Almost all MCQs of Computer

UNIX/LINUX Solved MCQs-Part 2



Which of the following statements is not true for UNIX Operating System ?

Major strength of UNIX Operating System is its open standards which enabled large number of organizations ranging from academicia to industries to participate in its development.
UNIX kernel uses modules with well specified interfaces and provides advantages like simplified testing and maintenance of kernel. It has better extensibility as the kernel is not monolithic.
UNIX is kernel based operating system with two main components viz. process management subsystem and file management subsystem.
All devices are represented as files which simplify the management of I/O devices and files. The directories structure used is directed acyclic graph.
      _____________________________________________________________________________________
When the read system call encounters EOF ,it returns 

Some positive integer
Some negative integer
0
-1
      _____________________________________________________________________________________
The exception to the fact that any process in UNIX ,has a parent is 

Dev
Sh
Kernel
Login
      _____________________________________________________________________________________
Which of the following files contains information related to password aging? 

Shadow
Profile
Password
All of these
      _____________________________________________________________________________________
Which command is used to remove a directory?

rd
rmdir
dldir
rdir
      _____________________________________________________________________________________
Which command will be used with vi editor to append text at end of line? 

A
i
a
I
      _____________________________________________________________________________________
The advantage of binary files over text files is that 

It is compact
It can be accessed faster
Many commands assume the named file to be a binary file
They are more reliable
      _____________________________________________________________________________________
Lint should be used 

Before compilation
After compilation
To analyze a C code
None of the above
      _____________________________________________________________________________________
The tail command in UNIX 

Can be used to look at the tail or bottom of the file
Can be used to display the list of last 10 files in the current directory
Can be used to display the list of last 15 in the current directory
None of the above
      _____________________________________________________________________________________
Which of the following keys is used to replace a single character with new text?

S
s
r
C
      _____________________________________________________________________________________
Which of the following system calls,does not return control to the calling point, on termination? 

Fork
Exec
Ioct1
Longjmp
      _____________________________________________________________________________________
The cc command makes a total of 

1 pass
2 pass
4 pass
5 pass
      _____________________________________________________________________________________
Which of the following tools can be used to keep track of evolving version of a file? 

Make
Yacc
SCCS
dv
      _____________________________________________________________________________________
Kernel is not involved 

When a read operation is done
When a pressed key is echoed on to the screen
In resource allocation
None of the above
      _____________________________________________________________________________________
Which of the following changes permission to deny write permission to group and others?

Chmod go-w filex
Chmod go w filex
Chmod go=w file
None of the above
      _____________________________________________________________________________________
In which section of a process,the information about the arguments to the program are available? 

Data
Text
Stack
User block
      _____________________________________________________________________________________
If cat x ,prints garbage ,then x is probably a 

Data file
Binary file
Text file
Source file
      _____________________________________________________________________________________
Which command is used to sort the lines of data in a file in reverse order

sort
sh
st
sort -r
      _____________________________________________________________________________________

Assume that an implementation of Unix operating system uses i-nodes to keep track of data blocks allocated to a file. It supports 12 direct block addresses, one indirect block address and one double indirect block address. The file system has 256 bytes block size and 2 bytes for disk block address. The maximum possible size of a file in this system is

16 MB
16 KB
70 KB
71 KB
      _____________________________________________________________________________________
Which command is used to create a directory? 

CRDIR
MKDIR
MD
CR
      _____________________________________________________________________________________
 The Unix command used to find out the number of characters in a file is

nc
wc
chcnt
c
      _____________________________________________________________________________________
Which command is used to remove a file 

Rename
MV
RM
Del
      _____________________________________________________________________________________
Which command allows you to view your file 24 lines at a time ?

More
Cat
Pg
None of the above
      _____________________________________________________________________________________
Which of the following are character special files? 

Terminal
Printer
Modem
Tape drive
      _____________________________________________________________________________________
Which of the following are not system calls? 

Chmod
Open
Lseek
Getc
      _____________________________________________________________________________________
Which of the following sections of an executable binary file has all uninitialized data items? 

BSS
Data
Header
Symbol
      _____________________________________________________________________________________
Which command will be used with vi editor to move back to the beginning of a word? 

b
e
a
w
      _____________________________________________________________________________________
Which command is used to display the top of the file? 

Cat
More
Head
Grep
      _____________________________________________________________________________________
Which of the following calls never returns an error? 

Getpid
Fork
Ioct1
Open
      _____________________________________________________________________________________
In a system ,if 5 people are currently using vi editor ,then the number of corresponding processes will be

1
5
3
0
      _____________________________________________________________________________________
The command that can be used to restrict incoming messages to a user is 

Mesg
Halt
Grep
Sleep
      _____________________________________________________________________________________
Which command is used to extract specific columns from the file?

cut
grep
Past
cat
      _____________________________________________________________________________________
The sort command in UNIX 

Used to sort a file
Used to sort the list of files in a directory
Both A and B
None of the above
      _____________________________________________________________________________________
Which of the following commands is used to count the total number of lines,words and characters contained in a file? 

count p
wcount
wc
count w
      _____________________________________________________________________________________
Which is the earliest and most widely used shell that came with the UNIX system? 

C Shell
Korn Shell
Bourne Shell
Smith Shell
      _____________________________________________________________________________________
An attempt to read from locked file,results in 

Prematured termination
A deadlock
An indefinite wait
None of the above
      _____________________________________________________________________________________
Files that can store data in the same format as used in program are called 

Binary files
Source file
Text file
Core
      _____________________________________________________________________________________
Which set option is used with vi editor to display line numbers on screen? 

nm
nu
ic
li
      _____________________________________________________________________________________
To allow only one user to work with a particular file at a particular time ,one has to 

Semaphore
Critical region
Locking
Dedicated mode
      _____________________________________________________________________________________
Which of the following is not a communication command? 

write
mail
mesg
grep
      _____________________________________________________________________________________
Which command is used to display the characteristics of a process? 

pid
ps
du
au
      _____________________________________________________________________________________
Which of the following commands is used to rename a file? 

Rename
MV
Remove
Ren
      _____________________________________________________________________________________
Which of the following file names can be found in more than one directory? 

Passwd
Bin
Date
None of the above
      _____________________________________________________________________________________
Command_________compares two files byte by byte and displays the first mismatch. 

cmp
comp
cmap
None of these
      _____________________________________________________________________________________
Mounting a file system results in the loading of 

Boot block
Super block
i-node table
All of these
      _____________________________________________________________________________________
Which command is used to display and create files? 

cat
ed
vi
lyrix
      _____________________________________________________________________________________
UNIX was developed by 

Bell labs
Berkley software
California university
American defence academy
      _____________________________________________________________________________________
Which command is used with vi editor to move the cursor to the left? 

i
k
j
h
      _____________________________________________________________________________________
Environment variables can be accessed by 

System programs
C programs
Shell scripts
None of the above
      _____________________________________________________________________________________
The cat command is used to 

Print a file
Display a file
Capture a file
Copy a file
[facebook]

MKRdezign

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget