MCQOPTIONS
Saved Bookmarks
This section includes 358 Mcqs, each offering curated multiple-choice questions to sharpen your Unix knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
Multiple Unix commands can be put into a file to form a program. This is called a |
| A. | Pipe |
| B. | Script |
| C. | Link |
| D. | Shell |
| Answer» C. Link | |
| 52. |
The name of the Superuser is |
| A. | Master |
| B. | Supreme |
| C. | Root |
| D. | President |
| Answer» D. President | |
| 53. |
Which of the following is not one of the 3 general components of the Unix operating system? |
| A. | the kernel |
| B. | the shell |
| C. | the GUI |
| D. | the file system |
| Answer» D. the file system | |
| 54. |
To invoke "bash" you type |
| A. | bsh |
| B. | sh |
| C. | bash |
| D. | Either A or C |
| Answer» D. Either A or C | |
| 55. |
Ethernet |
| A. | Is slower than a dial-up modem |
| B. | Carries data at a maximum rate of 56 Kilobits of data per second. |
| C. | Is rarely used today |
| D. | Can exceed speeds of 10 Megabits of data per second |
| Answer» E. | |
| 56. |
The redirection symbol for output is |
| A. | > |
| B. | < |
| C. | ^ |
| D. | | |
| Answer» B. < | |
| 57. |
A network works by transmitting bits of information between machines called |
| A. | bytes |
| B. | blocks |
| C. | packets |
| D. | placards |
| Answer» D. placards | |
| 58. |
The Superuser can |
| A. | Create accounts |
| B. | Delete accounts |
| C. | Read and write files in user accounts |
| D. | All the above |
| Answer» E. | |
| 59. |
Which of the following is not true of the SSH tools? |
| A. | Use encrypted connections |
| B. | Only need to be running on the remote machine |
| C. | Use a key to scramble data |
| D. | Increasing in popularity |
| Answer» C. Use a key to scramble data | |
| 60. |
It is good to learn the "mail" command because |
| A. | It is a powerful email program |
| B. | It is available on most Unix machines |
| C. | It is very popular |
| D. | Both a and b |
| Answer» C. It is very popular | |
| 61. |
When backspace doesn’t work to erase characters, we can use _____ |
| A. | ctrl-f |
| B. | ctrl-h |
| C. | ctrl-c |
| D. | ctrl-u |
| Answer» C. ctrl-c | |
| 62. |
Pick the incorrect statement. |
| A. | Shell is a command interpreter |
| B. | Shell is the interface between user and kernel |
| C. | System can't work without a shell |
| D. | Shell is a program |
| Answer» D. Shell is a program | |
| 63. |
Which one is not a characteristic of pipes |
| A. | connect commands |
| B. | multiple pipes can be used on a command line |
| C. | can not be used with redirection |
| D. | can save you keystrokes |
| Answer» D. can save you keystrokes | |
| 64. |
Which is not an example of networking hardware? |
| A. | Hubs |
| B. | Routers |
| C. | Modems |
| D. | Remote machine |
| Answer» E. | |
| 65. |
To use a Unix system with a GUI you need this type of window to enter Unix commands |
| A. | Terminal |
| B. | Dialog box |
| C. | Dos |
| D. | Command |
| Answer» B. Dialog box | |
| 66. |
Which of the following is not a network topology? |
| A. | Diamond |
| B. | Star |
| C. | Ring |
| D. | Hub |
| Answer» B. Star | |
| 67. |
Ctrl-S stops scrolling of screen output and ________. |
| A. | locks terminal |
| B. | delete a character |
| C. | locks keyboard |
| D. | delete a line |
| Answer» D. delete a line | |
| 68. |
Netscape is |
| A. | Not very popular on Unix |
| B. | Not very compatible with the Windows version. |
| C. | A graphical Unix browser |
| D. | None of the above |
| Answer» D. None of the above | |
| 69. |
Mozilla is |
| A. | Some kind of virus |
| B. | A monster inside the computer |
| C. | A Unix browser |
| D. | An email program |
| Answer» D. An email program | |
| 70. |
Domain Name Servers are required to translate alphabetical machine names into |
| A. | Packets |
| B. | Routers |
| C. | IP numbers |
| D. | Hubs |
| Answer» D. Hubs | |
| 71. |
Who needs to possess the superuser account? |
| A. | Ordinary users |
| B. | System administrator |
| C. | Department manager |
| D. | President of the company |
| Answer» C. Department manager | |
| 72. |
Options are also arguments but begin with a – . |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 73. |
mailx command is used for sending and receiving emails. |
| A. | True |
| B. | False |
| C. | May be |
| D. | Can't say |
| Answer» B. False | |
| 74. |
___ command performs copying of diskettes. |
| A. | pp |
| B. | df |
| C. | du |
| D. | dd |
| Answer» E. | |
| 75. |
The set of routines needed to operate a specific device is known as _____ |
| A. | device file |
| B. | device program |
| C. | device driver |
| D. | device software |
| Answer» D. device software | |
| 76. |
Which one of the following command will shutdown and reboot the system? |
| A. | shutdown -g2 |
| B. | shutdown -g2 i6 |
| C. | shutdown -g2 -g0 |
| D. | shutdown -y -g0 -i6 |
| Answer» E. | |
| 77. |
Which option is used with shutdown command to override the default waiting time? |
| A. | -g |
| B. | -e |
| C. | -s |
| D. | -i |
| Answer» B. -e | |
| 78. |
All the user information is stored in __ |
| A. | etc/passwd |
| B. | bin/passwd |
| C. | bin/users/passwd |
| D. | etc/shadow |
| Answer» B. bin/passwd | |
| 79. |
Which of the following commands are used for maintenance of user accounts? |
| A. | useradd |
| B. | usermod |
| C. | userdel |
| D. | useradd, usermod, userdel |
| Answer» E. | |
| 80. |
The SUID for any file can be set by the administrator using ___ |
| A. | chmod |
| B. | chmod u+s filename |
| C. | chmod s filename |
| D. | chmod us filename |
| Answer» C. chmod s filename | |
| 81. |
____ command is used by the superuser for changing root’s password. |
| A. | pd |
| B. | password |
| C. | pswd |
| D. | pwd |
| Answer» D. pwd | |
| 82. |
Which command is used by the system administrator to set the date of the system? |
| A. | dt |
| B. | su |
| C. | date |
| D. | chdt |
| Answer» D. chdt | |
| 83. |
____ command allows superuser to communicate with users. |
| A. | comm |
| B. | cron |
| C. | date |
| D. | wall |
| Answer» E. | |
| 84. |
User’s environment mode created using su – is terminated using __ |
| A. | ctrl-v |
| B. | ctrl-q |
| C. | ctrl-d |
| D. | ctrl-f |
| Answer» D. ctrl-f | |
| 85. |
Which of the following is used for creating user’s environment? |
| A. | su |
| B. | su – |
| C. | -su |
| D. | su – – |
| Answer» C. -su | |
| 86. |
When we log in as root user we are placed in __ |
| A. | /bin |
| B. | /root |
| C. | /system |
| D. | /admin |
| Answer» C. /system | |
| 87. |
The system administrator is also known as ____ |
| A. | master user |
| B. | superuser |
| C. | root user |
| D. | master and super user |
| Answer» E. | |
| 88. |
____ option is used with test for checking if the file exists and has the size greater than zero. |
| A. | -f |
| B. | -r |
| C. | -e |
| D. | -s |
| Answer» E. | |
| 89. |
test statement cannot ______ |
| A. | compare two numbers |
| B. | compare two strings |
| C. | compare two files |
| D. | check a file’s attributes |
| Answer» D. check a file’s attributes | |
| 90. |
Where is the exit status of a command stored? |
| A. | $0 |
| B. | $> |
| C. | $1 |
| D. | $? |
| Answer» E. | |
| 91. |
A shell script stopped running when we change its name. Why? |
| A. | location of the file changed |
| B. | we can’t change the name of the script |
| C. | $0 was used in the script |
| D. | many possible reasons |
| Answer» D. many possible reasons | |
| 92. |
Suppose x =10, then what will be the value of x$x$? |
| A. | undefined |
| B. | erroneous |
| C. | 100 |
| D. | x10$ |
| Answer» E. | |
| 93. |
Which of the following option is used with set for debugging shell scripts? |
| A. | -a |
| B. | -x |
| C. | -d |
| D. | -e |
| Answer» C. -d | |
| 94. |
Which of the following command doesn’t accept a filename as an argument? |
| A. | cut |
| B. | ls |
| C. | paste |
| D. | mailx |
| Answer» E. | |
| 95. |
The ____ allows us to read data from the same file containing the script. |
| A. | >> |
| B. | << |
| C. | !! |
| D. | — |
| Answer» C. !! | |
| 96. |
Which symbol is used with the set command for command substitution? |
| A. | – |
| B. | — |
| C. | ?? |
| D. | _ |
| Answer» C. ?? | |
| 97. |
Which one of the following is an internal command? |
| A. | cut |
| B. | expr |
| C. | set |
| D. | Is |
| Answer» D. Is | |
| 98. |
____ statement is used for shifting arguments left. |
| A. | set |
| B. | shift |
| C. | cut |
| D. | paste |
| Answer» C. cut | |
| 99. |
expr is an _____ command |
| A. | internal |
| B. | external |
| C. | shell |
| D. | derived |
| Answer» B. external | |
| 100. |
Which of the following is performed by expr string handling’s function? |
| A. | determine the length of string |
| B. | extract a substring |
| C. | locate the position of a character in a string |
| D. | determine the length of string, extract and locate the position of the string |
| Answer» E. | |