CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Linux
Comments
Question
What shell's wild-card is used to match a single character?
Options
A. [!ijk]
B. [ijk]
C. ?
D. *
E. None of the above
Correct Answer
?
Linux problems
Search Results
1. To create an installation boot floppy disk from Linux (or another Unix) machine, what command could you use?
Options
A. fdisk
B. fsck
C. dd
D. rawrite
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: dd
2. What command is used to halt a Linux system?
Options
A. init 0
B. Shutdown -t
C. Shutdown -g -y0
D. Ctrl+Alt+Del
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: init 0
3. What command is used to compare the files?
Options
A. ccp
B. du
C. cmp
D. comp
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: cmp
4. What command is used to assign executable permission to the owner of the file named "letter"?
Options
A. chmod ugo + x letter
B. chmod u + x letter
C. chmod u + w letter
D. chmod g + x letter
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: chmod u + x letter
5. What command is used to copy a file?
Options
A. tar
B. cpio
C. cp
D. copy
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: cp
6. The IP address are based on
Options
A. 16-bit addresses
B. 32-bit addresses
C. 64-bit addresses
D. 8-bit addresses
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: 32-bit addresses
7. What service is not monitored by inetd?
Options
A. SSH
B. time
C. ntalk
D. finger
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SSH
8. What TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Options
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SMTP
9. You just added a new user, kara, to the system. What group is kara added to by default?
Options
A. root
B. kara
C. group
D. user
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: kara
10. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?
Options
A. chmod go + x, u - x letter
B. chmod g - x, uo + r letter
C. chmod go + r, u + x letter
D. chmod u - x, go + r letter
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: chmod u - x, go + r letter
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT