|
The advantage of binary files over text files is that
_____________________________________________________________________________________
|
UNIX was developed by
_____________________________________________________________________________________
|
Mounting a file system results in the loading of
_____________________________________________________________________________________
|
Profilers are
_____________________________________________________________________________________
|
Which command is used to extract specific columns from the file?
_____________________________________________________________________________________
|
Which of the following system calls,does not return control to the calling point, on termination?
_____________________________________________________________________________________
|
The Unix command used to find out the number of characters in a file is
_____________________________________________________________________________________
|
Which command is used to display the characteristics of a process?
_____________________________________________________________________________________
|
The command that can be used to restrict incoming messages to a user is
_____________________________________________________________________________________
|
Which command is used to remove a file
_____________________________________________________________________________________
|
When a process makes a system call ,its mode changes from
_____________________________________________________________________________________
|
Which of the following file names can be found in more than one directory?
_____________________________________________________________________________________
|
Which of the following are not system calls?
_____________________________________________________________________________________
|
Which of the following files contains information related to password aging?
_____________________________________________________________________________________
|
Environment variables can be accessed by
_____________________________________________________________________________________
|
Which of the following system calls transforms an executable binary file into a process?
_____________________________________________________________________________________
|
Which command allows you to view your file 24 lines at a time ?
_____________________________________________________________________________________
|
Which of the following keys is used to replace a single character with new text?
_____________________________________________________________________________________
|
Which command will be used with vi editor to append text at end of line?
_____________________________________________________________________________________
|
An attempt to read from locked file,results in
_____________________________________________________________________________________
|
The tail command in UNIX
_____________________________________________________________________________________
|
Which command is used to display the device name of the terminal you are using?
_____________________________________________________________________________________
|
Which of the following shell scripts looping features does not recognize the break command?
_____________________________________________________________________________________
|
Kernel is not involved
_____________________________________________________________________________________
|
The file that stores an integer as a sequence of characters is a
_____________________________________________________________________________________
|
Which of the following command the file names in multiple columns?
_____________________________________________________________________________________
|
Which of the following is not a communication command?
_____________________________________________________________________________________
|
The sort command in UNIX
_____________________________________________________________________________________
|
Which of the following changes permission to deny write permission to group and others?
_____________________________________________________________________________________
|
Which command is used to create a directory?
_____________________________________________________________________________________
|
Which one of the following options is not a shell in UNIX system?
_____________________________________________________________________________________
|
Which of the following tools can be used to keep track of evolving version of a file?
_____________________________________________________________________________________
|
Which of the following commands is used to count the total number of lines,words and characters contained in a file?
_____________________________________________________________________________________
|
Which of the following statement best explains a process?
_____________________________________________________________________________________
|
Files that can store data in the same format as used in program are called
_____________________________________________________________________________________
|
Which of the following sections of an executable binary file has all uninitialized data items?
_____________________________________________________________________________________
|
Shell functions
_____________________________________________________________________________________
|
Command_________compares two files byte by byte and displays the first mismatch.
_____________________________________________________________________________________
|
Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?
_____________________________________________________________________________________
|
Which of the following commands is used for an automatic remainder service?
_____________________________________________________________________________________
|
In which section of a process,the information about the arguments to the program are available?
_____________________________________________________________________________________
|
If cat x ,prints garbage ,then x is probably a
_____________________________________________________________________________________
|
Which of the following calls never returns an error?
_____________________________________________________________________________________
|
The tar command in UNIX
_____________________________________________________________________________________
|
Which command is used to display a file contents in octal form?
_____________________________________________________________________________________
|
To allow only one user to work with a particular file at a particular time ,one has to
_____________________________________________________________________________________
|
Which command is used with vi editor to delete a single character?
_____________________________________________________________________________________
|
The cat command is used to
_____________________________________________________________________________________
|
Which command is used with vi editor to move the cursor to the left?
_____________________________________________________________________________________
|
Which of the following is not a filter?
_____________________________________________________________________________________
|