CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Linux
Comments
Question
What file contains the list of port numbers (and associated names) monitored by inetd?
Options
A. /etc/services
B. /etc/nsorder
C. /etc/nsswitch.conf/
D. /etc/hosts
E. None of the above
Correct Answer
/etc/services
Linux problems
Search Results
1. How many class A, B and C network IDs can exist?
Options
A. 128
B. 126
C. 16,382
D. 2,113,658
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: 2,113,658
2. Which of the following tool allows you to change your default X Window desktop?
Options
A. switchdesk
B. intrc
C. xinitre
D. Xchange
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: switchdesk
3. What package group will you select during the custom configuration to enable the machine to communicate with Windows clients?
Options
A. SMB (Samba) Connectivity
B. IPX/NetWare Connectivity
C. Dial-up Workstation
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SMB (Samba) Connectivity
4. Which of the following commands is used to display the filenames in multiple columns?
Options
A. ls
B. ls -1
C. ls -x
D. lc
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: ls -x
5. Which command is used to terminate all processes in your own system except the login shell?
Options
A. kill 1
B. kill 0
C. cancel all
D. cancel 1
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: kill 0
6. What layer protocol is responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Options
A. Layer 4 protocols
B. Layer 5 protocols
C. Layer 6 protocols
D. Layer 7 protocols
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: Layer 7 protocols
7. What command can be used to get information about yourself?
Options
A. which
B. pwd
C. i /4
D. who am i
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: who am i
8. Which of the following command can be used to rename a file in UNIX?
Options
A. ren
B. mv
C. remove
D. change
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: mv
9. The location of some system configuration and system administrator executable files, is:
Options
A. /home
B. /proc
C. /var
D. /sbin
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: /sbin
10. What types of installations require a special boot disk?
Options
A. NFS
B. FTP
C. PCMCIA
D. All of the above
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: All of the above
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT