Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unix - MCQ

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 23
At a glance
Powered by AI
The document discusses the basics of Unix operating system including its history, components, commands and file permissions.

The main components discussed are the shell, file system structure including directories and files, and system administration utilities.

Important commands covered include ls, cat, grep, find, touch, chmod etc. and their usage for listing, viewing, searching, modifying files and directories.

1. Unix OS was first developed by a. Dennis Ritchie b. Bjarne stroustrup c. Ken Thompson d.

Brian Kernighan

2. Unix OS was first developed at a. Microsoft corp. USA b. AT & T Bell Labs, USA c. IBM, USA d. Borland International, USA

3. Unix is written in a. C language b. Ada language c. Perl language d. Pascal language

4. Unix is a a. Single User, Single tasking OS b. Single User, Multi-tasking OS c. Multi-User, Multi- tasking OS d. None

5. Which of the following is a command for searching a pattern in a file? a. Find b. b. group

c. c.look up. d. None

6. Unix Command can be typed in a. Lower case b. Upper case c. Both the cases d. None

7. Shell Program is stored in a file called a. Unix b. Sh c. Dd d. Cc

8. Which shell offers a command history feature a. C shell b. Visual shell c. Bourne shell d. Korn shell

9. The minimum number of links for any directory file are a. 3 b. 4 c. 1 d. 2

10. The default value of Umask is a.1024 b. 4021 c.0022 d.1001

11. Binary executable required for system administration is usually placed in ________ directory. a. Letc b.lusr c.ldev d.none

12. All user directories are usually placed in _________ directory a. Letc b.lusr c.ldev d.none

13. If there are three links for a file then the number of copies of the file would be a. One b.two c.three d.four

14. After typing the contents of file test created by you by giving the command cat>test you save the contents by a. Pressing the keys ctrl-c b. Typing save and pressing enter c. Pressing Esc key d. Pressing ctrl-d 15. The file for which we do not have write permission can be deleted using the command a. rm-i file b. rm-I file c. rm-r-file d. rm-f-file 16. The permission 746 can be represented as a. rwxrwx- -x b. rw- -w-r-x c. rwxr-xr-x d. rwxr- -rw 17. A Sticky bit applies to a file would mean that a. No one can remove it b. It would stick around in memory even when its execution is over

c. Next time you login it would get executed on its own d. None of the above 18. The command pwd gives a. Present working directory b. Password in encrypted form c. Password in decrypted form d. None 19. Which of the following is not a unix command a. Cd b.rm c.pwd d.del

20. The size of any block in the unix file system is a. 512 bytes b. 1024 bytes c. 2048 bytes d. Any of the above 21. To find the block size on your file system the command is a. Blksz b. Szblk c. Chksz d. Cmchk 22. Each entry in inode table is of size a. 64 kb b. 32kb c. 32 bytes d. 64 bytes 23. The program contained in boot block, that loads kernel into memory is called a. Disk Bootstrap program b. Master boot program

c. Shell program d. None of the above 24. The state of the file system is contained in a. Boot block b. A special block created by Book Block c. Super Block d. None of the above 25. Which file gets executed when we use the passwd command a. /etc/passwd b. /etc/pwd c. /bin/passwd d. /passwd 26. The command cal j 1997 would give the output as a. The calendar of jan,june and july 1997 b. Only calendar of jan 1997 c. An error d. None of the above 27. The output of command banner Unix shell programming would be a. A banner showing unix,shell and programming words displayed in separate lines b. A banner showing unix shell in one single line c. Nothing d. A banner showing unix shell programming in one line. 28. To see the last access time of various files in a file system the command is a. Is-Iu b. Is-I c. Is-acc d. Is-mt

29. To ascertain what are the contents of the file in your the system the best way would be a. Do a cat command on each file and find its contents b. Use the command cat* c. Use the command file* d. None of the above 30. Which of these is not a command of Unix related with DOS a. Dosdir a:proj b. Doscopy trial a:/ c. Doscp/HOME/Proj/Prg a:/ d. Dosls 31. Which of the following is not true a. Sorting is done on the basics of first character of each line b. Sort command sorts a file word by word rather than line by line c. Sort command has s provision to do a numeric sort d. Sort is not a filter 32. To change the access time of a file to 12:40 PM on 26th Jan 1997 the command would be a. Touch a 2601971240 file b. Touch a 1240260197 file c. Touch a 0126124097 file d. Touch a 9701261240 file 33. The command cut f 2,8 d:file I would output a. The fields 2 to 8 from file I where delimiter between fileds is: b. The fields 2 to 8 from file I including the delimiter : between fields c. The columns 2 to 8 from file I with : between each column d. None of the above 34. The command to search the pattern Hi there in file I would be a. Grep Hi there file 1

b. Grep Hi there file 1 c. Grep \<Hi there\> file1 d. Grep Hi there file 1 35. The command head f1 would display a. First line of the file f1 b. Nothing c. First 10 lines of the file f1 d. The whole file f1 36. After you have entered text in your file, to save and quit vi you will use a. Esc shift ZZ b. Shift ZZ c. Esc:q Enter d. None of the above 37. To search a pattern which starts with uni the command would be a. :/ \<uni b. :\ /<uni c. :/ \<uni\> d. :/ \<uni\ 38. In command :l,.s/part/PART/g,g stands for a. Grep b. A numeric value which is to be substituted by a number c. Global d. Ignore case whilesearching 39. To delete 5 limes from a file that you are editing and copy them to a buffer named x you would use the command a. x5dd b. dd5x c. 5xdd

d. d5xd 40. Which of the following statements are not true a. You can yank lines from one file and paste them in to another file b. To setup new abbrevations the command is to be issued in command mode c. To unabbrivate the macro the command is :u<abbreciation> d. List of all abbreviations that have been set can be seen through the command :set abbr e. All are false 41. Which of following commands do not belong to multiple file editing commands a. :n! b. :q! c. :rnew! d. All the above 42. The difference between the commands ps e and ps a is a. Ps e gives details of every process running in memory whereas ps a gives output for all the process that you have launched b. Ps e gives details of every process running in memory whereas ps a gives details of all user processes c. No difference , both give same output d. None of the above 43. The father of all processes is a. Root b. Sh c. Sched d. Init 44. The process id numbers of the processes vhand,bdflush,sched and init are a. 1,2,3 and 4 b. 2,3,0 and 1 c. 3,4,1 and 2

d. 0,1,2 and 3 45. Which of the following is not true regarding the command $ nohup cat *.let | nohup sort >f1 & a. The process would die if the user logs out before the commands execution is over b. If the user logs out the output of sort would be dtored in a file nohup.out c. It is optional to give nohup before sort d. This background process is also known as a deamon process 46. Which of the following is not true regards the kill command a. Super user can kill deamon processes b. For sure kill the signal no is 9 c. There is no surety that the shell process will get killed by the command kill <PID of shell process> d. Using Kill command you can kill other users processes too 47. Which of the following is not true a. The at command permits you to receive messages only by mail b. A persons login name appears in the file at.allow if he is not allowed to use the at command c. Both are false d. Both are true 48. Which statement are true if the file which contains the following line is submitted to the crontab command 10 2 3 * 0 echo There is no substitute for hard work a.The message is echoed on the 3rd of every month at 2.10 a.m b.The message is echoed on the 3rd of every month at 2.10 p.m c.The message is echoed on the 3rd of every month at 2.10 a.m if it happens to be a Sunday d. None of the above 49. For a person to receive messages he should have his terminal set to a parameter which will allow him receive messages.The command to set this parameter is a.message on

b.msg o c.mesg y d.messagey 50.The command that unix offers to a user to find out whether he can send messages to a particular terminal are a.finger and who b.finger mesg and who T c.finger I and who t d.finger I and who T 51.If the user has read a news item he cannot read it again because of creation of the file a._news_time b.news.time c. .news.time d. .news_time 52. To read the stale news the option available is a. news a b.Delete the file /usr/news c.Delete the file _news.time d.Delete the file .news_time 53.The message of the day is stored in a file called a. /etc/profile b. /etc/motv c. .profile d. Autoexec.bat 54. The incoming mail of user with the login name aa12 is stored in the file a. /usr/spool/mail/aa12 b. /usr/aa12/mbox c. /spool/mail/aa12

d. /usr/aa12/.mbox 55. .mailrc is the file a. Which stores the incoming mail b. Which is used to type the mail to be sent c. Which is invoked when the mail command is executed d. Which permits you to customize the vi environment 56. The escape sequence \033[4m is used to a. underlying characters b. mark them as bold c. display them in reverse video d. none of the above 57. Which of the following assignments is illegal a. a=ls b. b=ls l c. c=1972 d. d=who | grepaal 58. Which of the following assignment is illegal a. a=cat file b. a=100 b=50 c. age=25 d. all the above 59. A null variable a can be created using a. a= b. a= c. a= d. All the above 60. The shell metacharacter $# represents

a. Total number of arguments supplied to the shell script b. Total number of files in the current directory c. Total number of users who have logged in d. Total number of processes running in the background 61. When we are executing a shell script the shell acts as a. An interpreter b. A compiler c. An operating system d. None of the above 62. On executing a statement set -3+1 a. $1 would be -3 b. $1 would be c. $1 would be set d. This command would result into an error 63. On executing the command Shift $v a. The positional parameters would be shifted by the value of the variable v b. The positional parameters would be shifted by 1 c. The positional parameters would not be shifted at all d. This command would result into an error 64. Which of the following is NOT a shell keyword a. Shift b. Readonly c. Unset d. ls 65. To the statement read v1 v2 v3 we can supply a. maximum 3 values b. only 1 value

c. exactly 3 values d. any number of values 66. The metacharacter $* represents a. Number of parameters supplied at the command prompt b. Parameters supplied at the command prompt c. Value of the variable * d. All files in the current directory 67. A shell variable cannot start with a. An alphabet b. A number c. A special symbol other than an underscore d. Both b and c above 68. Which of the following shows the correct hierarchy of arithmetic operations in shell a. (),**,* or /, + or b. (), **, *,/,+,c. (),**,/,*,+,d. (),/,% or *,- or + 69. Which of the following statements is correct a. a=expr $b + $c b. a=expr $b * $c c. a=expr $b * ($c + $d) d. a=expr $b \* \( $c + $d \) 70. Which of the following is allowed in an arithmetic statement involving exprinstruction a. [] b. {} c. () d. None of the above

71. The statement z=expr 5/2 would store in z a value a. 2.5 b. 3 c. 2 d. 0 72. The expression expr -7 % 2evaluates to a. 1 b. -1 c. -3.5 d. 0 73. The expression expr -2 % 7 evaluates to a. 2 b. -2 c. 0 d. 0.285 74. Hierarchy decides which operator a. Is most important b. Is used first c. Is fastest d. Operates on largest numbers 75. The break statement is used to exit from a. An if statement b. A for loop c. A program d. None of the above 76. An until loop ensures that the statement within the loop get executed a. Only once

b. Atleast once c. Not even once d. None of the above 77. The cp command uses a. Standard input file b. Standard output file c. Both input and output file d. Neither input nor output file 78. Which option will be used with sort command to start sorting after the nth column of the (m+1)th field a. m.n b. +m.n c. +n.m+1 d. +(m+1).n 79.Which command is used to terminate a process a. Shutdown b. Haltsys c. Cancel d. Kill 80.The command is used to compare the files is known as a. Comp b. Cmp c. Do d. Ccp 81.Which of the following keys is used to move the cursor to the end of the paragraph a. } b. { c. |

d. $ 82. The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is a. Tee b. Tr c. Sort d. Grep 83.Which command is used to remove a directory a. Rd b. Rmdir c. Dldir d. Rdir 84.Which of the following keys is used to replace a dingle character with new text a. S b. s c. r d. C 85.Which command is used to extract a specific columns from the file a. Cat b. Cut c. Grep d. Paste 86. Which command sends the word count of the file infile to the newfile. a. wcinfile>newfile b. wc<infile>newfile c. wcinfile - newfile d. wcinfile | newfile

87.Which command is used to remove the read permission of the file 'note' from both the group and others? a. chmodgo+r note b. chmodgo+rw note c. chmod go-x note d. chmod go-r, 4-x note 88.Which command is used to concatenate all files beginning with the string 'emp' and followed by a non-numeric characters? a cat emp[!0-9] b more [emp][!0-9] c cat emp[x-z] d cat emp[a-z] 89.Which command will be used with vi editor to insert text to left of cursor? as bS ca di

90.In vi editor, forward search is performed using the command. a :pat b :pat c. /pat d. All of the above

91. Which of the following special shell variables is used to process number of the last background job? a $! b. $#

c. $0 d. $* 92. Which option will be used with ps command to slow the entire command line of the process being run? A. -4 B. -f C. -1 D.-4

93.Which of the following command addresses all users who are currently hooked on? A. write B. mail C. wall D.mesg 94.Which of the following commands is used to identify the type of file by context? A. ls B. cat C. file D.more 95.The filed separator in cut command is specified with A. -a option B. -d option C. -r option D.-x option 96.Which of the following options will be used to display number of blocks used by a file? A. -c B. -i

C. -d D.-s

97.Which option will be used with touch command to change the access time? A. -a B. -b C. -t D.-h 98.Which command is used to make all files and sub-directories in the directory (progs) executable by all users? A. chmod -R a+xprogs B. chmod -R 222 progs C. chmod -1 a+xprogs D.chmod -x a+xprogs 99.Which command is used to display and create files? A. cat B. vi C. ed D.lyrix 100. The second set of the three permissions (r-) indicates that A. group has read permission only B. other has read permission only C. owner has read permission only D.group has write permission only

Answers 1. C 2. B 3. A 4. C 5. B 6. A 7. B 8. C 9. D 10. C 11. A 12. B 13. A 14. D 15. D 16. D 17. B 18. A 19. D 20. D 21. D 22. D 23. A 24. C 25. C 26. C

27. B 28. A 29. C 30. B 31. B 32. C 33. A 34. A 35. C 36. A 37. A 38. C 39. A 40. E 41. D 42. B 43. C 44. B 45. A & D 46. A & D 47. C 48. C 49. C 50. D 51. D 52. A & D 53. B

54. A 55. C 56. B 57. C 58. C 59. D 60. A 61. A 62. D 63. A 64. D 65. D 66. B 67. D 68. D 69. D 70. C 71. C 72. B 73. B 74. B 75. B 76. D 77. D 78. B 79. D 80. B

81. A 82. A 83. B 84. B 85. B 86. A 87. D 88. A 89. D 90. D 91. A 92. B 93. C 94. C 95. B 96. D 97. A 98. A 99. A 100.a

You might also like