

MCQOPTIONS
Saved Bookmarks
This section includes 358 Mcqs, each offering curated multiple-choice questions to sharpen your Unix knowledge and support exam preparation. Choose a topic below to get started.
51. |
Multiple Unix commands can be put into a file to form a program. This is called a |
A. | Pipe |
B. | Script |
C. | Link |
D. | Shell |
Answer» C. Link | |
52. |
The name of the Superuser is |
A. | Master |
B. | Supreme |
C. | Root |
D. | President |
Answer» D. President | |
53. |
Which of the following is not one of the 3 general components of the Unix operating system? |
A. | the kernel |
B. | the shell |
C. | the GUI |
D. | the file system |
Answer» D. the file system | |
54. |
To invoke "bash" you type |
A. | bsh |
B. | sh |
C. | bash |
D. | Either A or C |
Answer» D. Either A or C | |
55. |
Ethernet |
A. | Is slower than a dial-up modem |
B. | Carries data at a maximum rate of 56 Kilobits of data per second. |
C. | Is rarely used today |
D. | Can exceed speeds of 10 Megabits of data per second |
Answer» E. | |
56. |
The redirection symbol for output is |
A. | > |
B. | < |
C. | ^ |
D. | | |
Answer» B. < | |
57. |
A network works by transmitting bits of information between machines called |
A. | bytes |
B. | blocks |
C. | packets |
D. | placards |
Answer» D. placards | |
58. |
The Superuser can |
A. | Create accounts |
B. | Delete accounts |
C. | Read and write files in user accounts |
D. | All the above |
Answer» E. | |
59. |
Which of the following is not true of the SSH tools? |
A. | Use encrypted connections |
B. | Only need to be running on the remote machine |
C. | Use a key to scramble data |
D. | Increasing in popularity |
Answer» C. Use a key to scramble data | |
60. |
It is good to learn the "mail" command because |
A. | It is a powerful email program |
B. | It is available on most Unix machines |
C. | It is very popular |
D. | Both a and b |
Answer» C. It is very popular | |
61. |
When backspace doesn’t work to erase characters, we can use _____ |
A. | ctrl-f |
B. | ctrl-h |
C. | ctrl-c |
D. | ctrl-u |
Answer» C. ctrl-c | |
62. |
Pick the incorrect statement. |
A. | Shell is a command interpreter |
B. | Shell is the interface between user and kernel |
C. | System can't work without a shell |
D. | Shell is a program |
Answer» D. Shell is a program | |
63. |
Which one is not a characteristic of pipes |
A. | connect commands |
B. | multiple pipes can be used on a command line |
C. | can not be used with redirection |
D. | can save you keystrokes |
Answer» D. can save you keystrokes | |
64. |
Which is not an example of networking hardware? |
A. | Hubs |
B. | Routers |
C. | Modems |
D. | Remote machine |
Answer» E. | |
65. |
To use a Unix system with a GUI you need this type of window to enter Unix commands |
A. | Terminal |
B. | Dialog box |
C. | Dos |
D. | Command |
Answer» B. Dialog box | |
66. |
Which of the following is not a network topology? |
A. | Diamond |
B. | Star |
C. | Ring |
D. | Hub |
Answer» B. Star | |
67. |
Ctrl-S stops scrolling of screen output and ________. |
A. | locks terminal |
B. | delete a character |
C. | locks keyboard |
D. | delete a line |
Answer» D. delete a line | |
68. |
Netscape is |
A. | Not very popular on Unix |
B. | Not very compatible with the Windows version. |
C. | A graphical Unix browser |
D. | None of the above |
Answer» D. None of the above | |
69. |
Mozilla is |
A. | Some kind of virus |
B. | A monster inside the computer |
C. | A Unix browser |
D. | An email program |
Answer» D. An email program | |
70. |
Domain Name Servers are required to translate alphabetical machine names into |
A. | Packets |
B. | Routers |
C. | IP numbers |
D. | Hubs |
Answer» D. Hubs | |
71. |
Who needs to possess the superuser account? |
A. | Ordinary users |
B. | System administrator |
C. | Department manager |
D. | President of the company |
Answer» C. Department manager | |
72. |
Options are also arguments but begin with a – . |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
73. |
mailx command is used for sending and receiving emails. |
A. | True |
B. | False |
C. | May be |
D. | Can't say |
Answer» B. False | |
74. |
___ command performs copying of diskettes. |
A. | pp |
B. | df |
C. | du |
D. | dd |
Answer» E. | |
75. |
The set of routines needed to operate a specific device is known as _____ |
A. | device file |
B. | device program |
C. | device driver |
D. | device software |
Answer» D. device software | |
76. |
Which one of the following command will shutdown and reboot the system? |
A. | shutdown -g2 |
B. | shutdown -g2 i6 |
C. | shutdown -g2 -g0 |
D. | shutdown -y -g0 -i6 |
Answer» E. | |
77. |
Which option is used with shutdown command to override the default waiting time? |
A. | -g |
B. | -e |
C. | -s |
D. | -i |
Answer» B. -e | |
78. |
All the user information is stored in __ |
A. | etc/passwd |
B. | bin/passwd |
C. | bin/users/passwd |
D. | etc/shadow |
Answer» B. bin/passwd | |
79. |
Which of the following commands are used for maintenance of user accounts? |
A. | useradd |
B. | usermod |
C. | userdel |
D. | useradd, usermod, userdel |
Answer» E. | |
80. |
The SUID for any file can be set by the administrator using ___ |
A. | chmod |
B. | chmod u+s filename |
C. | chmod s filename |
D. | chmod us filename |
Answer» C. chmod s filename | |
81. |
____ command is used by the superuser for changing root’s password. |
A. | pd |
B. | password |
C. | pswd |
D. | pwd |
Answer» D. pwd | |
82. |
Which command is used by the system administrator to set the date of the system? |
A. | dt |
B. | su |
C. | date |
D. | chdt |
Answer» D. chdt | |
83. |
____ command allows superuser to communicate with users. |
A. | comm |
B. | cron |
C. | date |
D. | wall |
Answer» E. | |
84. |
User’s environment mode created using su – is terminated using __ |
A. | ctrl-v |
B. | ctrl-q |
C. | ctrl-d |
D. | ctrl-f |
Answer» D. ctrl-f | |
85. |
Which of the following is used for creating user’s environment? |
A. | su |
B. | su – |
C. | -su |
D. | su – – |
Answer» C. -su | |
86. |
When we log in as root user we are placed in __ |
A. | /bin |
B. | /root |
C. | /system |
D. | /admin |
Answer» C. /system | |
87. |
The system administrator is also known as ____ |
A. | master user |
B. | superuser |
C. | root user |
D. | master and super user |
Answer» E. | |
88. |
____ option is used with test for checking if the file exists and has the size greater than zero. |
A. | -f |
B. | -r |
C. | -e |
D. | -s |
Answer» E. | |
89. |
test statement cannot ______ |
A. | compare two numbers |
B. | compare two strings |
C. | compare two files |
D. | check a file’s attributes |
Answer» D. check a file’s attributes | |
90. |
Where is the exit status of a command stored? |
A. | $0 |
B. | $> |
C. | $1 |
D. | $? |
Answer» E. | |
91. |
A shell script stopped running when we change its name. Why? |
A. | location of the file changed |
B. | we can’t change the name of the script |
C. | $0 was used in the script |
D. | many possible reasons |
Answer» D. many possible reasons | |
92. |
Suppose x =10, then what will be the value of x$x$? |
A. | undefined |
B. | erroneous |
C. | 100 |
D. | x10$ |
Answer» E. | |
93. |
Which of the following option is used with set for debugging shell scripts? |
A. | -a |
B. | -x |
C. | -d |
D. | -e |
Answer» C. -d | |
94. |
Which of the following command doesn’t accept a filename as an argument? |
A. | cut |
B. | ls |
C. | paste |
D. | mailx |
Answer» E. | |
95. |
The ____ allows us to read data from the same file containing the script. |
A. | >> |
B. | << |
C. | !! |
D. | — |
Answer» C. !! | |
96. |
Which symbol is used with the set command for command substitution? |
A. | – |
B. | — |
C. | ?? |
D. | _ |
Answer» C. ?? | |
97. |
Which one of the following is an internal command? |
A. | cut |
B. | expr |
C. | set |
D. | Is |
Answer» D. Is | |
98. |
____ statement is used for shifting arguments left. |
A. | set |
B. | shift |
C. | cut |
D. | paste |
Answer» C. cut | |
99. |
expr is an _____ command |
A. | internal |
B. | external |
C. | shell |
D. | derived |
Answer» B. external | |
100. |
Which of the following is performed by expr string handling’s function? |
A. | determine the length of string |
B. | extract a substring |
C. | locate the position of a character in a string |
D. | determine the length of string, extract and locate the position of the string |
Answer» E. | |