CuriousTab
Search
CuriousTab
Home
Aptitude
Computer
C Programming
C# Programming
C++ Programming
Database
Java Programming
Networking
Engineering
Biochemical Engineering
Biochemistry
Biotechnology
Chemical Engineering
Civil Engineering
Computer Science
Digital Electronics
Electrical Engineering
Electronics
Electronics and Communication Engineering
Mechanical Engineering
Microbiology
Technical Drawing
GK
Current Affairs
General Knowledge
Reasoning
Data Interpretation
Logical Reasoning
Non Verbal Reasoning
Verbal Ability
Verbal Reasoning
Exams
AIEEE
Bank Exams
CAT
GATE
IIT JEE
TOEFL
Jobs
Analyst
Bank PO
Database Administrator
IT Trainer
Network Engineer
Project Manager
Software Architect
Discussion
Home
‣
Computer Science
‣
Linux
Comments
Question
Which program is used to automatically install Red Mat Linux on identical hardware?
Options
A. bzimage.img
B. tar
C. ghost
D. mkkickstart
E. None of the above
Correct Answer
mkkickstart
Linux problems
Search Results
1. What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?
Options
A. chmod go + x, u - x letter
B. chmod g - x, uo + r letter
C. chmod go + r, u + x letter
D. chmod u - x, go + r letter
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: chmod u - x, go + r letter
2. You just added a new user, kara, to the system. What group is kara added to by default?
Options
A. root
B. kara
C. group
D. user
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: kara
3. What TCP/IP protocol is used for transferring electronic mail messages from one machine to another?
Options
A. FTP
B. SNMP
C. SMTP
D. RPC
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SMTP
4. What service is not monitored by inetd?
Options
A. SSH
B. time
C. ntalk
D. finger
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: SSH
5. The IP address are based on
Options
A. 16-bit addresses
B. 32-bit addresses
C. 64-bit addresses
D. 8-bit addresses
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: 32-bit addresses
6. What command do you use to delete a file?
Options
A. rename
B. delete
C. rm
D. cp
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: rm
7. What TCP/IP protocol is used for file transfer with minimal capability and minimal overhead?
Options
A. TELNET
B. TFTP
C. FTP
D. RARP
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: TFTP
8. To build a modularized kernel, the kernel-headers and kernel-source packages must first be installed. Where will you find the kernel-headers and kernel-source?
Options
A. /usr/local
B. /usr/src/linux
C. /usr/sre/redhat
D. /usr/bin
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: /usr/src/linux
9. Which of the following command lists the last 10 lines of a file?
Options
A. grep
B. tail
C. head
D. cat
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: tail
10. What command is used with vi editor to move forward to the end of a word?
Options
A. c
B. d
C. b
D. e
E. None of the above
Show Answer
Scratch Pad
Discuss
Correct Answer: e
Comments
There are no comments.
Enter a new Comment
Save
More in Computer Science:
Artificial Intelligence
Automation System
Computer Fundamentals
Computer Hardware
Database Systems
Digital Computer Electronics
Disk Operating System (DOS)
Electronic Principles
Language Processors
Linux
Management Information Systems
Networking
Object Oriented Programming Using C++
Operating Systems Concepts
System Analysis and Design
Unix
Windows 2000 Server
Windows NT