logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Unix See What Others Are Saying!
  • Question
  • Which command is used to move all files to the bin sub-directory of the parent directory?


  • Options
  • A. mv *.* /bin/
  • B. mv * /bin/*
  • C. mv * ../bin
  • D. mv * ../bin *.*
  • E. None of the above

  • Correct Answer
  • mv * ../bin 


  • More questions

    • 1. The IEEE 802 project of the 1980s involved further defining the lower two layers of the OSI model. A number of standards were agreed upon during that time. Which of the following is the standard for Ethernet?

    • Options
    • A. 802.2
    • B. 802.3
    • C. 802.4
    • D. 802.5
    • E. 802.6
    • Discuss
    • 2. Which of the following best explains the meaning of managerial participation in effective computer utilization is MIS:

    • Options
    • A. managers operate the computer
    • B. need for understanding and support from top management'
    • C. managers need to be educated about computers
    • D. managers need to go through the computers reports.
    • E. None of the above
    • Discuss
    • 3. Which of the following technique is used for Time-To-Line (TTL)?

    • Options
    • A. a technique used in best-effort delivery system to avoid endlessly looping packets.
    • B. a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
    • C. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
    • D. All of the above
    • E. None of the above
    • Discuss
    • 4. If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?

    • Options
    • A. FORMAT command
    • B. DIR command
    • C. VER command
    • D. DISK command
    • E. None of the above
    • Discuss
    • 5. What problem is solved by Dijkstra's banker's algorithm?

    • Options
    • A. mutual exclusion
    • B. deadlock recovery
    • C. deadlock avoidance
    • D. cache coherence
    • E. None of the above
    • Discuss
    • 6. In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and

    • Options
    • A. PC
    • B. synchronous port
    • C. crossover cable
    • D. asynchronous port
    • E. None of the above
    • Discuss
    • 7. What is the primary difference between primary and secondary cell batteries?

    • Options
    • A. Primary-cell batteries can be recharged and used many times, whereas secondary-cell batteries cannot be properly recharged
    • B. Secondary-cell batteries can be recharged and used many times, whereas primary-cell batteries cannot be properly recharged
    • C. Primary-cell batteries use chemical cells, whereas secondary-cell batteries use an alternative energy source, such as thermal or magnetic energy, to supplement their outputs
    • D. Primary-cell batteries must be recharged at a much slower rate that secondary-cell batteries
    • E. None of the above
    • Discuss
    • 8. Procedure development occurs within the

    • Options
    • A. structured design phase
    • B. conversion phase
    • C. system building phase
    • D. maintenance
    • E. None of the above
    • Discuss
    • 9. Which of the following specifies the network address and host address of the computer?

    • Options
    • A. The IP address
    • B. The TCP address
    • C. The subnet mask
    • D. The default gateway
    • E. None of the above
    • Discuss
    • 10. The term "remote job entry" relates to

    • Options
    • A. batch processing
    • B. realtime processing
    • C. transaction processing
    • D. distributed processing
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment