Escolar Documentos
Profissional Documentos
Cultura Documentos
A.
cat
B.
grep
C.
wc
D.
sort
E.
None of the above
2) Which of the following commands is used to rename a file?
A.
rename
B.
remove
C.
mv
D.
ren
E.
None of the above
3) Which command will be used with vi editor to replace text from cursor to right?
A.
r
B.
R
C.
s
D.
S
E.
None of the above
4) Which of the following files contains information related to password aging?
A.
Shadow
B.
password
C.
profile
D.
All the three
E.
None of the above
5) Which command is used to list all the files with extension .1st?
A.
ls -l *.lst
B.
ls lst*
C.
ls *.*
D.
ls *[lst]
E.
None of the above
6) Which option is used with the chmod command recursively to all files and sub-directories
in a directory?
A.
-1
B.
-i
C.
-x
D.
-R
E.
None of the above
7) Which command is used to change directory to the file beginning with a 'p'?
A.
cd p
B.
cd p?
C.
cd p*
D.
cd [p]
E.
None of the above
8) Which commands is used to assign executable permission to all of the files named "letter"?
A.
chmod ugo+r letter
B.
chmod ugo+rw letter
C.
chmod u+x letter
D.
chmod ugo+x letter
E.
None of the above
9) Which set option is used with vi editor to display line numbers on screen?
A.
nm
B.
nu
C.
ic
D.
li
E.
None of the above
10) Which command is used to print a file?
A.
print
B.
prn
C.
pg
D.
lp
E.
None of the above
10) Which command will be used with vi editor to replace single character under cursor with
any number of characters?
A.
s
B.
S
C.
a
D.
i
E.
None of the above
11) Which of the following set options is used with vi editor to ignore case while searching
for patterns?
A.
ic
B.
ai
C.
sm
D.
ts
E.
None of the above
12) Which command is used to list out all the hidden files along with the other files?
A.
ls -l
B.
ls -x
C.
ls -F
D.
ls -a
E.
None of the above
13) Which of the following commands is used to absolutely assign all permissions to the
owner, read and write permissions to the group and only executable permission to the others
of the file note?
A.
B.
C.
chmod 167 note
D.
chmod 4=rwx, g=rw note
E.
None of the above
14) The chmod ugo+rw note command can be represented in octal notation as
A.
B.
C.
D.
E.
15) Which of the following commands is used to display the filenames in multiple columns
with indication of directories and executable file?
A.
B.
C.
D.
E.
ls -F -x
ls -l
ls ~ x
Ip
None of the above
16) The command to count the number of files in the current directory by using pipes, is
A.
B.
C.
D.
E.
ls | wc
ls -l | ws -l
ls | wc -w
ls | ws -c
None of the above
17) Which of the following commands is used to get directory one level up?
A.
B.
C.
D.
E.
cd
cd ..
cd/
chdir
None of the above
18) Which of the following commands is used to count the total number of lines, words, and
characters contained in a file.
A.
B.
C.
D.
E.
count p
wc
wcount
countw
None of the above
19) Which command is used to delete all files in the current directory as well as all files and
sub-directories in its subdirectories?
A.
B.
rm *
rm -r *
C.
D.
E.
rm all
rm *.*
None of the above
20. Which of the following commands is used to change the working directory?
A.
cd
B.
changedir
C.
chdir
D.
cdir
E.
None of the above
21) Which of the following commands is used to view your file 24 lines at a time?
A.
B.
C.
D.
E.
pg
cat
lp
/p
None of the above
22) The commonly used UNIX commands like date, ls, cat, etc. are stored in
A.
B.
C.
D.
E.
/dev directory
/bin and /usr/bin directories
/tmp directory
/unix directory
None of the above
23) Which of the following commands is used to summarize the disk usage?
A.
B.
C.
D.
E.
chkdsk
fdisk
du
disk
None of the above
24) Which command is used to sort the lines of data in a file in alphabetical order?
A.
B.
C.
D.
E.
sort
sh
st
sort -r
None of the above
25) If a file has read and write permissions for the owner, then the octal representation of the
permissions will be
A.
B.
C.
D.
1
6
5
3
E.
head - r
tail
eof
bof
None of the above
crdir
md
mkdir
cr
None of the above
29) Which command is used to display the device name of the terminal you are using?
A.
B.
C.
D.
E.
who
ls
tty
stty
None of the above
A.
chgrp
B.
chown
C.
chmod
D.
chusr
E.
None of the above
33) Which of the following commands can be used to get information about yourself?
A.
who am i
B.
i /4
C.
pwd
D.
which
E.
None of the above
34) Which of the following commands can be used to get information about all users who are
currently logged into the system?
A.
which
B.
who
C.
who am i
D.
1 /u
E.
None of the above
35) Which of the following keys is used to overstrike a whole line?
A.
R
B.
v
C.
C
D.
u
E.
None of the above
36) Which command is used to locate all the .profile files in the system?
A.
ls profile
B.
find /-name profile -print
C.
cd /.profile
D.
l -u .profile
E.
None of the above
37) Which command is used to extract specific columns from the file ?
A. cat
B. grep
C. cut
D. paste
E. None of above
38) Which command is used with the vi editor to save file and remain in the editing mode ?
A. :q
B. q!
C. :w
D. :x
E. None of above
39) Which command is used with the vi editor to move the cursor to the left ?
A. i
B.
C.
D.
E.
k
j
h
None of above
.exrc
.profile
.autoexec
autoexec.bat
None of the above
45) Which of the following command is used to count just the number of lines contained
in a file?
A.
B.
C.
D.
E.
wc -l
wc -c
wc -w
wc -r
None of the above
A.
B.
C.
D.
E.
cd..
cd/
cd
cd HOME.
None of the above
47) Which command is used to move all files to the bin sub-directory of the parent directory?
A.
mv *.* /bin/
B.
mv * /bin/*
C.
mv * ../bin
D.
mv * ../bin *.*
E.
None of the above
48) Which command is used to save the standard output in a file, as well as display it on the
terminal?
A.
B.
C.
D.
E.
more
cat
grep
tee
None of the above
49) The command that can be used to restrict incoming messages to a user is
A.
B.
C.
D.
E.
mesg
grep
halt
sleep
None of the above
50) Which of the following commands is used to copy directory structures in and out
A.
B.
C.
D.
E.
cp
cpio
cp - p
copy
None of the above
write
mesg
calendar
mail
None of the above
52) Which command allows you to view your file 24 lines at a time?
A.
more
B.
pg
C.
cat
D.
lp
E.
None of the above
53) Which of the following commands is used to save the output of the who command in a
file named user.lst, as well as display it?
A.
B.
C.
D.
E.
54) Which of the following shell's wildcards are used to match any number of characters
including none?
A.
[ijk]
B.
[!ijk]
C.
?
D.
*
E.
None of the above
55) The command used to remove the directory is;
A.
rmdir
B.
rd
C.
remove
D.
rdir
E.
None of the above
56) Which of the following commands is used to remove files?
A.
B.
C.
D.
E.
erase
delete
rm
dm
. None of the above
57) In UNIX which of the following command is used to set the the task priority?
A.
init
B.
nice
C.
kill
D.
PS
58 ) Which of the following feature of UNIX may be used for inter-process communication?
A.
Signals
B.
Pipes
C.
Semaphores
D.
All of these
75) Which of the following commands is used to assign executable permission to the owner
of the file named "note"?
a) chmod g+x note
b) chmod u+w note
c) chmod u+x note
d) chmod ugo+x note
76)
a)
b)
c)
d)
77)
Which module gives control of the CPU to the processes selected by the short term
scheduler?
a) Scheduler
b) Dispatcher
c) Loader
d) Controller
78) Number of processor (the amount of work) that completes its execution per unit time is
called
a) Throughput
b) Turnaround time
c) Waiting Time
d) Response time
79) A process may include -------------------, which is memory that is dynamically allocated
during process runtime.
a)
Stack
b)
Heap
c)
Virtual memory
d)
Register
80) A critical section is a program segment
a) which should run in a certain specified amount of time.
b) which avoids deadlocks.
c) where shared resources are accessed.
d) which must be enclosed by a pair of semaphore operations, P and V.
81) An operating system contains 3 user processes each requiring 2 units of resource R .The
minimum number of units of R such that no deadlocks will ever arise is
a) 4
b) 3
c) 5
d) 6.
82) ___________ is a technique of temporarily removing inactive programs from the
memory of computer system
a) Swapping
b) Spooling
c) Semaphore
d) Scheduler
83)___________ is a technique of improving the priority of process waiting in Queue
for CPU allocation
a) Starvation
b) Ageing
c) Revocation
d) Relocation
84) CPU burst time indicates the time, the process needs the CPU. The following are the set
of processes with their respective CPU burst time (in milliseconds).
Processes CPU-burst time
P1
10
P2
5
P3
5
What is the average waiting time if the process arrived in the order P2, P3 & P1
a)
8
b)
5
c)
3
d)
0
86) We have the following reference string
1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5
Compute the no. of page faults using FIFO page replacement algorithm with 3 frames.
a)
9
b)
10
c)
11
d)
8
87) If the disk head is located initially initiated at 32, find the number of disk moves required
with FCFS if the disk queue of I/O blocks requests are:
98, 37,14,124, 65,67
a)
239
b)
310
c)
321
d)
325
88) A thread is a light weight process. In the above statement , weight refers to
a) time
b) no of resources
c) speed
d) all of the above
89) The percentage of time the desired page is found in the TLB is called the hit ratio.
Find the effective memory access time in nanosecond for a 98-percent hit ratio.
a)
100
b)
130
c)
122
d)
98
ABCD
Available
A B CD
P0
0012
0012
1520
P1
1000
1750
P2
1354
2356
P3
0632
0652
P4
0014
0656
Which of the following sequence is in safe state using Bankers algorithm?
a)
P1, P3, P4, P2, P0
b)
P0, P2, P1, P4, P3
c)
P0, P2, P4, P1,P3
d)
P4, P3, P1, P2, P0
92) The function of a kernel in an operating system is to?
a) Interpret the JCL commands
b) Interact with the hardware device
c) Interact with the user
d) All of above
93) A bootstrap is?
a) Hardware of computer used to check memory
b) A program to start up a computer
c) Memory device
d) An Assembler
94) What is thrashing?
a) A high paging activity is called thrashing
b) A high executing activity is called thrashing
c) An extremely long process is called thrashing
d) An extremely long virtual memory is called thrashing
95) A static partitioned memory management system has a total of six partitions. If one is
allocated to the operating system, this will allow a total of
a) five user jobs
b) six user jobs
c) thirty-two user jobs
d) thirty-six user jobs
96) Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and processes
of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in which partition
would the process requiring 426K be placed?
a) 100K
b) 500K
c) 600K
d) 300K
97) Virtual memory is ?
A.
B.
C.
D.
FIFO
LRU
no such policy exists
None of Above
101)Only the process executing the critical section is allowed access to the shared variable,
all other processes should prevented from doing so until the completion of the critical
section. This is often referred to as ?
A. Mutual exclusion
B. Semaphores
C. Deadlock
D. Interprocess communication
102)Belady's Anomaly is a behavior of which page replacement algorithm ?
A. FIFO
B. Optimal
C. Circular FIFO
D. LRU
103) Multiprogramming systems:
A. Are easier to develop than single programming systems
B. Execute each job faster