Final Exam Flashcards

1
Q

In the FHS, the ____ directory contains the Linux kernel and files used by the boot loader.

1) /load
2) /bin
3) /boot
4) /mnt

A

3) /boot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In the FHS, the ____ directory is the root user’s home directory.

1) /bin
2) /home
3) /boot
4) /root

A

4) /root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the FHS, the ____ directory contains most system commands and utilities.

1) /usr
2) /root
3) /bin
4) /home

A

1) /usr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Copying a file can be accomplished using the ____ command.

1) copy
2) mv
3) cp
4) cpy

A

3) cp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The ____ command takes a list of arguments specifying the absolute or relative pathnames of files to remove.

1) del
2) rm
3) remove
4) delete

A

2) rm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The fastest method to search for files in the Linux directory tree is to use the ____ command.

1) search
2) id
3) find
4) locate

A

4) locate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can see the contents of a certain variable in memory by using the ____ metacharacter with the echo command.

1) $
2) *
3) &
4) #

A

1) $

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ____ section of a filesystem is the section that contains information about the filesystem in general.

1) inode table
2) inode
3) data blocks
4) superblock

A

4) superblock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

To create a hard link, you must use the ____ command.

1) ln
2) link
3) lnk
4) lk

A

1) ln

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The chgrp command takes ____ argument(s) at minimum.

1) one
2) two
3) three
4) four

A

2) two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The section of an inode that stores permissions is called the ____ of the file.

1) tail
2) head
3) mode
4) accessor

A

3) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a file’s mode, if a permission is unavailable, a(n) ____ character replaces its position in the mode.

1) *
2) +
3) ?
4) -

A

4) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

If a user has ____ permission for a file, they can open, read, and edit the contents of a file.

1) write
2) execute
3) read
4) alter

A

1) write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When using the chmod command for a specific file, the ____ argument would add read permission and remove write permission for the group permissions.

1) u+r+w
2) g-r+w
3) g+r-w
4) o+r-w

A

3) g+r-w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When using the chmod command, the mode rwx can be represented by the number ____.

1) 0
2) 1
3) 7
4) 8

A

3) 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To set all of the special permissions on a certain file or directory, you can use the command ____, where name is the name of the file or directory.

1) chmod 777 name
2) chmod 7777 name
3) chmod 6666 name
4) chmod 0000 name

A

2) chmod 7777 name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Each SCSI device is assigned a unique ID number known as a(n) ____.

1) device ID
2) target ID
3) SCSI number
4) SCSI controller

A

2) target ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Most Parallel SCSI controllers support up to ____ devices.

1) 12
2) 13
3) 14
4) 15

A

4) 15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The highest priority SCSI device is given a SCSI ID of ____.

1) 1
2) 6
3) 7
4) 15

A

3) 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The ____ standard support speeds of up to 80 MB/second.

1) SCSI-3 Ultra2 Wide
2) SCSI-2 Wide
3) SCSI-3 Ultra
4) SCSI-3 Ultra3 Wide

A

1) SCSI-3 Ultra2 Wide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RAID level ____ is often referred to as disk mirroring.

1) 1
2) 2
3) 3
4) 4

A

1) 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RAID level ____ is commonly referred to as disk striping with parity.

1) 0
2) 1
3) 5
4) 6

A

3) 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Fedora 13 CD installation requires ____ CDs.

1) two
2) four
3) six
4) ten

A

3) six

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.

1) setup
2) startup
3) kickstart
4) scriptstart

A

3) kickstart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program. 1) * 2) # 3) $ 4) %
2) #
26
If a Linux installation ends abnormally and the screen displays a "fatal signal ____" error message, it indicates an error known as a segmentation fault. 1) 0 2) 1 3) 10 4) 11
4) 11
27
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders. 1) 256 2) 512 3) 1024 4) 2048
3) 1024
28
____ installation log file(s) is/are created by the Fedora installation program. 1) One 2) Two 3) Three 4) Four
2) Two
29
To verify hardware settings, you can examine the contents of the ____ directory. 1) /log 2) /root 3) /proc 4) /hw
3) /proc
30
To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file. 1) /proc/mem 2) /proc/cpuinfo 3) /proc/memoryinfo 4) /proc/meminfo
4) /proc/meminfo
31
The ____ file in the /proc directory contains a list of memory address ranges reserved for device use. 1) meminfo 2) ioports 3) iomem 4) misc
2) ioports
32
The ____ file in the /proc directory contains statistics on the performance of the processor. 1) cpuinfo 2) modules 3) kcore 4) loadavg
4) loadavg
33
Devices that transfer data in a character-by-character fashion are referred to as ____ devices. 1) text 2) block 3) character 4) binary
3) character
34
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave). 1) /dev/hdc1 2) /dev/hdb1 3) /dev/hda1 4) /dev/hdc2
2) /dev/hdb1
35
The ____ device file represents the second serial port on the system (COM2). 1) /dev/ttyS0 2) /dev/tty2 3) /dev/tty1 4) /dev/ttyS1
4) /dev/ttyS1
36
If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name. 1) /dev/MAKEDEV 2) mkfs 3) mknod 4) /dev/makedevice
1) /dev/MAKEDEV
37
The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive. 1) ntfs 2) udf 3) ext2 4) hpfs
2) udf
38
The ____ filesystem contains most of the operating system files. 1) boot 2) data 3) mnt 4) root
4) root
39
To format a filesystem with a specified filesystem type, you can use the ____ option with the mkfs command. 1) -t 2) -f 3) -c 4) -o
1) -t
40
CD-ROMs typically use the ____ filesystem type. 1) ntfs 2) ext2 3) iso9660 4) ext3
3) iso9660
41
Linux requires ____ partition(s) at minimum. 1) one 2) two 3) three 4) four
2) two
42
Data is read off of hard disks in concentric circles called ____. 1) tracks 2) blocks 3) sectors 4) cylinders
1) tracks
43
To create partitions after installation, you can use the ____ command. 1) format 2) formatdisk 3) fdisk 4) partition
3) fdisk
44
The easiest method for monitoring free space by mounted filesystems is to use the ____ command. 1) df 2) fs 3) dfs 4) fd
1) df
45
Errors on a filesystem are often referred to as filesystem ____ and are common on most filesystems. 1) breaks 2) corruption 3) degradation 4) failures
2) corruption
46
To check a filesystem for errors, you can use the ____ command, which can check filesystems of many different types. 1) fcheck 2) fsc 3) fscheck 4) fsck
4) fsck
47
You can edit the quotas for certain users by using the ____ command. 1) edquota 2) editquota 3) quota 4) repquota
1) edquota
48
To mount all filesystems in the /etc/fstab file that are intended to mount at boot time, you can simply type the ____ command. 1) mount -o 2) mount -f 3) mount -u 4) mount -a
4) mount -a
49
A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device. 1) system service 2) graphical user interface 3) user interface 4) device driver
4) device driver
50
The ____ indicates the stability of a Linux kernel. 1) major number 2) production kernel 3) minor number 4) revision number
3) minor number
51
The concept of ____ enables software developers to read other developers' source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further. 1) Open Source Software 2) Linux 3) Closed Source Software 4) Freeware
1) Open Source Software
52
The ____ stipulates that the source code of any software published under its license must be freely available. 1) Artistic License 2) GNU General Public License 3) Free Software Foundation 4) Freeware
2) GNU General Public License
53
____ is software that is distributed free of charge, but the source code is not available. 1) Open source software 2) Close source software 3) Freeware 4) Shareware
3) Freeware
54
Consider the phrase "collaboration between several developers with a common need speeds up software creation, and when bugs in the software are found by these users, bug fixes are created very quickly" from the chapter. This statement describes which advantage of the Linux operating system? 1) Ease of customization 2) Flexibility for different hardware platforms 3) Risk reduction 4) Stability and security
4) Stability and security
55
HOWTO documents are centrally collected by the ____. 1) Linux Documentation Project 2) GNU project 3) Free Software Foundation 4) Linux User Groups
1) Linux Documentation Project
56
Which of the following is the greatest expense for companies using Linux? 1) Software upgrades 2) Additional software 3) Hiring people to maintain the Linux system 4) Operating system cost
3) Hiring people to maintain the Linux system
57
Solaris, HP-UX and AIX are all ____ of Unix. 1) versions 2) flavors 3) types 4) instances
2) flavors
58
The source code for Linux was released in ____. 1) 1987 2) 1990 3) 1991 4) 1993
3) 1991
59
The core component of the GUI in Linux is referred to as ____. 1) GNOME 2) KDE 3) Red Hat 4) X Windows
4) X Windows
60
A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system. 1) package manager 2) DBMS 3) tarball 4) router
3) tarball
61
____ Linux is the most common Linux distribution used today. 1) Red Hat 2) Debian 3) Mandrake 4) SuSE
1) Red Hat
62
A(n) ____ service provides an efficient method for transferring files over the Internet. 1) FTP 2) DNS 3) Web 4) Mail
1) FTP
63
A(n) ____ service allows users to post messages in forums. 1) FTP 2) News 3) Web 4) DNS
2) News
64
Companies and institutions using computers to perform extraordinarily large calculations that would be unsuitable for most computers would employ a(n) ____. 1) scientific/engineering workstation 2) application server 3) supercomputer 4) office workstation
3) supercomputer
65
Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information. 1) preinstallation checklist 2) hardware compatibility checklist 3) software components list 4) minimum hardware requirements list
1) preinstallation checklist
66
____ is the most common method of installing Linux. 1) Installation from a DVD 2) Installation from an NFS server across the network 3) Installation from packages located on the hard disk 4) Installation from CD-ROM media
1) Installation from a DVD
67
During Linux installation, you need to configure a minimum of ____ user account(s). 1) one 2) two 3) three 4) four
2) two
68
Hard disks can contain a maximum of ____ major partitions 1) 4 2) 8 3) 16 4) 32
1) 4
69
The recommended size for the /home directory is ____ per user. 1) 100 MB 2) 200 MB 3) 500 MB 4) 1000 MB
2) 200 MB
70
The ____ filesystem is compatible with the Windows FAT filesystem. 1) ext3 2) REISER 3) ext2 4) VFAT
4) VFAT
71
The ____ directory contains system commands and utilities. 1) /opt 2) /var 3) /boot 4) /usr
4) /usr
72
In Linux, a(n) ____ is used to accept input from the user and pass the input to the kernel for processing. 1) processor 2) user interface 3) swap memory 4) shell
4) shell
73
The shell that is used by default in Linux is the ____ shell. 1) BASH 2) root 3) gdm 4) command line
1) BASH
74
____ are specific letters that start with a dash ("-"). 1) Arguments 2) Options 3) Keywords 4) Metacharacters
2) Options
75
Which Linux command displays your login name? 1) who 2) whoami 3) id 4) w
2) whoami
76
Which Linux command gets you out of your current shell? 1) exit 2) stop 3) reset 4) clear
1) exit
77
The command that displays the calendar for the current month is ____. 1) date 2) cal 3) w 4) id
2) cal
78
The ____ metacharacter indicates background command execution. 1) @ 2) ^ 3) & 4) !
3) &
79
____ is the metacharacter for command termination. 1) \ 2) & 3) ; 4) |
3) ;
80
To find all of the commands that have the word "list" in their name or description, you would type ____. 1) man -j list 2) man -k list 3) man -l list 4) man -m list
2) man -k list
81
The ____ command will confirm the system directory that you are currently in. 1) dir 2) pwd 3) whereami 4) ld
2) pwd
82
The ____ metacharacter can also be used to refer to the current user's home directory. 1) ~ 2) @ 3) & 4) #
1) ~
83
To move from the /home/joe/test/data to the /home/joe directory, use the ____ command. 1) cd .. 2) cd ../.. 3) /home/joe 4) cd ./..
2) cd ../..
84
If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information. 1) Alt 2) Tab 3) Ctrl 4) Esc
2) Tab
85
Most files on a Linux system that contain configuration information are ____ files. 1) system 2) directory 3) text 4) program
3) text
86
To view a list of files and their type, use the ____ switch to the ls command. 1) -T 2) -L 3) -F 4) -l
3) -F
87
The ____ symbol indicates a linked file. 1) @ 2) * 3) & 4) =
1) @
88
The ____ command can be used to provide a long listing for each file in a certain directory. 1) ls -T 2) ls -L 3) ls -F 4) ls -l
4) ls -l
89
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4? 1) 1-4 2) [1-4] 3) [1234] 4) [1,2,3,4]
2) [1-4]
90
To display the contents of a file called data, use the command ____. 1) disp data 2) ls data 3) ls -l data 4) cat data
4) cat data
91
The ____ command displays the last five lines of a text file. 1) end -5 2) head -5 3) stop -5 4) tail -5
4) tail -5
92
Which is an extended regular expression metacharacter? 1) . 2) [...] 3) * 4) {}
4) {}
93
The ____ regular expression metacharacter matches 0 or more occurrences of the previous character. 1) * 2) ? 3) +
1) *
94
Which of the following key combinations, commonly used in the vi editor command mode, displays current line statistics? 1) $ 2) x 3) Ctrl+g 4) P
3) Ctrl+g
95
The ____ can be used with LISP artificial intelligence programming language and supports hundreds of keyboard functions like the vi editor. 1) Kedit editor 2) Mcedit editor 3) Emacs editor 4) Nedit editor
3) Emacs editor
96
The ____ editor is functionally analogous to the Windows Wordpad and Notepad editors. 1) XEmacs 2) vi 3) Emacs 4) gedit
4) gedit
97
The compression algorithm used by the compress utility has an average compression ratio of ____%. 1) 30-40 2) 40–50 3) 50-60 4) 60-70
2) 40–50
98
When using the compress utility, each file is renamed with a(n) ____ filename extension to indicate that it is compressed. 1) .c 2) .cmp 3) .cpz 4) .Z
4) .Z
99
The ____ command can be used to display the contents of a compressed file. 1) acat 2) zcat 3) cat 4) ccat
2) zcat
100
The average compression ratio for gzip is ____%. 1) 40-50 2) 50-60 3) 60–70 4) 70-80
3) 60–70
101
When used with the compress command, the ____ option can be used to compress symbolic links. 1) -f 2) -c 3) -v 4) -r
1) -f
102
When used with the uncompress command, the ____ option displays the contents of the compressed file to Standard Output. 1) -c 2) -v 3) -f 4) -r
1) -c
103
If no level of compression is specified, the gzip command assumes the number ____. 1) 4 2) 5 3) 6 4) 7
3) 6
104
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed. 1) -c 2) -f 3) -r 4) -l
4) -l
105
The filename extension given to files compressed with bzip2 is ____. 1) .bz 2) .bz2 3) .gz 4) .Z
2) .bz2
106
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames. 1) -a 2) -b 3) -p 4) -n
3) -p
107
The ____ option can be used with the tar command to extract a specified archive. 1) -s 2) -e 3) -x 4) -a
3) -x
108
When using the cpio utility, the ____ option causes a new archive to be created. 1) -n 2) -c 3) -o 4) -a
3) -o
109
You can perform up to ____ different incremental backups using the dump/restore utility. 1) seven 2) eight 3) nine 4) ten
3) nine
110
Most Linux distributions today use ____ as their package manager. 1) RPM 2) PRM 3) MPR 4) RMP
1) RPM
111
The ____ command looks for a Makefile and uses the information within to compile the source code into binary programs using the appropriate compiler program for the local hardware architecture. 1) configure 2) install 3) make install 4) make
4) make
112
To remove a package from the system, you can use the ____ option to the rpm command. 1) -d 2) -e 3) -r 4) -x
2) -e
113
You can restrict who can print to certain printers by using the ____ command. 1) lpadmin 2) lpa 3) lpr 4) admin
1) lpadmin
114
Log files are typically stored in the ____ directory. 1) /dev/log 2) /var/log 3) /boot/log 4) /log
2) /var/log
115
The ____ log file contains information and error messages regarding network access generated by daemons such as sshd and xinetd. 1) wtmp 2) messages 3) dmesg 4) secure
4) secure
116
To convert a system so that it uses an /etc/shadow file to store the encrypted password after installation, you can run the ____ command. 1) passwdconv 2) pwconv 3) passwd 4) pwdcv
2) pwconv
117
You can create user accounts on the Linux system by using the ____ command. 1) uadd 2) usercreate 3) adduser 4) useradd
4) useradd
118
The skeleton directory on most Linux systems is ____. 1) /etc/skel 2) /var/skel 3) /etc/skeleton 4) /var/skeleton
1) /etc/skel
119
To lock an account, you can use the usermod command with the ____ option. 1) -U 2) -u 3) -l 4) -L
4) -L
120
You can specify the ____ option to the userdel command to remove the home directory for the user and all of its contents. 1) -r 2) -d 3) -R 4) -x
1) -r
121
``` To change the primary group temporarily to another group that is listed in the output of the groups and id commands, you can use the ____ command. 1) newgroup 2) groupmod 3) newgrp 4) groupadd ```
3) newgrp
122
A system process that is not associated with a terminal is called a(n) ____ process. 1) daemon 2) user 3) parent 4) startup
1) daemon
123
``` To display an entire list of processes across all terminals and including daemons, you can add the ____ option to any ps command. 1) -f 2) -l 3) -a 4) -e ```
4) -e
124
``` In the output of the ps -l command, the ____ column is the most valuable to systems administrators because it indicates what the process is currently doing. 1) process state 2) process flag 3) process priority 4) PID ```
1) process state
125
The ____ option to the ps command displays all processes that do not run on terminals. 1) -f 2) x 3) a 4) -l
2) x
126
There are ____ different kill signals that the kill command can send to a certain process. 1) 16 2) 32 3) 64 4) 128
3) 64
127
The ____ kill signal stops a process and then restarts it with the same PID. 1) SIGINT 2) SIGQUIT 3) SIGHUP 4) SIGTERM
3) SIGHUP
128
The ____ kill signal terminates a process by taking the process information in memory and saving it to a file called core on the hard disk in the current working directory. 1) SIGINT 2) SIGQUIT 3) SIGKILL 4) SIGTERM
2) SIGQUIT
129
You can execute ____ main types of Linux commands. 1) two 2) three 3) four 4) five
2) three
130
When you append a(n) ____ to a command, the command is run in a background process. 1) & 2) $ 3) # 4) %
1) &
131
When killing a background job with the kill command, you must prefix the background job IDs by a(n) ____. 1) & 2) # 3) $ 4) %
4) %
132
After a background process has been started, it can be moved to the foreground by using the ____ command. 1) b2f 2) fgd 3) fg 4) fgnd
3) fg
133
When there are multiple background processes executing in the shell, the jobs command indicates the most recent one with a(n) ____ symbol. 1) * 2) + 3) - 4) /
2) +
134
Processes are started with a nice value of ____ by default. 1) -20 2) 0 3) 1 4) 19
2) 0
135
To display a list of at Job IDs, you can specify the ____ option to the at command. 1) -l 2) -u 3) -a 4) -d
1) -l
136
The ____ field in a cron table contains the absolute pathname to the command to be executed. 1) first 2) second 3) fifth 4) sixth
4) sixth
137
To create or edit a user cron table, you can use the ____ option to the crontab command. 1) -u 2) -c 3) -f 4) -e
4) -e
138
The Linux kernel is stored in the ____ directory. 1) / 2) /boot 3) /root 4) /krnl
2) /boot
139
____ of the GRUB boot loader typically resides on the Master Boot Record. 1) Stage1 2) Stage1.5 3) Stage2 4) Stage2.5
1) Stage1
140
In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel. 1) image= 2) default= 3) install= 4) root=
1) image=
141
In Linux, runlevel ____ is also known as multiuser mode. 1) 1 2) 2 3) 3 4) 4
2) 2
142
A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off. 1) 0 2) 1 3) 6 4) 7
1) 0
143
After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup. 1) /etc/rc/rc.local 2) /etc/rc.d/local 3) /etc/rc.d/rc.local 4) /etc/rc/local
3) /etc/rc.d/rc.local
144
You can use the ____ command to start, stop, or restart any daemons listed within the /etc/rc.d/init.d directory. 1) daemon 2) manip-daemon 3) service 4) daemon-service
3) service
145
____ is a freely available version of X Windows used in many Linux distributions. 1) X.org 2) XFree 3) FreeX86 4) XFree86
4) XFree86
146
The two most common desktop environments that are used on Linux are ____ and ____. 1) KDE; kwin 2) KDE; Xfce 3) Xfce; GNOME 4) KDE; GNOME
4) KDE; GNOME
147
The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2. 1) kwin 2) twm 3) metacity 4) sawfish
3) metacity
148
If your system uses the X.org implementation of X Windows, the mouse, keyboard, monitor, and video adapter card information is stored in the ____ file in text format. 1) /etc/X11/XF86Config 2) /etc/X11/xorg.conf 3) /etc/X11/xwin.conf 4) /etc/X11/xorg
2) /etc/X11/xorg.conf
149
After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment. 1) xvidtune 2) xvideotune 3) xtune 4) vidtune
1) xvidtune
150
The file descriptor stdin is represented by the number ____. 1) 0 2) 1 3) 2 4) 3
1) 0
151
The file descriptor stderr is represented by the number ____. 1) 0 2) 1 3) 2 4) 3
3) 2
152
You can use the BASH shell to redirect standard output and standard error from the terminal screen to a file on the filesystem using the ____ shell metacharacter followed by the absolute or relative pathname of the file. 1) # 2) 4) |
3) >
153
You can redirect a file to the standard input of a command using the ____ metacharacter. 1) > 2) # 3) | 4) <
4) <
154
The ____ command can be used to replace characters in a file sent via Standard Input. 1) tr 2) rt 3) ts 4) st
1) tr
155
You can send the standard output of one command to another command as standard input using the ____ shell metacharacter. 1) < 2) | 3) > 4) #
2) |
156
The ____ command counts the number of lines, words, and characters in a file. 1) pr 2) nl 3) tr 4) wc
4) wc
157
The ____ command can be used to extract, manipulate, and format text using pattern-action statements. 1) sed 2) grep 3) awk 4) nl
3) awk
158
Most configuration files on Linux systems are delimited using ____ characters. 1) tab 2) colon 3) space 4) semicolon
2) colon
159
To see a list of the environment variables and their current values on a system, you can use the ____ command. 1) env 2) get 3) set 4) setenv
3) set
160
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt. 1) ls $PWD 2) echo #PWD 3) echo $PS1 4) ls #PS1
3) echo $PS1
161
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command. 1) env 2) set 3) setenv 4) getenv
1) env
162
The ____ environment file is always executed immediately after login for all users on the system, and sets most environment variables, such as HOME and PATH. 1) ~/.bash_profile 2) ~/.bash_login 3) /etc/profile 4) ~/.profile
3) /etc/profile
163
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system. 1) read 2) write and read 3) execute 4) read and execute
4) read and execute
164
The ____ escape sequence represents a form feed. 1) \n 2) \f 3) /f 4) /n
2) \f
165
The test statement ____ would be used to determine if A is numerically greater than B. 1) [ A –g B ] 2) [ A –ge B ] 3) [ A –gt B ] 4) [ A +eq B ]
3) [ A –gt B ]