CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Linux
Comments
Question
What service is not monitored by inetd?
Options
A. SSH
B. time
C. ntalk
D. finger
E. None of the above
Correct Answer
SSH
Linux problems
Search Results
1. The IP address are based on
Options
A. 16-bit addresses
B. 32-bit addresses
C. 64-bit addresses
D. 8-bit addresses
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: 32-bit addresses
2. What shell's wild-card is used to match a single character?
Options
A. [!ijk]
B. [ijk]
C. ?
D. *
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: ?
3. To create an installation boot floppy disk from Linux (or another Unix) machine, what command could you use?
Options
A. fdisk
B. fsck
C. dd
D. rawrite
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: dd
4. What command is used to halt a Linux system?
Options
A. init 0
B. Shutdown -t
C. Shutdown -g -y0
D. Ctrl+Alt+Del
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: init 0
5. What command is used to compare the files?
Options
A. ccp
B. du
C. cmp
D. comp
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: cmp
6. What TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Options
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SMTP
7. You just added a new user, kara, to the system. What group is kara added to by default?
Options
A. root
B. kara
C. group
D. user
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: kara
8. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?
Options
A. chmod go + x, u - x letter
B. chmod g - x, uo + r letter
C. chmod go + r, u + x letter
D. chmod u - x, go + r letter
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: chmod u - x, go + r letter
9. Which program is used to automatically install Red Mat Linux on identical hardware?
Options
A. bzimage.img
B. tar
C. ghost
D. mkkickstart
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: mkkickstart
10. What command do you use to delete a file?
Options
A. rename
B. delete
C. rm
D. cp
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: rm
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT