is incorrect. Because the command will create a new file, options C and E are both incorrect.

Which of the following commands provides a low-level way to install software on a Debian system?

E The dpkg program is the low-level interface to the Debian package system; you can use it to install, uninstall, and otherwise manage packages. Thus, option E is correct. Its equivalent on RPM-based systems is rpm, so option A is incorrect. Options B, C, and D are incorrect because they're all higher-level interfaces to RPM-based systems.

Where does the kernel store its ring buffer logs?

E The kernel ring buffer is held in memory, as option E specifies. Options A, B, C, and D all specify disk directories, which aren't memory locations, and so are all incorrect. (Some distributions place a copy of the ring buffer from late in the boot process in /var/log, but this is just a "snapshot" of the ring buffer at that moment in time, not whatever's current at a later time.)

Which of the following commands displays the name of the directory in which you're working?

E The pwd command does as the question specifies, so option E is correct. The wc command counts lines, words, and characters in a text file, so option A is incorrect. The cat command concatenates multiple files, or displays a file on the screen, so option B is incorrect. The echo command displays whatever text you give it, or the contents of a variable you give it, so option C is incorrect. The cd command changes the current working directory, but does not display its name, so option D is incorrect.

When should you use the root account?

E The root account is extremely powerful, and therefore extremely dangerous. Thus, you should use it only when you need that power to perform administrative tasks, as option E specifies. You'll get little or no extra speed from the root account, so using it as option A specifies will gain you nothing but expose your system to added risk, making option A incorrect. Even if you're the sole user of the computer, using root unnecessarily can be dangerous; and if you're the system administrator, you'll have to use the root account even on a multi-user system. Thus, option B is incorrect. Although root power is sometimes necessary for diagnostics, this isn't always the case, so option C is incorrect. Running untrusted programs is always risky, and running them as root is doubly risky, so option D is incorrect.

Question 24 : Which of the following commands copies the contents (including all its subdirectories) of the ~/dir directory to /media/usb?

B cp -R ~/dir /media/usb

Which of the following programs are Linux file managers?

B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.

Which of the following tools can you use to identify running processes? (Select all that apply.)

B, E The ps and top programs are text-mode commands to identify running programs, so options B and E are both correct. The df program summarizes disk usage, bg shifts a suspended program into background execution, and mem summarizes memory use, so options A, C, and D are all incorrect.

Which of the following open source business models use(s) the crowdfunding method?

Bounties

Question 22 : Which of the following information can you display using the ifconfig command?

Broadcast address MAC address IP address Subnet mask

Which of the following is not a way companies can legally make money using GPLed software?

By incorporating GPLed software into a proprietary program that the company sells

Where do most drivers exist on a Linux system?

C Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

What does the permission string -rwxrwx--- mean?

C Option C correctly summarizes the meaning of the specified permission string. The description in option A would be represented by -rwx------, which is not the string shown in the question. Option B would be correct if the string began with d, indicating a directory; but the leading - indicates a data file rather than a directory. Option D's description would require rwx in the last three characters of the permission string; but the --- indicates no world access. Option E combines the directory error of option B with the world-access error of option D, and so is incorrect.

Which regular expression string matches any sequence of characters of any length?

C The .* sequence matches any string of any length, so option C is correct. Option A matches a dot (.), which otherwise has a special meaning and so can't be used directly. Square brackets, as in option B, can surround a set of characters, any one of which will satisfy a match. A dot, as in option D, matches any single character. An asterisk (*), as in option E, specifies an arbitrary number of repeats of the previous match. (Hence, .* matches any number of characters, but neither character alone does the job.)

You type the following command and see the resulting output: $ ls -l test -rwxr-xr-x 2 rod users 111 Apr 13 13:48 test What is the meaning of the digit 2 immediately prior to the username (rod)?

C The number in the specified position represents the number of filenames that point to the file—in other words, the number of hard links to the file. Thus, option C is correct. Options A, B, D, and E all present fictitious descriptions of that field's meaning. (The file's size appears later on the line—it's 111 in this example.)

Where do most drivers exist on a Linux system?

C In the Linux kernel Drivers manage hardware, and as such, they're most commonly part of the Linux kernel, so option C is correct. Some drivers reside in libraries (option A) or in application programs (option D), but these locations are less common than the kernel, so options A and D are both incorrect. Firmware is software that's part of the hardware, and although firmware is important, it's distinct from drivers, so option B is incorrect. Configuration files can sometimes affect how drivers work, but they are not themselves drivers nor do they contain drivers, so option E is incorrect.

What option can you pass to groupadd to have it create a group with a GID number of 1027?

E You can use the --gid (or -g) option to groupadd to specify the GID number for a new group, so option E is correct. Options A, B, C, and D all present fictitious options to groupadd.

Which option to zip can you use to encode symbolic links as such rather than including the linked-to file?

E --symlinks option is fictitious, so option D is incorrect.--links option enables creation of a multi-file archive, so option C is incorrect. The -s to translate Unix-style end-of-line characters into DOS/Windows-style end-of-line characters, so option B is incorrect. The zip option causes -l option tells zip to include only the specified files, so option A is incorrect. The -i option does as the question specifies, so option E is correct. The --symlinksThe

Which of the following organizations bases its philosophy on software licensing on a strong moral imperative that users should be able to modify their software?

FSF

True or false: Another term for the GPL is the MIT license.

False

True or false: The Creative Commons is a software industry group opposed to the goals of the FSF.

False

True or false: The Linux kernel was developed as part of the GNU's Not Unix (GNU) project.

False

True or false: The /var/log/messages file always holds general-purpose log entries

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: You can delete any file on the computer by using rm as an ordinary user.

False Because of Linux's security features, you can only delete files in directories to which you have write access. As an ordinary user, you should not have write access to most of the system directories, so rm won't allow you to remove most system files.

True or false: Users should be logged in when you change their UID numbers with usermod.

False If a user is logged in when you change the user's UID number, problems can ensue because the login session will continue to use the old UID number. Thus, users should be logged out before you attempt to change their UID numbers.

True or false: Linux lacks support for USB printers, so you must use a parallel or Ethernet printer with Linux.

False Linux supports a wide variety of USB printers (although you should check on support for specific models before buying).

True or false: If you want to create a link to a directory, you must use a hard link.

False Most filesystems disallow hard links to directories, and mv won't let ordinary users create one even if the filesystem supports this feature. Soft (also known as symbolic) links, on the other hand, can point to directories, and ordinary users can create such links. Thus, the statement in the question is false; you must use a soft link, not a hard link, when linking to a directory.

True or false: All user accounts are necessarily defined in /etc/passwd and /etc/shadow.

False Some computers use network account databases, which supplement local account configuration files with those stored on a remote network server.

True or false: GUI account management tools provide more options than their text-mode counterparts.

False Text-mode account management tools invariably provide as many or more options than do GUI account management tools.

True or false: All Linux Web browsers are GUI programs.

False The Lynx Web browser is text-mode; you can run it in a terminal window or from a text-mode login.

True or false: The Secure Shell program is a command interpreter that keeps no history of its actions for others to discover, hence its name.

False The Secure Shell (SSH) is a remote-access protocol and associated client and server programs. It enables you to log into your computer remotely using encryption to enhance security compared to older unencrypted remote login tools.

True or false: The gzip program generally produces more compact compressed files than does the bzip2 program.

False The bzip2 program usually produces compression that's superior to gzip's. Both programs are surpassed by xz.

True or False: Linux stores information on its groups in the /etc/groups file.

False The file it stores groups in is the /etc/group file not /etc/groups.

True or false: You can configure your power supply by accessing the /dev/power device file.

False The power supply can't be directly controlled through Linux device files; it either delivers power in a steady manner or it doesn't, without software control.

True or false: The /etc/group file supports linking each user to a maximum of one group.

False The question's limitation applies to the default group specified in /etc/passwd. In /etc/group, each line can link one group to an arbitrary number of users.

True or false: Typing ls *.* at a Bash prompt is guaranteed to show you all the files in the current directory.

False The specified command shows you all the files whose names include a dot (.), but there's no guarantee that all the files in the directory will include a dot in their names.

True or false: The -n option to traceroute causes it to display hostnames rather than IP addresses.

False The statement has it backwards; -n causes traceroute to display IP addresses rather than its default of hostnames.

True or False: whoami provides more information than id.

False The whoami command only responds with the current session user's name, id will give more details including numeric user and group ID and all the groups the user belongs to.

True or false: User ID numbers are linked to usernames in a way that ensures the mapping is identical on all computers.

False User ID numbers are assigned to usernames in an arbitrary way, so a given username may have different user ID numbers on different computers.

To run a GUI program in Linux, you must launch it from a desktop environment's menus.

False You can launch GUI programs in several ways, including using a desktop environment's menus or typing the program's filename in a terminal program

True or false: The /var/log/messages file always holds general-purpose log entries.

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: WEP provides the highest available level of Wi-Fi security

False: WEP is in fact the worst of the three common levels of Wi-Fi security. WPA2 is the best, with WPA in-between.

True or false: The host program has been deprecated.

False: The host program is actively maintained; it's nslookup that has been deprecated.

Core Unix tools include which of the following? (Select all that apply.)

GNU tool set X windows System

Select a link using the arrow keys and then press the Enter key.

How can you browse to a new node using the standard info documentation reader?

Each correct answer represents a complete solution. Choose all that apply.

It can be changed using the umask command. & It determines the default permissions for new files.

Question 33 : Which tar qualifier causes it to use xz compression?

J

A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

Library

Linux runs on a wide variety of CPUs, including all of the options shown and many more. Thus, options A, B, C, and D are all correct, and option E is necessarily incorrect.

On which of the following CPU types does Linux run? (Select all that apply.)

(two words) software, such as Linux, gives the user greater control than proprietary software, such as Windows, does.

Open Source

Which software gives a user greater control than proprietary software?

Open source

Which of the following distributions use RPMs for package management? (Select all that apply.)

OpenSUSE CentOS

Which of the following information on user accounts is not stored in the /etc/passwd file, in modern Linux distributions?

Password

What is a network location from where YUM or APT installs software called?

Repository

cpuinfo

The /proc/______ pseudo-file holds data on your CPU, such as its model name and clock speed.

Locate

The ____ commands search is a database of phone names for the name or name or name that you specify.

FAT

The _____ filesystem is very old but is supported by almost every OS, making it a good choice for interoperability.

SANE

The _____ library provides drivers to control scanners. (Provide the acronym for the library's name.)

--one-file-system

The _________ option to tar causes it to back up only the specified low-level filesystem; if another filesystem is mounted within the directory you say to back up, those files will be ignored.

l

The character __ identifies a symbolic link in the 10-character symbolic permission string that's associated with a file.

L

The character ____ identify say symbolic wings in 10 - character symbolic permission stream that's associated with this file

Case sensitive

The files afile.txt and AFile.TXT can both exist on a Linux file system because these file systems are _____

case-sensitive

The files afile.txt and AFile.TXT can both exist on a Linux filesystem because these filesystems are ____________.

init

The first process to be run by the Linux kernel is normally called _______.

assembly

The programming language that provides a direct one-to-one correspondence between human-understandable words and machine-understandable numbers is ________ language.

A non-root Linux user is able to delete another non-root user's files in /tmp. Which of the following does this imply?

The sticky bit is missing from /tmp, it must be set. n general, the sticky bit is set on /tmp, which prevents other users (other than the file's owner) from deleting the files in the directory. The write permissions must be present on /tmp for users to be able to make changes to its contents. Since, a non-root user is able to delete another user's files, the /tmp partition is definitely not mounted as read-only.

globbing

The term ____ refers to the use of wild cards in file name specifications

Which of the following statements are true of server computers?

They may or may not require a GUI. They provide services to end-users.

Question 17 : Which of the following are true of the #!/bin/bash statement in a script file?

This line specifies the path of the program that's to interpret the script. & It identifies a script as a Bash script.

tail

To display the last few lines of a text file, you would type _____ afile.txt.

--color

To obtain a color-coded file listing, if your distribution doesn't produce one by default, you would type ls _____.

../

To refer to the file afile.txt in the directory one level above the current one, you would type ___afile.txt.

Whatis man

To search on man paige name sections for the key word man, you would type

True or false: As a general rule, open source license terms broaden your rights as a software consumer, compared to the rights granted by copyright law.

True

True or false: Because of Cocoa, GUI applications developed for OS X typically cannot be run directly on Linux.

True

True or false: It's possible for an end user to make good use of Linux without directly interacting with a text-mode shell.

True

True or false: The ls command displays the names of files in a directory.

True

True or false: The term copyleft is a slang term that refers to liberal licensing terms, such as those used by free software.

True

True or false: You can use grep to search for strings in binary files.

True Although grep is more commonly employed to search text files, it can search for strings in binary files.

True or false: By default, useradd copies a set of user configuration files from /etc/skel when creating a new user account.

True Default user configuration files give users a head start on configuring their accounts and enable system administrators to set user default options. They're copied from /etc/skel unless you specify another location with the --skel (-k) option to useradd.

True or false: Both RPM and Debian packages can specify that they require other packages. The package system will then refuse to install the package unless these dependencies are met or you provide an override option.

True Dependency information is critical for package management, and it works as the question specifies.

True or false: With most distributions, the contents of optical discs, USB flash drives, and other removable media appear in subdirectories of /media.

True Most distributions automatically mount removable media in their own subdirectories of /media. This practice is not universal, but it is very common, particularly when running desktop environments such as GNOME, KDE, or Xfce.

True or false: The lowest UID number used for user accounts on Linux systems varies from one installation to another.

True Most distributions today use a minimum UID number of 1000; however, some use 500, and administrators can change this value if they so desire.

True or false: You can modify graphics files from a text-mode login using Linux.

True The ImageMagick suite of graphics programs is text-based; you can use it to convert file formats, add frames to images, resize images, and so on, all from the command line.

True or false: KDE is built atop the Qt widget set.

True The K Desktop Environment (KDE) is built using the Qt GUI library (widget set), as the question specifies.

True or false: Pressing the M key in top causes the display to change to sort processes by memory use.

True The M key in top works as specified.

True or false: A carat (^) represents the start of a line in regular expressions.

True The carat (^) represents the start of a line, as the question specifies.

True or false: Symbolic links always have permissions of lrwxrwxrwx.

True The leading l identifies the file as a symbolic link. The remaining characters indicate that all users have full access to the link file, but the linked-to file's permissions are what control what users can actually do with the file.

True or false: You can use a recordable optical disc to transfer data from a Linux computer to a Windows computer.

True The most common optical disc formats (CD, DVD, and Blu-Ray) and filesystems (ISO-9660 and UDF) work equally well on both Linux and Windows. Thus, you can use an optical disc to transfer data from Linux to Windows, or vice-versa.

True or false: When operating on large files, the mv command works very quickly when the target directory is on the same low-level filesystem as the original file, but much more slowly when this isn't the case.

True The mv command moves or renames files, and it works by rewriting low-level filesystem data without touching the file's data when the target is on the same filesystem as the original. Thus, it can work quickly when this is the case. When moving a file across filesystems, though, mv must copy the data, which can take a while when the file is large.

True or false: The ps program enables you to view the process table.

True The ps program is one of the primary means of viewing the process table, which holds information on running processes.

True or False: As a general rule, you should employ extra care when running programs as root.

True The root account is very powerful and can be disastrous if something is done carelessly.

True or false: xinetd is a super server.

True The term super server refers to a server that listens for connection attempts on behalf of other servers and that launches those other servers only as needed. The two most common super servers on Linux are inetd and xinetd.

True or false: Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices.

True The two types of output are standard output and standard error.

True or false: Pressing the up arrow key in Bash reveals commands you've recently typed.

True The up arrow key enters previous commands from Bash's history in your command line, which can be helpful when typing a series of similar commands.

True or false: Partitioning a disk can enable you to install multiple OSes on one computer

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions

True or false: Partitioning a disk can enable you to install multiple OSes on one computer.

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions.

True

True or false. When operating a large file the env command works very quickly when the target directory is on the same low level file system as the original file, but much more slowly when this isn't the case

True The carat (^) represents the start of a line, as the question specifies.

True or false: A carat (^) represents the start of a line in regular expressions.

False The Lynx Web browser is text-mode; you can run it in a terminal window or from a text-mode login.

True or false: All Linux Web browsers are GUI programs.

True Dependency information is critical for package management, and it works as the question specifies.

True or false: Both RPM and Debian packages can specify that they require other packages. The package system will then refuse to install the package unless these dependencies are met or you provide an override option.

False Most filesystems disallow hard links to directories, and mv won't let ordinary users create one even if the filesystem supports this feature. Soft (also known as symbolic) links, on the other hand, can point to directories, and ordinary users can create such links. Thus, the statement in the question is false; you must use a soft link, not a hard link, when linking to a directory.

True or false: If you want to create a link to a directory, you must use a hard link.

True The K Desktop Environment (KDE) is built using the Qt GUI library (widget set), as the question specifies.

True or false: KDE is built atop the Qt widget set.

False Linux supports a wide variety of USB printers (although you should check on support for specific models before buying).

True or false: Linux lacks support for USB printers, so you must use a parallel or Ethernet printer with Linux.

True The two types of output are standard output and standard error.

True or false: Linux supports two types of text-mode output to the screen, which you can send to separate files or display devices.

True You can assign one OS to reside on one partition (or set of partitions) and another OS to reside on another. This is one of several purposes for disk partitions.

True or false: Partitioning a disk can enable you to install multiple OSes on one computer.

True The M key in top works as specified.

True or false: Pressing the M key in top causes the display to change to sort processes by memory use.

True

True or false: Pressing the up arrow key in Bash reveals commands you've recently typed.

False Although /var/log/messages is a common name for a general-purpose log file, not all distributions use this name; some use /var/log/syslog or some other file for this purpose.

True or false: The /var/log/messages file always holds general-purpose log entries.

False The bzip2 program usually produces compression that's superior to gzip's. Both programs are surpassed by xz.

True or false: The gzip program generally produces more compact compressed files than does the bzip2 program.

True The ps program is one of the primary means of viewing the process table, which holds information on running processes.

True or false: The ps program enables you to view the process table.

False You can launch GUI programs in several ways, including using a desktop environment's menus or typing the program's filename in a terminal program.

True or false: To run a GUI program in Linux, you must launch it from a desktop environment's menus.

False The specified command shows you all the files whose names include a dot (.), but there's no guarantee that all the files in the directory will include a dot in their names.

True or false: Typing ls *.* at a Bash prompt is guaranteed to show you all the files in the current directory.

True The mv command moves or renames files, and it works by rewriting low-level filesystem data without touching the file's data when the target is on the same filesystem as the original. Thus, it can work quickly when this is the case. When moving a file across filesystems, though, mv must copy the data, which can take a while when the file is large.

True or false: When operating on large files, the mv command works very quickly when the target directory is on the same low-level filesystem as the original file, but much more slowly when this isn't the case.

True Most distributions automatically mount removable media in their own subdirectories of /media. This practice is not universal, but it is very common, particularly when running desktop environments such as GNOME, KDE, or Xfce.

True or false: With most distributions, the contents of optical discs, USB flash drives, and other removable media appear in subdirectories of /media.

False Because of Linux's security features, you can only delete files in directories to which you have write access. As an ordinary user, you should not have write access to most of the system directories, so rm won't allow you to remove most system files.

True or false: You can delete any file on the computer by using rm as an ordinary user.

True The ImageMagick suite of graphics programs is text-based; you can use it to convert file formats, add frames to images, resize images, and so on, all from the command line.

True or false: You can modify graphics files from a text-mode login using Linux.

True Although grep is more commonly employed to search text files, it can search for strings in binary files.

True or false: You can use grep to search for strings in binary files.

False

True or false: every man paige must have a section called bugs that report known bugs

False

True or false: if you want to create a link to a directory, you must use a hard link.

False

True or false: info paige have largely replaced me and paige on the most common form of documentation for Linux programs

False

True or false: typing LS *.* at a bash prompt is guaranteed to show you all the files in the current directory

True The term super server refers to a server that listens for connection attempts on behalf of other servers and that launches those other servers only as needed. The two most common super servers on Linux are inetd and xinetd.

True or false: xinetd is a super server.

False

True or false: you can delete any file on the computer by using RM as an ordinary user

False

True or false: you can usually find program documentation in the directory called doc/ packagename name, where package packagename is the name of the package

Where did the Linux kernel originate?

University of Helsinki

Which of the following can be displayed using the id command?

Username UID Group memberships

Remote logins permit you to perform any of the activities specified

What can you do locally that you can't do from a remote login via SSH, provided both computers are configured to permit the actions?

An ampersand (&), placed after a command typed in Bash, causes the command to run in the background,

What symbol do you place after a command to run the program in the background?

System adminstration commands

What type of information is documents section 8 of the man page system?

Drivers manage hardware, and as such, they're most commonly part of the Linux kernel,

Where do most drivers exist on a Linux system?

Men - K keyword

Which is the following commands is equivalent to typing apropos keyword?

The dpkg program is the low-level interface to the Debian package system; you can use it to install, uninstall, and otherwise manage packages.

Which of the following commands provides a low-level way to install software on a Debian system?

The Hierarchical File System (HFS) was used by Mac OS prior to Mac OS X. It doesn't support features required by Linux in its main filesystem,

Which of the following is an inappropriate choice for a filesystem to hold the majority of a Linux installation?

The login program handles text-mode logins, but it isn't a shell program,

Which of the following is not a Linux command shell program?

The Serial Advanced Technology Attachment (SATA) interface is the dominant type of internal hard disk interface today

Which of the following is the most common type of interface for internal hard disks on desktop computers today?

Of these languages, only C++ is commonly implemented as a compiled language

Which of the following programming languages is most often implemented as a compiled language?

Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME.

Which of the following programs are Linux file managers? (Select all that apply.)

The free command produces the information specified,

Which of the following programs produces a summary of the memory status of your computer, including the total memory available, the amount used, and the amount that's unused?

The >> operator appends standard output to a file,

Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?

The ps and top programs are text-mode commands to identify running programs,

Which of the following tools can you use to identify running processes? (Select all that apply.)

LibreOffice is derived from OpenOffice.org, so options A and E are correct. GNOME Office and KOffice are independently-created office suites for Linux, while Microsoft Office is a commercial office suite for Windows and Mac OS X.

Which of the following two office suites are most closely related to one another? (Select two.)

The -i option does as the question specifies, so option E is correct. The --symlinksThe

Which option to zip can you use to encode symbolic links as such rather than including the linked-to file?

The -uid option to find locates files owned by a user with the specified user ID (UID) number, and the -user option locates files based on the user's username.

Which options to find can you use to locate files owned by a particular user? (Select all that apply.)

The .* sequence matches any string of any length,

Which regular expression string matches any sequence of characters of any length?

?

You can press the ____ key to search backward when viewing a document with less.

-configure

You can type Xorg ________, as root, to have X create a default configuration file that you can then modify.

The touch command updates a file's time stamps or creates a new empty file if one doesn't already exist. Since the latter case is described by the question, a new file will be created

You type touch afile.txt in a directory that contains no files. What will be the effect?

A new empty file called afile.txt will be created in the current directory

You type touch afile.txt in a directory that contains no files. what will be the effect?

| (pipe)

You use the ___ character to separate two strings, either of which should match, in an extended regular expression.

- I & - interactive

You want to copy a set of files but be prompted before CP overrides any existing files. You would use the ________ option to CP to accomplish this goal.

--interactive or -i

You want to copy a set of files but be prompted before cp overwrites any existing files. You would use the ___ option to cp to accomplish this goal.

cp -R ~/important/media/USB

You want to copy the contents of the ~/important directory including all its subdirectories to /media/usb. What cammand can you type to accomplish this goal?

mkdir -p ~/Documents/paper

You want to create a directory called documents / papers but you're not sure that the Documents directory exists. what command can you type to create the desired directory and its parent directory if it doesn't already exist?

The -p option to mkdir creates parent directories if they don't already exist,

You want to create a directory called ~/Documents/papers, but you're not sure that the ~/Documents directory exists. What command can you type to create the desired directory and its parent directory if it doesn't already exist?

Only a symbolic link

You want to create a link from your home directory on your hard disk to a directory on a CD ROM Drive. which of the following types of links might you use?

Symbolic links can point across filesystems, so creating a symbolic link from one filesystem (in which your home directory resides) to another (on the CD-ROM) isn't a problem,

You want to create a link from your home directory on your hard disk to a directory on a CD-ROM drive. Which of the following types of links might you use?

Which of the following programs are Linux file managers? (Select all that apply.)

b. Thunar d. Konqueror e. Nautilus Response Feedback: Answer: B, D, E Thunar is a file manager associated with Xfce, Konqueror is a file manager and Web browser associated with KDE, and Nautilus is a file manager associated with GNOME. Thus, options B, D, and E are all correct. Thunderbird is an e-mail client, and Apache is a Web server program, so options A and C are both incorrect.

