Final Flashcards

(171 cards)

1
Q

UNIX was created in the:

UNIX was created at:

A

1970’s

AT&T Bell Laboratories in Murray Hill , New Jersey .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who owns Bell labs?

A

Nokia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The original Unix development team included:

A

Ken Thompson, Dennis Ritchie and many other individuals .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Unix distinguishes itself from its predecessors as the first portable:

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Unix operating system is almost entirely written in the _________ programming language, which allows Unix to operate on numerous platforms.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The C programming language was also written by:

, so it should be no surprise that their Unix operating system is written in C.

A

Ken Thompson
And Dennis Ritchie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The AT&T UNIX operating system was originally developed to support activities within:

A

AT&T Bell Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other organizations began developing their own Unix operating systems during:

A

1970’s and early 1980’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

rise to the “Unix Wars during the late 1980s and early 1990s where multiple hardware vendors attempted to:

for Unix .

A

set the standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the 7 Unix wars vendors:

A

AT&T System 5 UNIX (Sys5)
University of California, Berkeley (BSD)
Microsoft (Xenix )
Sun Microsystems (SunOS / Solaris ) Hewlett-Packard (HP-UX)
IBM ( AIX)
Silicon Graphics ( IRIX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

operating system variants, which are able to run on personal computer architectures

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 6 Linux operating system variants:

A

Ubuntu, Gentoo , Red Hat, Debian, CentOS, Linux Mint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Two methods to remotely acces a computer running the Unix os:

A
  1. Invoke a client communication program (e.g. PuTTY) on an Internet connected computer
  2. Via a dedicated “ dumb” terminal and keyboard Rarely used today
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once a connection is made with the Unix computer , you will be challenged to enter:

A

both a login identification (use rid) and a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

If userid /password combination is valid , you will see:

A

the Unix system prompt for your default Unix shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After you initially login to your Unix account, you should:

A

change the password that was initially assigned to your account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do u change password?

A

Type command $passwd

enter your current password

enter your new password twice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Enter any of the three commands at the shell prompt to terminate a Unix session:

A

logout
exit
ctrl+d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

represents the execution of a program that provides an environment which allows you to interact with the UNIX operating system .

A

shell session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To invoked a new shell session, simply:

A

enter the name of the shell to use at the current shell prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

If you terminate the current shell session:

A

the previous shell resumes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

If you precede the new shell with the ________ command, then all previously invoked shell sessions disappear .

A

exec

Ex: $exec bash
$exec /bin/bash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

All OS’s implement a ____ control system, or ______________.

A

file
File system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Unix and most , if not all, others use a _________________________ structure .

A

hierarchical directory tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Within a hierarchical directory tree structure, only two types of entities exist
( 1) Directories (2) Files
26
______ are organized under Directories
Files
27
Unix's tree is relatively ____________. The top most directory is called _______ and is designated by a:
standardized root forward slash /
28
First level directories are shown below:
root
29
Other directories can be created and reside within existing directories under:
root /
30
By default/design you always log into your:
home directory or login directory.
31
Your home directory name will be the same as your:
Warhawks userid!
32
Home directory’s resides under:
/home /home/userid
33
To identify your "present working directory type the command:
pwd
34
is a sequenceof directory names , separated by ", leading to a final directory or file.
A pathname or path
35
The directory you're currently in is referred to as the:
present working director
36
The systems root directory is ALWAYS:
/
37
There are two types of paths:
Absolute Relative
38
Is always referenced from the root directory E.g. /home/jdoe/public/assignments
Absolute path
39
Is always referenced from the "present working directory” directory. E.g. public /assignments
Relative path
40
represents the present working directory represents the parent directory of the present working directory represents the root directory represents the user's directory
.(i.e. dot) ..(i.e. double dot) /(i.e. slash) ( i.e. tilde)
41
All ____________ are files but, all files are not ____________!
programs programs
42
Files data -> Programs -> Data->
programs , etc. executable instructions , binary images , script /macro , " run on their own " etc. text , databases , graphics , audio , etc.
43
To determine the "type" of an unknown file, issue the command:
file
44
Often, we can determine the "type " of a file by its _________ filename.extension The part of the filename to the right of the period is called the:
extension
45
With respect to filenames, all alphanumeric characters are acceptable except:
@ ‘ | < > ! $ & \ / “ ? [ ] ( ) { } ^ # ;
46
The maximum filename length is ______________ including any extension and intervening periods
255 characters
47
True or false: Unix in general is not case sensitive
False: Unix is case sensitive
48
Any filename, or directory, that begins with a period (.) is called:
invisible/ hidden file
49
by default not be shown by a directory listing command
Hidden files
50
Only one file or directory can exist in a directory with a given: Likewise , a file and a directory cannot share the same ______ in any directory
name name
51
Good filename practice include:
1. Use meaningful names 2. Use “_” instead of spaces 3. Establish your own naming convention
52
If a file contains text or readable data, then you can display a count of lines, words and characters in the file to standard output without editing it by issuing the command:
wc
53
4 Command line arguments:
c - count bytes m - count characters l - count lines w - count words
54
If a file contains text or readable data, then you can display the entire contents of the file to standard output without editing it by issuing the command:
cat
55
Command line arguments:
n - line number on outputs # - number of lines to display c - clear standard output i - prompt to overwrite
56
To display the first few lines of the file to standard output without editing , issue the command:
head
57
To display the last few lines of the file to standard output without editing, issue the command:
tail
58
To display the entire contents of the file to standard output page by page and without editing, issue the command at the shell prompt:
more
59
While the more program executes, you can issue several single character commands to interact with the program:
q - Quit f- Move forward through the file Spacebar - move forward through the file . b - Move backward through the file
60
To copy the contents of a source file to a destination file in the present working directory, issue the command:
cp
61
To copy the contents of a source file to a a new directory where the new file has a new name, issue the following cp command at the shell prompt:
cp [-i] srcFile path/destFile
62
If the destination file does not exist: If the destination files exists:
a new file is created then the prior file contents are overwritten
63
To rename a file in the present working directory issue the following command at the shell prompt:
mv [-i] srcFile destFile
64
To move a file from its present working directory to a new directory issue the following mv command at the shell prompt:
mv [-i] srcFile path
65
To move a file from its present working directory to a new directory AND rename the file, issue the following mv command at the shell prompt:
mv [-i] srcFile path/destFile
66
To delete a file in the present working directory, issue the following rm command at the shell prompt:
rm [-i] name
67
To delete a file in any directory, issue the following rm command at the shell prompt:
rm [-i] path / name
68
To list the files and directories under the present working directory" type the (list) command at the shell prompt:
ls
69
If no command line argument, then the ls command lists:
all files and directories under the present working directory.
70
4 Directory listing:
ls - command line arguments a - lists all files including hidden l - long form indicates types, permissions, links, owner, size, create time d - list information about directory
71
To change to a new present working directory , issue the command:
cd
72
5 various cd commands:
cd path/name cd .. cd ../.. cd ~ cd
73
To create a new directory under any directory, issue the command:
mkdir
74
If no path (absolute or relative) is specified, then the directory is:
created in the present working directory
75
Creating directories: m - p -
m- set access(permission) mode by default media creates the name directory in mode 777 p- create entire path
76
To copy an existing directory under any directory, issue the command:
cp
77
To use cp command you must have permission to access ________ and you the permission write in ________
nameSrc dirDest
78
To delete an existing directory under any directory, issue the command:
rmdir
79
By default, before you delete a directory:
it must first be empty! No files or other directories in it!
80
You can recursively delete a directory, including its files and subdirectories, by issuing the following version of the rmdir command:
rmdir -rf [path/] name1…[ path /] nameN
81
The following version of the rmdir command asks you (i.e. interactive ) whether you really want to remove a file or subdirectory during recursive mode:
rmdir -ri [path/] name1… [path/] nameN
82
The problem with the previously discussed file commands is that your are required to type filenames exactly E.g. If you wanted to delete 100 files, then you must do one of the following:
Execute 100 rm commands each with a single filename Execute 1 rm command with 100 filenames
83
will match any string characters.
wild card *
84
ls t* rm a*c rm *
lists all file that begin with a 't’ in the present working directory removes all files that begin with 'a' and end in 'c’ removes all files in the present working directory
85
will work with any command line program, its part of the shell, not a particular program like or rm.
The wild card
86
To obtain more information about any Unix command, issue the command:
man
87
What if you don't know the name of a command but have an idea of the function it performs? This command will query a system database using a keyword to identify an appropriate command .
apropos
88
To clear standard output of all text, issue this command:
clear
89
PHP is the:
PHP hypertext processor
90
PHP was developed by: When:
Rasmus Lerdorf (Apache group/ written in PERL) In 1995
91
PHP predecessor was:
PHP/IF (Personal home page/ forms interpreter)
92
PHP is primary use is for:
server-side scripting
93
PHP scripts can be embedded within:
html documents
94
How does PHP work:
The server processes the html document executing the PHP segments substituting the output within the html document
95
specifies a document at a specific web address (URL) that is desired
client
96
If the document is ______ or _____, then the server simply forwards it back to the client The document is then rendered in the:
.html .txt client's browser
97
if the requested HTML doc has embedded PHP or the file is a *.php file, the server:
executes the PHP, replacing the PHP code with its output in the document
98
The last step of PHP is that the modified HTML document is then sent to the:
Client
99
Will the web client ever actually see PHP code?
NO
100
The server may access files whose names ________________, or preprocessing data that it does not want the client to see
should not be seen
101
The only reason the client even knows PHP is involved is due:
to the file extension .php, but even this is not required if the server is configured correctly
102
PHP, like JavaScript , is a:
fully functional programming language
103
PHP has an incredible number of built-in features , including:
-Forms processing -Output / generate various types of data ( not just text) -Database access -Object-oriented features
104
Within an HTML document or PHP document, the "”part is called: We can call any part of the file between “" the:
processing instruction PHP portion
105
All PHP programs have access to a large number of:
predefined variables
106
These variables allow the script access to server information, form parameters environment information, etc
Predefined variables
107
- An array containing much information about the server - An array containing variables passed to a script via HTTP POST - An array containing cookies
$_SERVER $ POST $_COOKIE
108
is a PHP built in function that returns information about the PHP server, including information about the predefined variables
phpinfo();
109
All PHP statements must be followed by a:
semicolon
110
There are three styles of comments in a PHP program:
// the rest of the line is a comment # the rest of a line is a comment /* this is a comment * /
111
PHP provides two language constructs to output to the screen:
1. print() 2. echo()
112
For print and echo the ___ can be omitted Both prints out it’s argument which is a:
() String
113
What is the difference between echo and print?
echo has been shown to execute slightly faster than print
114
There exist four commonly used PHP scalars (data types ):
1. Boolean 2. Integer 3. Float 4. String
115
Could call it a double since we don’t declare variables, this works:
Float
116
Double quoted allows for more escape sequences and allows variables to be:
interpolated into the string
117
What does “interpolated into the string” mean?
rather than outputting the name of the variable, we output its contents
118
All PHP variables names begin with: After that, variable names can begin with: Otherwise rules are similar to most other languages
$ underscore
119
PHP Variables Variables are: No type: Variables are _________ or __________ Type information is obtained from the:
dynamically typed declarations BOUND or UNBOUND current bound value
120
Division (/) in PHP is always floating point division! To get integer division , we must:
cast to int
121
The inequality operators(>=, <=)do not compare strings. Instead, they will cast strings into __________ before comparing To compare strings , use the C-like string comparison function:
numbers strcmp()
122
Comparing a string and an int Any non-numeric PHP string value will equal: Any numeric PHP string will equal:
0 the number it represents
123
Comparing a string and a Boolean A regular PHP string value will "equal": “0" string will equal:
true false
124
PHP allows for an alternative syntax to designate a block in the:
if, while , for and switch statements
125
is a set of protocols implemented by Web servers that interact with web browsers
Common Gateway Interface (CGI)
126
is used to allow data transfer between the client and the server
CGI
127
Two best known CGI methods:
1. GET 2. POST
128
Appends the user's input to URL And the server parses the URL
GET
129
Sends data as a stream to action program. Is more suitable for large amounts of data. Arguments are not shown in URL address
POST
130
GET and POST are both used within _______ forms The user enters data into the form and then _________ the form
HTML Submits
131
When forms are submitted, the server executes the _________, returning the resulting _______
PHP script html
132
Servers can be set so that the form variables can be accessed directly by simply using the:
$ sign
133
While using the $ sign would suffice it is better to access the variables from the _______ array or the _______ array
$_POST $_GET
134
We can also use PHP to create _______. However, it is really just HTML that we are creating.
forms
135
What is XML? When was it developed?
eXtensible Markup Language that is a simplified version of SGML 1990s
136
What is the current standard of XML?
W3 consortium
137
SGML and XML are similar but there are a few differences:
XML is widely used SGML is not so widely used
138
XML was designed to __________ data and to focus on what data ___ XML is about ___________ data! XML is __________!!!
describe/is describing passive
139
HTML was designed to ________ data and to focus on how data _______ HTML is about ____________ data! HTML is ________!!!
display/looks displaying active
140
XML _______ designed to describe data! XML ________designed to display data! XML ________ a replacement for HTML!
was was not is not
141
5 reasons to use XML:
1. Separates data from display 2. A means to store and exchange data between applications 3. Repurpose data in multiple formats 4. Create new markup languages 5. Validate document content
142
XML is designed to be a __________ way to ___________________ between applications or store information
portable exchange information
143
XML provides the means to create _________________ that you will use to move data between the applications you create
containers (i.e. files)
144
Is a direct derivation of XML
XHTML
145
For all XML applications, the __________ data will be stored in a database.
Original
146
Other markup languages are also XML derivations such as:
Bioinformatics Sequence Markup Language(BSML) Mathematical Markup Language(MathML) Chemistry Markup Language CML
147
A generic tool known as an ___________ can validate that documents ("instances) contain what they are supposed to contain.
XML parser
148
There are now many XML "spin-off standards ___________for defining the contents of XML documents exactly ___________for style sheets and transformation
XML Schema XSLT
149
XML is a _____________, which allows you to describe a set of " elements " ( i.e. tags or markers ) in a textual document to give it a structure that can be " processed "
meta-language
150
XML elements have the following structures:
content OR
151
XML can refer to TWO types of files, both of which describe the "element" set (i.e. the structure ) of an XML document:
1. Document Type Definition (DTD) 2. XML Schema
152
Element __________ can include other elements
content
153
All XML documents ("XML instances") contain one:
top-level element
154
Recall the ________ is top-level element in all HTML documents
155
An element can have many attributes, and they can be __________ or __________ Element names and attribute names are:
required or optional case-sensitive
156
You could choose to define the header using XML attributes instead of an: This choice is made when designing the XML document type, and is typically driven by considerations of how the data will be:
sub-elements processed
157
An XML document is said to be ___________ if it conforms to the seven rules shown on the next slides
well- formed
158
An XML document is said to be valid if it is ____________ AND __________ to the user-defined content rules in a Document Type Definition or XML Schema
well-formed conforms
159
defines the allowable elements for an XML document: provide functionality similarly, but is more powerful:
Document Type Definition (DTD) XML Schema
160
Valid implies: XML document can be _________, yet not valid
Well-formed Well-formed
161
Can an XML instance contain elements from two or more XML documents definitions?
Yes !!! However, we need to address the issue of XML namespaces to make sure element name conflicts do not occur
162
What is the solution to element name conflicts?
Solution: Name Prefix Preceded each "conflict" element name with a name prefix namePrefix:elementName
163
if you use name prefixes, you must also define a __________ for each name prefixes you use
namespace xmlns:namePrefix=“URI”
164
defines the location of an XML document definition
namespace
165
The Uniform Resource Identifier (URI) can be one of the following:
Uniform Resource Name (URN) Uniform Resource Locator (URL)
166
allow you use elements from two or more XML document definitions, and avoid element name conflicts
XML namespaces
167
used to define DTD elements: used to defined DT element attributes:
168
means the string of character data is passed by the parser to an application unmodified
#CDATA
169
means the string of character data may contain parsed character data; E.g. <, >, &
#PCDATA
170
specifies the element attribute is optional specifies the element attribute is required
#IMPLIED #REQUIRED
171
specifies the element attribute (if present) must have the given this value If the element attribute is not present, this value will be used.
#FIXED