logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Unix Comments

  • Question
  • The command used to compare the files is known as


  • Options
  • A. comp
  • B. cmp
  • C. do
  • D. ccp
  • E. None of the above

  • Correct Answer
  • cmp 


  • Unix problems


    Search Results


    • 1. Which column contains all details of the permissions of a file when you issue the ls -l command?

    • Options
    • A. second
    • B. fourth
    • C. third
    • D. first
    • E. None of the above
    • Discuss
    • 2. Which command is used to remove the read permission of the file 'note' from both the group and others?

    • Options
    • A. chmod go+r note
    • B. chmod go+rw note
    • C. chmod go-x note
    • D. chmod go-r note
    • E. None of the above
    • Discuss
    • 3. The agency that sits between the user and the UNIX system is called the

    • Options
    • A. logic
    • B. profile
    • C. shell
    • D. erxc
    • E. None of the above
    • Discuss
    • 4. Which symbol will be used with grep command to match the pattern pat at the beginning of a line?

    • Options
    • A. ^pat
    • B. $pat
    • C. pat$
    • D. pat^
    • E. None of the above
    • Discuss
    • 5. Which of the following commands is used to obtain a list of all files by modification time?

    • Options
    • A. ls -1
    • B. ls -t
    • C. ls -i
    • D. ls -R
    • E. None of the above
    • Discuss
    • 6. The % key allows you

    • Options
    • A. to move the cursor to a matching delimiter, when a delimiters a parenthesis, a bracket, or a brace.
    • B. to move the cursor to the upperleft corner of the screen
    • C. to move the cursor backward to the beginning of a word
    • D. to move the cursor to the first column in the current line
    • E. None of the above
    • Discuss
    • 7. What command is used to count the total number of lines, words, and characters contained in a file?

    • Options
    • A. countw
    • B. wcount
    • C. wc
    • D. count p
    • E. None of the above
    • Discuss
    • 8. What protocol(s) is(are) allowed a user to retrieve her/his mail from the mail server to her/his mail reader?

    • Options
    • A. POP3
    • B. FTP
    • C. MAP
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. Which of the following NIS clients, finds and stores information about an NIS domain and server?

    • Options
    • A. ypwhich
    • B. ypbind
    • C. ypcat
    • D. yppoll
    • E. None of the above
    • Discuss
    • 10. Layer one of the OSI model is

    • Options
    • A. network layer
    • B. transport layer
    • C. link layer
    • D. physical layer
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment