Unix BCA-5 and MCA-2

NOTE : ALL CAPS OPTIONS ARE THE ANSWER OF THE QUESTION .

PART-A

1. When you execute a program the scheduler submits your process to a queue called
(a) inode table (b) Input queue (C) PROCESS QUEUE (d) None
2. The PID starts from O and run up to a maximum ______
(a) 256 (b) 1024 (c) 2048 (D) 32767
3. For tracing the ancestry of any process , command used ______
(a) PS -e (B) PS - F (c) PS-a (d) None
4. Parent process of sched process is -
(a) init (b) vhand (c) SH (D) NONE
5. ______ operator is used to create concurrently executing processes that pass data , directly to one another
(A) ‘|’ (b) ‘&’ (c) ‘$’ (d) None
6. Want to append the output of the ECHO command to the file , we can use the ______ operator
(a) ‘>’ (B) ‘ >> ‘ (c) ‘ | ‘ (d) &
7. In Unix the file number ______ are assigned to standard output, standard input, standard error respectively
(a) 0 1 2 (B) 1 0 2 (c) 2 1 0 (d) 2 0 1
8. ______ can be used to displays the contents of a binary or text file in a variety of formats
(a) Cat (b) objdump (C) OD (d) OP
9. Numeric equivalent value for read and execute permission is
(a) 2 (b) 3 (c) 4 (D) 5
10. In late 1960’s researchers developed ______ operating system
(a) Unics (B) MULTICS (c) unix (d) Linux
11. ______ teamed up with Dennis Ritchie and rewrote the unix kernel
(a) Jerry Weinberg (b) Collin Ritchie (C) KEN THOMSON (d) Charles Babbage
12. Computation utility in UNIX except bc is
(a) factor (b) cal (C) EXPR (d) None
13. C – compiler for Linux is ______
(a) GC (B)GCC (c) G++ (d) GC++
14. which shell does not supports command history -
(A) BOURNE (b) C (c) TC (d) Korn
15. For find out the block size of your Unix file system , command used -
(a) Block (b) Ch block (c) Block ck (D) CMCHK
16. Blocks belonging to the UNIX file system are logically divided into ______ parts
(a) 2 (b) 3 (C) 4 (d) 5
17. The original super block and invade table on the disk are updated after a fixed internal of time , by a command called
(A) SYNC (b) fsck (c) Sbup (d) Update
18. ______ Command reports the free disk space in terms of megabytes and percentage of total disk space
(A) DFSPACE (b) free (c) Freespace (d) Frspace
19. ______ Directory contains , program libraries for higher level user programs
(a) etc (b) bin (c) boot (d) none
20. ______ program running in memory which decides which prices should get the CPU attention and when
(a) Init (B) SCHED (c) vmhand (d) none
21. In UNIX , su stands for
(a) super user (B) SWITCH USER (c) Select user (d) None
22. ______ forces the state of file system to be brought up to date
(A) SYNC (b) Fsck (c) Update (d) None
23. Cron job files are saved in ______ directory
(a) /etc/user/crond (b) etc/crond (C) /ETC/ CRONTAB (d) etc/cronjob
24. How many field entry is their in crone job files
(a) 2 (b) 4 (C) 6 (d) 8
25. The system is controlled by some shell variable these are also called ______________ variables
(a) In built (b) Process (C) ENVIRONMENTAL (d) None
26. ______ indicates the terminal types being used
(a) PS1 (b) PS2 (c) IFS (D) TERM

27. “#!/bin/sh” is known as -
(a) Bang (b) Hebang (C) SHEBANG (d) None
28. $$ means in shell script
(a) Number of process (b) Number of argument (C) PROCESS NUMBER (d) None
29. Lines prefixed with ______ are treated as comments in shell scripts
(a) $ (B) # (c) & (d) ~
30. Shell procedures can use the ______ command to disable a signal or redefine its action
(a)Term (b) Dsig (c) Track (D) NONE
31. Which command provide secure mechanism for logging into remote machines
(a) Telnet (b) rlogin (c) RSH (D) SSH
32. The ______ utility is helpful for checking roundtrip response time between machines
(a) Telnet (b) Traceroute (C) PING (d) None
33. ______ is an insecure way of transferring file
(a) SCP (b) TCP (C) FTP (d) none
34. ______ provides a way to browse the web on a text only terminal
(a) Netscape (b) Exim (C) LYNX (d) Wget
35. ______ is a utility which can determine automatically which places of a large program need to be recompiled
(a) Lynx (b) Exim (c) Fite (D) MAKE
36. In VI editor to search backward we use ______ instead /.
(a) ^ (b) $ (c) & (D) ?
37. Ways used to cursor movement left, down , right , up respectively
(a) HJKL (B) HJLK (c) KLHJ (d) None
38. An emacs ______ will tell you how emacs provides advanced facilities that go beyond simple insertion and deletion of text
(a) Help (b) Jealot (C) ZEALOT (d) None
39. < ctrl > %, used in Vi editor for
(a) Query replace (b) Page forward (c) Reformat paragraph (D) NONE
40. a , used in emacs editor for
(a) Quit (b) Query replace (C) REFORMAT PARAGRAPH (d) Manual entry

PART-B

1. Command may be used to make file -
(i) VI (ii) Cat (iii) Echo (iv) Emacs
(a) I, iv (b) ii, iiii (c) None (D) ALL
2. For finding text in files, we may use
(i) Grep (ii) Egrep (iii) Dgrep (iv) FGrep
(a) I, ii, iii (b) I, ii, iv (c) ii, iii, iv (d) All
3. With grep command , we may use operator like
(i) ‘+’ (ii) { N} (iii) {N,} (iv) {N,M}
(a) I, ii, iii (b) ii, iii, iv (c) All (D) NONE
4. For controlling process , we may use
(i) Nohup (ii) Nice (iii) Kill
(a) I, ii (b) ii, iii (c) I, iii (D) ALL
5. For email utilities we may use :-
(i) Mail (ii) Mutt (iii) Elm (iv) Pine
(a) I, ii, iii (b) ii, iii, iv (c) None (D) ALL
6. Job control facilities provided by
(i) C (ii) TC (iii) Korn (iv) BASH
(a) i, ii (b) i, ii, iii (c) iii, iv (D) ALL
7. computation utility in Unix are
(i) BC (ii) EXPR (iii) Factor (iv) lS
(A) I, II (b) i, ii, iii (c) All (d) None
8. File system is logically divided into ____
(i) Boot block (ii) Super block (iii) Inode table (iv) Data blocks
(a) I, ii, iii (b) ii, iii, iv (c) i, iii, iv (D) ALL
9. the details contained by inode table ____
(i) Root of the file (ii) Parent of directory (iii) Process id (iv) Permission of file
(a) I, ii, iii (b) ii, iii, iv (c) All (D) NONE
10. A Unix file system supports ___________ types of files
(i) Ordinary (ii) System (iii) Password (iv) User
(a) I, ii, iii (b) ii, iii, iv (c) iii, iv, i (D) NONE
11. Shell variables are ____
(i) PATH (ii) PWD (iii) HOME (iv) TERM
(a) I, ii, iii (b) ii, iii, iv (C) NONE (d) All
12. Ifs variables contains
(i) Word separator (ii) New line (iii) Tab (iv) Space
(a) i (b) ii (c) iii (D) ALL
13. Valid commands are
(i) Sort (ii) Cut (iii) Od (iv) Objdump
(a) I, ii (b) ii (c) iii (D) ALL
14. String contained in IFS shell variables ASCII equivalents are
(i) 040 (ii) 011 (iii) 012 (iv) 013
(a) I, ii (B) I, II, III (c) all (d) None
15. Command related to disk operations are
(i) Df (ii) Dfspace (iii) LS (iv) PS
(A) I, II (b) ii (c) All (d) None
16. The C- Compiler in Unix usually called
(i) cc (ii) GCC (iii) CC (iv) G++
(A) I, II (b) ii, iii (c) iii, iv (d) all
17. For cursor movement in VI editor we may use
(i) D$ (ii) DG (iii) YY (iv) X
(a) I, ii (b) ii (c) iii, iv (D) NONE
18. For cursor movement in emacs editor we may use
(i) a (ii) e (iii) < (iv) >
(a) I, ii (b) iii (C) ALL (d) None
19. Editor in Unix are
(i) Emacs (ii)VI (iii) Nedit (iv) Pico
(a) I, ii, iii (b) I, ii, iv (c) None (D) ALL
20. Cron job fields are
(i) Minute (ii) Day (iii) Day_of_month (iv) Command
(a) I, ii, iii (b) ii, iii, iv (C) I, III, IV (d) None


PART-C

1. Match the Column
Part A Part B
(i) $# (M) Process no,. of last background process
(ii) $* (N) Process no.
(iii) $$ (O) arguments
(iv) $! (P) No. of arguments
(a) I –M ii- N iii – O iv - P (b) I – M ii – P iii – O iv – N (c) I – P ii – O iii – M iv - N (D) I – P II - O III – N IV – M
2. Match the Column
(Number ) ( signal )
(i) 0 (M) Exit from shell
(ii) 1 (N) hang up
(iii) 2 (O) Interrupt character
(iv) 9 (P) Kill
(a) I – M ii – N iii - P iv - O (B) I – M II – N III – O IV – P (c) I – M ii – P iii – O iv - N (d) I – M ii – P iii - N iv – O
3. Match the Column
Part A Part B
(i) << (M) Case delimiter
(ii) # (N) Or – if symbol
(iii) || (O) comments
(iv) ;; (P) Input redirection
(A) I – P II – O III – N IV - M (b)I – P ii – O iii – M iv – N (c) I – M ii – N iii – O iv - P (d) I – M ii – N iii – P iv – O
4. Match the Column
Part A Part B
(i) Crontab (M) Email utility
(ii) Esc (N) scheduled job
(iii) Exim (O) Command mode (VI)
(iv) LPrm (P) Printer utility
(a) I – N ii – O iii – M iv - P (b) I – P ii –O iii – M iv – N (c) I – M ii – N iii – O iv - P (d) I – O ii – P iii – M iv – N
5. State True/False
(i) Operating system is resource manger (ii) Multics developed in 1972 (iii) Ken Thompson teamed up with Dennis Ritchie for Unix development (iv) SSV was developed by AT& t and other commercial companies
(a) TFTF (b) FTFT (c) FFFF (D) TTTT
6. Match the Column
Part A Part B
(i) PS (M) Path
(ii) LS (N) Help
(iii) PWD (O) Long listing
(iv) Man (P) visualizing process
(a) I – N ii – O iii – M iv - P (B) I – P II – O III – M IV – N (c) I – M ii – N iii – O iv - P (d) I – O ii – M iii – P iv – N
7. Match the Column
Part A Part B
(i) ‘_ ‘ (M) Character oriented device
(ii) d (N) Directory
(iii) c (O) regular file
(iv) b (P) Symbolic link
(A) I – O II – N III – M IV - P (b) I – P ii – O iii – M iv – N (c) I – M ii – O iii – P iv - N (d) I – N ii – O iii – M iv – P
8. Match the Column
(File extension) (content viewer )
(i) .Pdf (M) XV
(ii) .dvi (N) Acroread
(iii) .Jpg (O) Real player
(iv) .Wav (P) xdvi
(a) I – M ii – N iii – O iv - P (B) I – N II – P III – M IV – O (c) I – O ii – P iii – M iv - N (d) I – P ii – O iii – M iv – N
9. Match the Column
Part A Part B
(i) WX (M) 6
(ii) RW (N) 1
(iii) X (O) 3
(iv) RX (P) 5
(A) I- O II – M III – P IV - N (b)I – O ii – M iii –N iv – P (c) I – M ii – O iii – N iv - P (d) I – N ii – O iii – M iv – P
10. Match the Column
(Process) (PID)
(i) Sched (M) 0
(ii) Init (N) 1
(iii) Vhand (O) 2
(iv) Bdflush (P) 3
(a) I – M ii – P iii – O iv - N (b) I – P ii – O iii – M iv – N (C) I – M II - N III – O IV - P (d) I – M ii – O iii – M iv – P
11. State True/False
(i) All the blocks belonging to the file system are logically divided into three parts (ii) Netscape is fully fledged text based web browser (iii) If a mounted file system is not clean, a system utility sync is automatically run to repair it (iv) fsck command forces the state of the file system to be brought up to date
(a) TTTT (B) FFFF (c) TFTF (d) FTFT
12. State True/False
(i) A file system is a group of files and relevant information regarding them (ii) Each inode entry in the inode table consist of 13 addresses
(iii) DFSPACE reports the free disk space (iv) The symbol ~ can be used to refer to the home directory
(a)FFFF (b) FTFT (c) TFTF (D) TTTT
13. State True/False
(i) Unix is multi-user operating system (ii) A process can be defined as the instance of an executing program
(iii) Unix assigns a unique no. to every process running in memory (iv) The PID starts with 0 and run up to a maximum of 32767
(A) TTTT (b) FTFT (c) TFFT (d) FTTT
14. State True/False
(i) To run a process in the background , Unix provides the $ symbol (ii) Syntax to terminate a process (kill ) (iii) (Kill -9$$ ) is equivalent to exit command (iv) 1pr, 1Pq and 1prm are sysv-style print utility
(A) FFFF (b) FTFT (c) TFTF (d) TTTT
15. State True/False
(i) Unix installations usually come with a C and / or C++ compiler (ii) When you begin Vi, it is in command mode (iii) Emacs is not a popular editor for Unix (iv) The shell script begins with the line “# /bin/sh”
(A) TTTT (b) FFFF (c) TTFF (d) FFTT

Comments

Popular posts from this blog

MCA-3 COMPUTER GRAPHICS

MCA-5 Data warehouse & Data Mining

BCA-1, COMMUNICATION SKILLS IN ENGLISH