Explore topic-wise MCQs in Computer Science Engineering (CSE).

This section includes 713 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Science Engineering (CSE) knowledge and support exam preparation. Choose a topic below to get started.

251.

Which of the following shell scripts looping features does not recognize the break command?

A. while
B. until
C. for
D. none of the above
Answer» E.
252.

Hardware configuration while booting includes

A. check what hardware present
B. locate and initialize each device as specified
C. probe the bus for devices and ask the appropriate drivers for information
D. all of these
Answer» E.
253.

Steps in boot process

A. loading and initialzation of kernel
B. device detection and configuration
C. creation of processess and execution of system starup scripts
D. all of these
Answer» E.
254.

Each start-up script can usually accept at least two command line arguments:

A. start and stop
B. start and pause
C. start and resume
D. none
Answer» B. start and pause
255.

All start-up scripts are typically kept in a directory named which usually lives somewhere under “/etc”

A. init.d
B. init.c
C. intit.e
D. none
Answer» B. init.c
256.

Styles of system start-up scripts…

A. the system v style
B. the bsd style
C. both a and b
D. none
Answer» D. none
257.

The system start-up scripts are executed by                     when the system starts up and it is these scripts which are responsible for completing the bootstrap process of the UNIX system.

A. init
B. kernel
C. root
D. none
Answer» B. kernel
258.

The actual program which the Linux kernel executes as the init process can be specified via the command line parameter.

A. "kernel"
B. "init"
C. "root"
D. none
Answer» C. "root"
259.

init’s job after basic system initialization is

A. is to take over the system start-up procedure
B. complete the system bootstrap process
C. both a and b
D. none
Answer» D. none
260.

The first program the kernel attempts to execute after basic system initialization is complete is called

A. fork
B. init
C. kill
D. none
Answer» C. kill
261.

All those cryptic messages you see fly by when the Linux kernel first starts up are messages from the initializing and configuring your hardware.

A. compiled-in-ram
B. compiled-in-root
C. compiled-in kernel drivers
D. none
Answer» D. none
262.

After the kernel is brought in from disk into main memory, it begins execution and one of the first things it does is …………

A. initialize the system\s kernel
B. initialize the system’s hardware.
C. initialize the system\s ram
D. none
Answer» C. initialize the system\s ram
263.

The kernel itself is a program that usually lives in the root partition of the UNIX filesystem. Most Linux distributions call it           and it often a symbolic link to the real kernel file which lives in “/boot”.

A. /vmlinuz
B. /kernel
C. /root
D. none
Answer» B. /kernel
264.

Other boot loaders which can be used to load Linux exist:

A. grub
B. loadlin
C. both a and b
D. none
Answer» D. none
265.

LILO’s configuration file is

A. /etc/lilo.conf
B. lilo.config
C. etc/lilo.config
D. none
Answer» B. lilo.config
266.

What is LILO ?

A. list in list out
B. last in last out
C. linux loader
D. none
Answer» D. none
267.

LILO can be installed to either ……..of Linux root partition.

A. mbr
B. to the boot record
C. both a and b
D. none
Answer» D. none
268.

A popular boot loader used by most Linux distributions to boot Linux is called

A. fifo
B. lilo
C. lifo
D. none
Answer» C. lifo
269.

LILO can also be used to boot other operating systems as well such as ……..

A. ms-dos
B. windows 98
C. windows nt
D. all of these
Answer» E.
270.

To allow only one user to work with a particular file at a particular time ,one has to

A. semaphore
B. critical region
C. locking
D. dedicated mode
Answer» D. dedicated mode
271.

When a process makes a system call ,its mode changes from

A. user to kernel
B. kernel to user
C. restricted to unrestricted
D. unrestricted to restricted
Answer» B. kernel to user
272.

Which command will be used with vi editor to move back to the beginning of a word

A. b
B. e
C. a
D. w
Answer» B. e
273.

Which of the following calls never returns an error?

A. getpid
B. ioct1
C. fork
D. open
Answer» B. ioct1
274.

Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?

A. can be used to look at the tail or bottom of the file
B. chmod u x emp[l-3]
C. chmod u r ??? emp
D. chmod 222 emp?
Answer» C. chmod u r ??? emp
275.

The tail command in UNIX

A. can be used to look at the tail or bottom of the file
B. can be used to display the list of last 10 files in the current directory
C. can be used to display the list of last 15 in the current directory
D. none of the above
Answer» B. can be used to display the list of last 10 files in the current directory
276.

The sort command in UNIX

A. used to sort a file
B. used to sort the list of files in a directory
C. both a and b
D. none of the abov
Answer» B. used to sort the list of files in a directory
277.

The command that can be used to restrict incoming messages to a user is

A. halt
B. mesg
C. grep
D. sleep
Answer» C. grep
278.

it rw- means

A. readable
B. readable and executable
C. readable and writable
D. readable, writable and executable
Answer» D. readable, writable and executable
279.

It rwx means

A. readable
B. readable and executable
C. readable and writable
D. readable, writable and executable
Answer» E.
280.

it r-x means

A. readable
B. readable and executable
C. readable and writable
D. readable, writable and executable
Answer» C. readable and writable
281.

it r-- means

A. readable
B. readable and executable
C. readable and writable
D. readable, writable and executable
Answer» B. readable and executable
282.

it -wx means

A. no permission
B. execute only
C. writable only
D. writable and executable
Answer» E.
283.

it -w- means

A. no permission
B. execute only
C. writable only
D. writable and executable
Answer» D. writable and executable
284.

it --- x means

A. no permission
B. execute only
C. writable only
D. writable and executable
Answer» C. writable only
285.

it --- means

A. no permission
B. execute only
C. writable only
D. writable and executable
Answer» B. execute only
286.

which command is used for extracting file sfrom arcieve

A. tar -c
B. tar-x
C. tar-t
D. all of these
Answer» C. tar-t
287.

the file access permission types are

A. r-- read
B. w-- write
C. x-- execute
D. all of these
Answer» E.
288.

Which command is used for specifying archieve arch

A. tar -c
B. tar-x
C. tar-t
D. #name?
Answer» E.
289.

whicj command is used for displaying file in archieve

A. tar -c
B. tar-x
C. tar-t
D. all of these
Answer» D. all of these
290.

which command is used for creating an archive

A. tar -c
B. tar-x
C. tar-t
D. all of these
Answer» B. tar-x
291.

which of the following are archive command

A. tar -c
B. tar-x
C. tar-t
D. all of these
Answer» E.
292.

!cmd is used for

A. saving and editing
B. editing and aborting
C. to runs cmd and return to command prompt
D. saving
Answer» D. saving
293.

:w is used for

A. saving and editing
B. editing and aborting
C. writing
D. saving
Answer» E.
294.

:q is used for

A. saving and editing
B. editing and aborting
C. writing
D. saving
Answer» C. writing
295.

Input mode is used for

A. to show text
B. to copy text
C. to provide command
D. all of these
Answer» B. to copy text
296.

ex mode is used for

A. handling files and erform substitution
B. copy and delete
C. to show text
D. to hide text
Answer» B. copy and delete
297.

:x is used for

A. saving and editing
B. editing and aborting
C. writing
D. saving
Answer» B. editing and aborting
298.

command mode allows operation of

A. copy and delete
B. cut and copy
C. paste and delete
D. copy and cut
Answer» B. cut and copy
299.

The vi editor is working in which mode of following

A. command
B. input
C. ex
D. all of these
Answer» E.
300.

The command for changing group owner is

A. chown
B. chgrp
C. chmod
D. cher
Answer» C. chmod