A crowd-funding open source business model, called _______, is where users offer money as a reward for new software or new features in existing software.

bounties

Which of the following commands can be used to change the ownership of a file?

chown

A ______ or workstation computer is typically used by one or a small number of people to perform everyday productivity tasks, such as computing values with a spreadsheet or browsing the Web.

desktop

Programs that can look up DNS information include host, nslookup, and _____.

dig

Specialized computing devices, such as DVRs, cell phones, and network appliances, use _________ OSs

embedded

Your network's hardware interface is called eth0. You want to bring up this interface via DHCP, so you type dhclient _____ as root.

eth0

: No important new Linux distributions have been created since 1993.

false

True or false: Open source software is by definition available free of charge.

false

The FSF uses the term (two words) to refer to software that's licensed under terms that satisfy its philosophy concerning software licensing.

free software

Which of the following commands can be used to delete a group from a Linux system?

groupdel

Question 10 : Which of the following commands is used to view a list of most recent commands executed by a user?

history

Which of the following terms best characterizes the Linux kernel?

open source

You want to test connectivity to tranquility.luna.edu by sending 11 packets to see how many return. To do this, you can type __________ tranquility.luna.edu.

ping -c 11

Question 40 : Which command can be used to send four packets to test network connectivity to pete.ucertify.com?

ping -c 4 pete.ucertify.com

Question 29 : Which of the following commands can be used to list running processes? Each correct answer represents a complete solution. Choose all that apply.

ps top

Question 44 : Which of the following commands displays the name of a directory in which a user is working?

pwd

A _______ computer runs network-accessible software that responds to incoming requests from other computers.

server

A (two words) grants an organization the right to install software on more than one computer.

site license

You can type ______ to acquire root privileges that persist across multiple commands.

su

To display the last few lines of a text file, you would type _____ afile.txt.

tail

Slackware is unusual because it uses ________ as its package file format.

tarballs

True or false: A laptop computer running Linux and a server computer running Linux are likely to share some common programs.

true

True or false: Early in Linux's history, it grew in large part because of the availability of the GNU project.

true

Default permissions are determined by the _____.

umask

Question 21 : Which of the following commands can be used to specify default permission mode for new files?

umask

An OS developed in 1969, and on which Linux is largely modeled, is

unix

Which of the following commands displays a count of lines, words, and bytes for a file?

wc

Which of the following commands creates a zip file named trip.zip and compresses it as much as possible?

zip -9 trip.zip holiday.tif desc.txt

Which of the following symbols is used to separate two possible matches in a regular expression?

|

Which of the following are risks you take when you browse the Web as an ordinary user on a properly-configured Linux system? (Select all that apply.)

a. Data transferred to or from a Web site can be intercepted, possibly exposing sensitive data to theft. b. A Web site with malicious dynamic content could steal your personal data files. A, B Most Web sites are unencrypted, so data transferred from the site and your computer, or vice-versa, can be intercepted, as option A suggests. (Most sites that transfer sensitive data employ encryption, but this isn't universally true.) Some Web sites deliver mini-programs that run on your computer, and if such a site delivers a malicious program, it could do just about anything, including steal your personal data files, as option B suggests. If you run the Web browser as an ordinary user, though, such a malicious program could not create a new account, so option C is incorrect. Likewise, your Linux login password is safe, so option D is incorrect. A Windows virus won't run on Linux at all, much less harm your hardware, so option E is incorrect.

Which options to find can you use to locate files owned by a particular user? (Select all that apply.)

a. -uid d. -user The -uid option to find locates files owned by a user with the specified user ID (UID) number, and the -user option locates files based on the user's username. Thus, options A and D are both correct. The -name option locates files with a specified filename, so option B is incorrect. The -id and -u options are both fictitious, so options C and E are incorrect.

What will be the output of the echo command? for alpha in a b c; do echo -n $alpha; done

abc


Kaugnay na mga set ng pag-aaral

21: Warranties and Product Liabilitiy

View Set

Entrepreneurial Small Business 5th Edition; Chapter 12

View Set

Chapter 5, Planning; Principles of Management

View Set

P&C Chapter 7 Commercial Package Policy

View Set

Chapter 57: Management of Patients with Burn Injury

View Set