Sample Paper of Unix( BCA-5 , Bscit-5)

UNIX

1. Unix is an example of

a) Batch processing processing b) Time sharing operating system
c) Real time operating system d) None of the above

2. The program which takes user input, interprets it takes necessary action is
a) Kernel b) System calls c) Shell d) Sheduler
3. The main job of one of the following is to allocate cpu to process
a) Kernel b) Shell c) Sheduler d) Login
4.the function of the unix system calls is to
a) Request for service offered by the operating system kernel
b) Mechanism using which one program can call the other program
c) Signal error conditions d) None of the above

5. In unix, a process is a
a) Program in execution
b) Sub – program which can be called from other program
c) Sequence of command required to run a program
d) None of the above

6. Which of the following is a unix shell
a) Bourne shell
b) Corn shell
c) C shell
d) All of the above
7.in unix,information about a file is stored in a
a) File table
b) Innode
c) File allocation table
d) None of the above
8.unix system calls are used to
a) Inform the system administrator about an abnormal condition
b) Obtain some service from the kernel
c) Execute a unix command form the shell
d) None of the above
9.help about a command can be found in the
a) Man page
b) Human pages
c) Help page
d) Any of the above
10.hidden files in unix can be listed using
a) ls -t
b) Ls –h
c) Ls –a
d) None of the above
11. In unix ,the command to delete all files starting with sg and ending with hj is
a) Rm sg*hj
b) Rm sg?hj
c) Rm –prifix sg –suffix hj
d) None of the above
12. The unix command rm –r project will
a) Delete the file project from the current directory
b) Delete all the files from the directory project
c) Recursively delete the directory project and all its sub directories
d) None of the above
13.unix can have
a) One file system only
b) N file system,if it had n hard disk
c) Any number of file systems depending upon the number of partitions
d) None of the above
14.several unix command can be given on the same line by separating them with characters
a) ;
b) :
c) ,
d) None of the above
15.the unix command “ls | more “ display a list of
a) Files in the current directory one line at a time
b) Files in the current directory one screen at a time
c) All the files in the current directory and the waits for the next command
d) None of the above
16.in unix, full path name originates from
a) Your home directory
b) The root directory
c) Your working directory
d) None of the above
17.suppose that the current directory is /home/user/xyz/prog a possible command to change to a directory
/home/user/abc/letters is all files
a) Cd ../../abc/letters
b) Cd ././abc/letters
c) Cd ./home/user/abc/letter
d) None of the above
18.the chown command in unix changes the
a) Home directory of a user
b) Access permission of a file or directory
c) Priority of a process
d) None of the above
19.the chmod command in unix
a) Changes the current execution status from user mode to kernel mode
b) Makes the file hidden so that it cannot be seen using the ls command
c) Changes the access permission of a file or directory
d) None of the above
20.which of the following commands will give the user read,write,and execute access and other users no
access to the file op.exe?
a) Chmod 660 op.exe
b) Chmod 600 op.exe
c) Chmod 700 op.exe
d) None of the above
21. Which unix command would append a file called test to the end of a file called output?
a) Cat output>> test
b) Append output >>test
c) Write output>>test
d) Cat test >> output
22.which out of the following commands would you use to change your password in unix system?
a) Pass
b) Chpass
c) Passwd
d) Set pass
23.the default shell,which is to be used when a user logs in, is defined in the
a) /etc/passwd file
b) /etc/shell file
c) Startup file in the user home directory
d) None of the above
24.a write permission to a directory allows a user to
a) Edit and create files located in the directory
b) Edit but not create files located in the directory
c) Search a directory for the presence of a file
d) None of the above
25.the execute permission to a file allows a user to
a) Execute the file
b) Edit the file
c) List the contents of the file
d) None of the above
26.to see first 3 lines of a file,we give the command
a) Tail +3
b) Tail –3
c) Head –3
d) Head +3
27.on changing the permission of a file,the following field is modified
a) File access time
b) Inode modification time
c) File access time
d) None of the above
28.write a single line answer,giving the differences between the two command of vi editor,in each case
a) I and i
b) O and o
c) A and a
d) W and w
29.the vi program available under unix can be used to
a) Create plain ascii files
b) Create formatted documents with different font sizes
c) Open a virtual terminal
d) None of the above
30.the zz command is used to
a) Abort a vi session
b) Move the contents of a file to another file
c) Saves the fileand remains in editing mode
d) Quit vi editor after saving
31the default shell which is to be used is given in the
a) /etc/passwd file
b) .exrc file in home directory
c) /ect/shell file
d) None of these
32.to move to the end of a line you have to use.
a) $
b) E
c) E
d) ^
33.we can paste a deleted line using the command.
a) Y
b) Cp
c) P
d) None of the above
34the key mapping can
a) Create macros
b) Assign a key a particular function
c) Create new keys
d) None of the above
35.vi abbreviations are defined in a file called.exerc located in the
a) Shell directory
b) Home directory
c) Bin directory
d) Directory in which vi program is stored
36.which unix commad displays the information contained in a particular file
a) More filename
b) Type filename
c) File filename
d) None of the above
37.almost all computers store characters strings
a) As a sequence of anscii codes binary strings
b) In bcd code
c) As a sequence of intrgers indicating the position of the characters in the alphabetical seuence
d) None of the above
38.the instructions of a program which is currently being executed are stored in
a) Secondary memory
b) Main memory
c) Read – only memory
d) None of the above
39.the default program sh in unix os is
a) Jsh
b) Bourne shell
c) Csh
d) Ksh
40.in unix ,the command to redirect the output of a program to a file called sort.out is
a) Sort sort.out
b) Sort>sort.out
c) Sort->sort.out
d) None of the above
41the : must be used before u give
a) Command mode command
b) Ex mode commands
c) Insert mode command
d) None of the above
42.which unix command would append a file called test to the end of a file called output
a) Cat output >>test
b) Append output>>test
c) Write output>>test
d) Cat test>> output
43.c1|| c2 means
a) C1 is executed if c2 fails
b) C2 is executed if c1 fails
c) C1 and 2 both are executed
d) None of the above
44.the program which takes user input,interprets it and takes necessary action is
a) Kernel
b) System calls
c) Sh
d) Scheduler
45.the unix command “ls| more” displays a list of
a) Files in the current directory one line at a time
b) Files in the current directory ane screen at a time
c) All the files in the current directory and then waits for the next command
d) none of the above
46.in unix system,at any one time
a) Only one process is running
b) Several process are generally running
c) Only in computers having multiple processor,more than one process can be running
d) None of the above
47.the normal way to stop a process is by pressing the following key combinations together.
a) Ctr –z
b) Ctr –s
c) Ctr –d
d) Ctr-c
48.the owner of a process is
a) The shell
b) User that invokes the process
c) All currently logged in users
d) Any one of the currently logged in users
49.pid stands for
a) Process identification number
b) Personnel income department
c) Priority indentificaton number
d) None of the above
50.the default shell,which is to be used when a user-logs in,is defined in the
a) /etc/passwd file
b) /etc/crontab file
c) /etc/shell file
d) Startup file in the user home directory
51.which of the following commands would you use to copy files from a remote unix system to your local
unix system.
a) Cp
b) Finger
c) Telnet
d) Rcp
52.a user can get files from another computer on the internet by using
a) Ftp
b) Http
c) Utp
53.in reality,internet protocol recognizes only
a) A postal mail address
b) A location of the host
c) An ip address
d) None of the above
54.a small network making up the internet and also having a small number of computers within it is called
a) Host
b) Address
c) Subdomain
d) None of the above
55.to use telnet and the host’s resources,you will neet to know
a) Tcp/ip address
b) Electronic address
c) The address of the internet host
d) None of the above
56.to see first three lines of a file f1 we give
a) Head –3 op
b) Tail –3 op
c) Tail +3 op
d) Head +3 op
57.tail +8
a) Copy to 8 lines of the file 1 and copies remaining contents of the file 1 to file2
b) Copy all lines except top 7 lines in the file1 to file2
c) None of the above
58. Several UNIX or Linux command can be given on the same line by separating them with the character
a) Dot
b) Semicolon
c) Colon
d) None of the above
59. Which of the following commands would u use to copy files from a remote unix or linux system to your
local system
a) Cp
b) Finger
c) Telnet
d) Internet
60. The zz command is used to
a) Abort a vi session
b) Move the contents of a file to another
c) Save the file and remain in editing mode
d) Quits vi after saving
61. what is command of pwd
a) Present working directory
b) Previours working directory
c) Past working directory
d) None of the above
61.how to create make directory.
a) Mkdir
b) Mddir
c) Madedir
d) Make directory
62.ls –a to show
a) Listing file
b) Hidden file
c) Reverse file
d) Time order file
63.if u want to create make a file which command is used
a) Cat > filename
b) Cat c) Cat >>filename
d) Cat <64.more command is used
a) Show one line print
b) Show two line print
c) Show one page on the screen
d) None of the above
65.who command is used
a) Single user
b) Doble user
c) Currenty login user
d) None of the above
66. If u want to rename of particular file
a) Rename command is used
b) Mv command is used
c) Rn command is used
d) None of the above
67.if u want to delete all file as well as directory
a) Rm command is used
b) Rm –r command is used
c) Remove command is used
d) None of the above
68. Process is an ______ entity.
A. Active
B. Passive
C. Both of the above
D. None of the above
69. Program is a ______ entity.
A. Active
B. Passive
C. Both of the above
D. None of the above
70. When one executes a program the ______ creates a new process.
A. Cpu
B. H/w
C. Os
D. None of the above
71. When one exits from program, the process ________
A. Terminates
B. Starts
C. Both of the above
D. None of the above
72. Operating system acts as a ______ for the system.
A. Resource allocator
B. Government
C. Both of the above
D. None of the above
73. A piece of h/w is a _______
A. Printer
B. Resource
C. Both of the above
D, none of the above
74. When you turn on the computer ______ management works.
A. H/w mgmt
B. Process mgmt
C. Both of the above
D. None of the above
75. While executing an application ______ management works.
A. H/w mgmt
B. Process mgmt
C. Both of the above
D. None of the above
76. One of the three vital components of a system are hardware application and _______.
A. Os
B. Word
C. Excel
D. All of the above
77. Operating system _______he hardware and applications.
A. Manages
B. Manages and controls
C. Controls
D. All of the above
78. When buying a computer one must have.
A. H/w & os
B. Os
C. S/w
D. None of the above
79. When system is turned on the operating system performs a series of tasks presented in _______ order.
A. Decreasing
B. Chronological
C. All of the above
D. None of the above
80. One of the first things one do, after successfully plugging together a plethora of cables and components is
_______ your system.
A. Turn off
B. Switch off
C. Turn off
D. None of the above
81. Most_________ do some hardware initialization but not much.
1. Boot ram’s
2. Boot sector
3. Boot rom’s
4. None of the above
82. When an application waits for data, waits while other process runs, and one
quits………………….management works.
A. H?w mgmt
B. Process mgmt
C. All of the above
D. None of the above
83. When an application reads a tape, displays data on screen, whites data to tape, turn off the
computer…………….mgmt works.
A. H/w mgmt.
B. Process mgmt.
C. All of the above
D. None of the above
84. Unix layers b/w h/w and …………
A. Applications
B. S/w
C. Both of the above
D. None of the above
85. Difference b/w unix and other os is in………and the interface
A. Look
B. Implementation
C. Both the above
D. None of the above
86. Unix user needs to be familiar with………….only
A. Interface
B. Implementation
C. Both of the above
D. None of the above
87. Unix user need not to be familiar with………..
A. Interface
B. Implementation
C. Both of the above
D. None of the above
88. Unix was developed in…………..
A. 1972
B. 1971
C. 1970
D. 1973
89. ……………commands save times
A. Unix
B. Cryptic
C. Both the above
D. None of the above
90. At the center of the unix onion is a program called………….
A. Shell
B. Kernel
C. Both of the above
D. None of the above
91. ………allocates memory
A. Shell
B. Kernel
C. Both of the above
D. None of the above
92. Shell acts as a …………..
A. Command interrupter
B. Command learner
C. Both of the above
D. None of the above
93. Unix issues commands through…………..
A. System calls
B. System call backs
C. Both of the above’
D. None of the above
94. When you press return then which type of process is executed to undo the command
A. Background
B. Foreground
C. Null
D. None of the above
95. Unix allows to run _______ process at once.
A. 1
B. 2
C. More than once
D. None
96. To run a long program it would be better to run that process in _______.
A. Foreground
B. Background
C. None of the above
D. All of the above
97. How do you submit a process to run is background.
A. Add $
B. Add &
C. Add !
D. Add |
98. To terminate any foreground process press ______.
A. Ctrl + z
B. Ctrl + x
C. Ctrl + c
D. Ctrl + v
99. To display the process currently running give _______.
A. Pid command
B. Ps command
C. None of the above
D. All of the above
100. Kill is appended with _____ to terminate a process.
A. -7
B. -8
C. -9
D. -10
101. Ctrl + z terminates the process ________.
A. Temporarily
B. Permanently
C. For a second
D. None of the above
102. ________ command is used to list any command that contains the keyboard given.
A. Man
B. Man-d
C. Apropos
D. None
103. To list the environment variables and their values use _____ command.
A. Echo
B. Setenv
C. Env
D. None of the above
104. To print the value of an environment variable append __ symbol before variable name.
A. &
B. $
C. !
D. %
105. To set the value of environment variable use ______ command.
A. Setenv
B. Env
C. Echo
D. None of the above
106. To undefined and unset an environment variable use ______ command.
A. Setenv
B. Env
C. Unsetenv
D. None of the above
107. Environment variables are set, used and handled varies with _______.
A. Kernel
B. Shell
C. History
D. None of the above
108. In layerd architecture of unix ______ component is above the hardware.
A. Standard libraries
B. File system & process control
C. Standard applications
D. Other applications
109. Unix system views each device as a _______.
A. Directory
B. Device
C. File
D. None of the above
110. ______ is the process of starting up a computer from a halted or powered down condition.
A. Bootstrapping
B. Loading
C. Both a & b
D. None of the above
111. When the computer is switched on, it activates the memory resident code which resides in ________.
A. Memory
B. Ram
C. Cpu board
D. None of the above
112. Bootstrapping is also known as _______.
A. Hot boot
B. Cold boot
C. Warm boot
D. All of the above
113. Bootstrap procedure is _______ dependent.
A. Software
B. Hardware
C. Both a $ b
D. None of the above
114. Most unix systems implement a _______ loading process.
A. One stage
B. Three stage
C. Two stage
D. Four stage
115. To set the priority for real-time processes use ________.
A. Swapper
B. Sched
C. Both a & b
D. None of the above
116. _______ runs as process o on bsd.
A. Swapper
B. Sched
C. Init
D, none of the above
117. ________ process always remains in the background when system runs.
A. Swapper
B. Sched
C. Init
D, none of the above
118. Single uses shell is a always ______ shell.
A. K-shell
B. Bourne
c. C-shell
d. None of the above
119. Startup scripts are ______ scripts.
A. Shell
B. Kernel
C. Both a & b
D. None of the above
120. _________ spawns a copy of shell to interpret shell scripts.
A. Swapper
B. Sched
C. Init
D. None of the above
121. ________ specifies the shell command to be run.
A. Program
B. Process
C. Both a & b
D. None of the above
122. To create the user use ________ command.
A. Adduser
B. Useradd
C. Create user
D. None of the above
123. To create a group use ______ command.
A. Addgroup
B. Groupadd
C. Create group
D. None of the above
124. To delete user use ________ command.
A. Userdel
B. Deluser
C. Delete user
D. User delete
125. To change the password use _________ command.
A. Passwd
B. Password
C. Change password
D. None of the above
126. Advantage of unix standard interface is _______.
A. Application usability
B. Application portability
C. None of the above
D. Both a & b
127. To count all the words in all the files, type ______ command.
A. Wc-a
B. Wc
C. Wc
D. None of the above
128. Output of one command can be used as input of another command using
________.
A. Filters
B. &
C. Pipeline
D. None of the above
129. Each command has actions can be controlled with _______.
A. Methods
B. Options
C. Argument
D. None of the above
130. The meaning of the characters in a file is entirely supplied by _
_______ that uses the file.
A. Shell
B. Kernel
C. Command
D. None of the above
131. Unix systems split a disk into as many as ______ partitions .
A. 3
B. 6
C. 10
D. 8
132. _______ must be present in every unix systems.
A. Swap
B. Root
C. Both a & b
D. None of the above
133. Swap file system is used by _______.
A. Shell
B. Kernel
C. Process
D. None of the above
134. Ext 2 was a block size of _____ bytes.
A. 2048
B. 512
C. 4096
D. 1024
135. Ufs file system’s block size is _______ bytes maximum.
A. 128
B. 256
C. 512
D. 64
136. Ufs supports ________ character filenames.
A. 8+3
B. 255
C. 128
D. 512
137. Standard file system used by cdroms is.
A. Hsps
B. Ext2
C. Ufs
D. 55
138. Hsfs uses _______ character file names.
A. 8+3
B. 128
C. 255
D. 512
139. _________ command is used to create partitions.
A. Fdisk
B. Chkdsk
C. Scan
D. None of the above
140. For creating file systems used _______ command.
A. Mfks
B. Bfs
C. Pcfs
D. Ufs
141. During the boot process, file systems listed in _______ are automatically mounted.
A. /etc
B. /etc/fstab
C. /user/local
D. None of the above
142. Fscl conducts a check in ______ phases.
A. 2
B. 3
C. 4
D. 5
143. _______ declares a block bad if the block number is out of range.
A. Fdisk
B. Fsck
C. Both of the above
D. None of the above
144. Fsck corrects the error by.
A. Changing the mode number
B. Removing the entire file/directory
C. Both a & b
D. None of the above


For further detail please mail me at vineetkathuria2000@yahoo.com

or

contact me @ 9351717775 , 9413377567

Study material also at http://eganganagar.xp3.biz

Comments

Popular posts from this blog

MCA-3 COMPUTER GRAPHICS

MCA-5 Data warehouse & Data Mining

BCA-1, COMMUNICATION SKILLS IN ENGLISH