

MCQOPTIONS
This section includes 4320 Mcqs, each offering curated multiple-choice questions to sharpen your Engineering knowledge and support exam preparation. Choose a topic below to get started.
151. |
Which of the following files will displayed by this command cat *ch* |
A. | patch |
B. | catch |
C. | .ch |
D. | All of the above |
E. | None of the above |
Answer» E. None of the above | |
152. |
The Octal number to be given alogn with chmod command to make a file readable, writable and executable to the owner, readable and executable to group and others is: |
A. | 000 |
B. | 755 |
C. | 744 |
D. | 555 |
E. | None of the above |
Answer» C. 744 | |
153. |
Which command is used to remove a directory? |
A. | rd |
B. | rmdir |
C. | dldir |
D. | rdir |
E. | None of the above |
Answer» C. dldir | |
154. |
Which option will be used with touch command to change the access time? |
A. | -a |
B. | -b |
C. | -t |
D. | -h |
E. | None of the above |
Answer» B. -b | |
155. |
Which command is used to make all files and sub-directories in the directory (progs) executable by all users? |
A. | chmod -R a+x progs |
B. | chmod -R 222 progs |
C. | chmod -1 a+x progs |
D. | chmod -x a+x progs |
E. | None of the above |
Answer» B. chmod -R 222 progs | |
156. |
The agency that sits between the user and the UNIX system is called the |
A. | logic |
B. | profile |
C. | shell |
D. | erxc |
E. | None of the above |
Answer» D. erxc | |
157. |
Which of the following commands is used to update access and modification times of a file? |
A. | grep |
B. | wc |
C. | touch |
D. | cat |
E. | None of the above |
Answer» D. cat | |
158. |
Which of the following is not a communication command. |
A. | write |
B. | mesg |
C. | |
D. | grep |
E. | None of the above |
Answer» E. None of the above | |
159. |
Which of the following keys is used to replace a single character with new text? |
A. | S |
B. | s |
C. | r |
D. | C |
E. | None of the above |
Answer» C. r | |
160. |
Which command is used to extract specific columns from the file? |
A. | cat |
B. | cut |
C. | grep |
D. | paste |
E. | None of the above |
Answer» C. grep | |
161. |
Which command sends the word count of the file infile to the newfile. |
A. | wc infile >newfile |
B. | wc <infile >newfile |
C. | wc infile - newfile |
D. | wc infile | newfile |
E. | None of the above |
Answer» B. wc <infile >newfile | |
162. |
Which of the following commands is used to list contents of directories? |
A. | ls |
B. | lp |
C. | dir |
D. | tar |
E. | None of the above |
Answer» B. lp | |
163. |
The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is |
A. | tee |
B. | tr |
C. | sort |
D. | grep |
E. | None of the above |
Answer» B. tr | |
164. |
Which symbol is used to separate more than one command in the same command line? |
A. | $ |
B. | # |
C. | : |
D. | ; |
E. | None of the above |
Answer» E. None of the above | |
165. |
Which command is used to count just the number of characters in a file? |
A. | wc - 1 |
B. | wc -c |
C. | wc -w |
D. | wc -r |
E. | None of the above |
Answer» C. wc -w | |
166. |
Which command is used to display the characteristics of a process? |
A. | pid |
B. | du |
C. | ps |
D. | au |
E. | None of the above |
Answer» D. au | |
167. |
Which of the following commands is used to obtain a list of all files by modification time? |
A. | ls -1 |
B. | ls -t |
C. | ls -i |
D. | ls -R |
E. | None of the above |
Answer» C. ls -i | |
168. |
The % key allows you |
A. | to move the cursor to a matching delimiter, when a delimiters a parenthesis, a bracket, or a brace. |
B. | to move the cursor to the upperleft corner of the screen |
C. | to move the cursor backward to the beginning of a word |
D. | to move the cursor to the first column in the current line |
E. | None of the above |
Answer» B. to move the cursor to the upperleft corner of the screen | |
169. |
Which of the following directories contain all the Alias created by a user, including his login directory? |
A. | /tmp |
B. | /etc |
C. | /usr |
D. | /dev |
E. | None of the above |
Answer» D. /dev | |
170. |
To organize files on a disk, MS-DOS separates them into areas called _____ |
A. | directories |
B. | buckets |
C. | areas |
D. | area directories |
E. | None of the above |
Answer» B. buckets | |
171. |
Which of the following commands will take you directly to the root directory no matter what subdirectory you are currently in? |
A. | CD root |
B. | CD |
C. | CD .. |
D. | CD.. |
E. | None of the above |
Answer» C. CD .. | |
172. |
Which DOS command allows you to compress existing disks and to create new compressed volumes? |
A. | DEFRAG |
B. | DBLSPACE |
C. | SCANDISK |
D. | MSAV |
E. | None of the above |
Answer» C. SCANDISK | |
173. |
While working with MS-DOS, which command is used to specify the colour display, 40 columns and color? |
A. | MODE COLOUR |
B. | MODE/C |
C. | MODE CO40 |
D. | MODE CHANGE |
E. | None of the above |
Answer» D. MODE CHANGE | |
174. |
When executed from a bootable hard drive, which command will make a formatted floppy disk bootable? |
A. | COPY C: DOS COMMAND.COM A: |
B. | ATTRIB C: *.SYS A: |
C. | XCOPY C: DOS *.* A: |
D. | SYS C: A: |
E. | None of the above |
Answer» E. None of the above | |
175. |
Which of the following commands allows you to make a directory? |
A. | MAKE |
B. | DIR |
C. | MD |
D. | DD |
E. | None of the above |
Answer» D. DD | |
176. |
What must you do to create a printer pool containing four shared printers on your Windows NT Server computer? |
A. | Set up all the printers to share the same parallel port |
B. | Set individual printer properties for each printer |
C. | Set up all printers as network-interface printer devices |
D. | Specify the same printer driver and settings for all printers |
E. | None of the above |
Answer» E. None of the above | |
177. |
A one-way trust relationship has been established in which the RESEARCH domain trusts the TESTING domain. The Guest account is disabled in both domains. As a user belonging to a global group called Testers in the TESTING domain, you want to access a shared directory on a Windows NT Advanced Server in the RESEARCH domain. Which action would give you access? |
A. | No action is necessary, as access is already available |
B. | The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain |
C. | The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain, and the user must log on to the RESEARCH domain |
D. | None of the above |
Answer» C. The Testers group must be assigned permissions to the shared directory on the Windows NT Advanced Server in the RESEARCH domain, and the user must log on to the RESEARCH domain | |
178. |
Assume that all users are members of the ACE domain and that most of the resources exist in the PUBS and CAD domains. You are a user with administrator rights in all domains. How would you allow users to access all of the resources, with a minimum set of trust relationships? |
A. | Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts ACE |
B. | Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD |
C. | Establish one-way trust relationships in which: PUBS trusts ACE CAD trusts PUBS |
D. | Establish one-way trust relationships in which PUBS trusts ACE ACE trusts CAD |
E. | None of the above |
Answer» B. Establish one-way trust relationships in which: ACE trusts PUBS ACE trusts CAD | |
179. |
Bridges operate at the MAC layer (layer 2 of the OSI model.) |
A. | True |
B. | False |
Answer» B. False | |
180. |
You need to install network adapters in 20 ISA-bus computers. Which rule must you follow when installing the network adapters? |
A. | All adapters in a computer, including the network adapter, must be set to the same IRQ |
B. | All adapters in a computer, including the network adapter, must be set to different IRQs |
C. | All network adapters in all computers on the same network must be set to the same IRQ |
D. | All network adapters in all computers on the same network must be set to different IRQs |
E. | None of the above |
Answer» C. All network adapters in all computers on the same network must be set to the same IRQ | |
181. |
You are installing a network interface card on a computer with the following configuration: a 5867133 CPU, 16MB or RAM, a 800-MB IDE hard disk, a parallel port configured as LPT1, and a serial port configured as COM1, which is currently used by a mouse. In addition to the IDE host adapter and the video card, the following devices have been installed on the computer's expansion bus: a modem on COM2, a SCSI host adapter for a CD-ROM drive, and a sound card. The SCSI hose adapter is using IRQ 5, and the sound card is using IRQ 11. The network interface card that you are installing supports the following choices for IRQ: 2, 3, 4, 5, 9,10 and 11. Which IRQ(s) could you use for the network interface card without creating an IRQ conflict with another device? |
A. | 2 |
B. | 4 |
C. | 5 |
D. | 10 |
E. | None of the above |
Answer» E. None of the above | |
182. |
Which layers of the OSI model are managed by a network protocol such as Microsoft NetBEUI? |
A. | network and transport |
B. | physical and data link |
C. | transport and session |
D. | media access control and logical link control |
E. | None of the above |
Answer» B. physical and data link | |
183. |
What does the transport protocol do? |
A. | It defines how data should be presented to the next receiving layer, packages the data accordingly, and then passes the data to the application through the session layer interface. |
B. | It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions |
C. | It supports communications between applications on different computers by creating sessions, defining data-exchange formats, and providing application-support services |
D. | It is responsible for establishing logical names on the network, establishing connections between two logical names on the network, and supporting reliable data transfer between computers that have established a session |
E. | None of the above |
Answer» B. It provides low-level access to the network adapters by providing data transmission support and some basic adapter management functions | |
184. |
You are adding a new server to your network. The network uses TCP/IP. The new server will provide users with dial-up access to network resources. The data link communications protocol you choose for dial-up access must allow you to provide secure authentication. Which protocol should you choose? |
A. | PPP |
B. | DLC |
Answer» B. DLC | |
185. |
Maria needs to install software on a Windows NT Server computer which is a backup domain controller. When she attempts to log on to the server, she receives the message "Unable to log on locally". What must you do to enable Maria to log on to the server? |
A. | In User Manager for Domains, define Maria as a local account |
B. | In User Manager for Domains, assign Maria to a group that has the right to log on locally |
C. | In the System option in Control Panel, select the setting that allows users to log on locally |
D. | In the System option in Control Panel, set the user environment variables to allow Maria to log on locally |
E. | None of the above |
Answer» C. In the System option in Control Panel, select the setting that allows users to log on locally | |
186. |
Why does a high number of broadcast messages adversely affect overall network performance? |
A. | Each broadcast message requires an acknowledgement packet from every computer on the network |
B. | No computer on the network can transmit data until each broadcast message has been acknowledged by every computer on the network |
C. | Broadcast messages are automatically routed to every segment of a LAN |
D. | Every computer on the network must process each broadcast message |
E. | None of the above |
Answer» E. None of the above | |
187. |
Routers are often used to implement FIREWALLS |
A. | True |
B. | False |
Answer» B. False | |
188. |
You want to find out which users are currently using a specific directory on a Windows NT Server computer. How should you do this? |
A. | Use Windows NT Explorer |
B. | Use Disk Administrator |
C. | Use Server Manager |
D. | Use User Manager for Domains |
Answer» D. Use User Manager for Domains | |
189. |
Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3? |
A. | chmod u+x emp[1-3] |
B. | chmod 777 emp* |
C. | chmod u+r ??? emp |
D. | chmod 222 emp? |
E. | None of the above |
Answer» B. chmod 777 emp* | |
190. |
The term TSR is an abbreviation for: |
A. | Terminate Stay Ready |
B. | Testing System Read |
C. | Terminal Still Ready |
D. | Terminate Stay Resident |
E. | None of the above |
Answer» E. None of the above | |
191. |
Using the _____ switch causes FDISK to display the partition status of your hard disk without executing FDISK. |
A. | /show |
B. | /display |
C. | /status |
D. | /part |
E. | None of the above |
Answer» D. /part | |
192. |
You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do? |
A. | Change the domain name by using Control Panel |
B. | Modify the domain name in the Registry |
C. | Reinstall Windows NT Server |
D. | Change the domain name by using the Emergency Repair disk |
Answer» D. Change the domain name by using the Emergency Repair disk | |
193. |
In your company, 2 Ethernet Networks are connected with a router. All network connections run TCP/IP. Your new client computer can access only the computers on your side of the router. All other computers are able to access one another. What is the most likely cause of the problem? |
A. | incorrect termination of the destination network |
B. | defective network adapter in the router |
C. | incorrect subnet mask on your client computer |
D. | malfunctioning repeater |
E. | None of the above |
Answer» D. malfunctioning repeater | |
194. |
How many digits of the DNIC (Data Network Identification Code) identify the country? |
A. | first three |
B. | first four |
C. | first five |
D. | first six |
E. | None of the above |
Answer» B. first four | |
195. |
The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to |
A. | 0.003 |
B. | 0.009 |
C. | 0.991 |
D. | 0.999 |
E. | None of the above |
Answer» C. 0.991 | |
196. |
Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don't get a beep. What should you check first? |
A. | system board |
B. | RAM |
C. | microprocessor |
D. | power supply |
E. | speaker |
Answer» F. | |
197. |
Which peripheral port provides the FASTEST throughput to laser printers? |
A. | RS-232 |
B. | SCSI |
C. | Parallel |
D. | Serial |
E. | None of the above |
Answer» D. Serial | |
198. |
A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? |
A. | hot potato routing |
B. | flooding |
C. | static routing |
D. | delta routing |
E. | None of the above |
Answer» B. flooding | |
199. |
The mouse pointer moves erratically, what is the possible cause? The mouse |
A. | ball is dirty |
B. | is not connected |
C. | driver is not installed properly |
D. | has an incorrect IRQ setting |
E. | None of the above |
Answer» B. is not connected | |
200. |
Voltage is measured: |
A. | in parallel |
B. | in series |
C. | after breaking the circuit |
D. | after checking resistance |
E. | after checking current |
Answer» B. in series | |