Você está na página 1de 16

1) Which of the following is not a filter?

A.
cat
B.
grep
C.
wc
D.
sort
E.
None of the above
2) Which of the following commands is used to rename a file?
A.
rename
B.
remove
C.
mv
D.
ren
E.
None of the above
3) Which command will be used with vi editor to replace text from cursor to right?
A.
r
B.
R
C.
s
D.
S
E.
None of the above
4) Which of the following files contains information related to password aging?
A.
Shadow
B.
password
C.
profile
D.
All the three
E.
None of the above
5) Which command is used to list all the files with extension .1st?
A.
ls -l *.lst
B.
ls lst*
C.
ls *.*
D.
ls *[lst]
E.
None of the above
6) Which option is used with the chmod command recursively to all files and sub-directories
in a directory?
A.
-1
B.
-i
C.
-x
D.
-R
E.
None of the above
7) Which command is used to change directory to the file beginning with a 'p'?
A.
cd p
B.
cd p?
C.
cd p*
D.
cd [p]
E.
None of the above

8) Which commands is used to assign executable permission to all of the files named "letter"?
A.
chmod ugo+r letter
B.
chmod ugo+rw letter
C.
chmod u+x letter
D.
chmod ugo+x letter
E.
None of the above
9) Which set option is used with vi editor to display line numbers on screen?
A.
nm
B.
nu
C.
ic
D.
li
E.
None of the above
10) Which command is used to print a file?
A.
print
B.
prn
C.
pg
D.
lp
E.
None of the above
10) Which command will be used with vi editor to replace single character under cursor with
any number of characters?
A.
s
B.
S
C.
a
D.
i
E.
None of the above
11) Which of the following set options is used with vi editor to ignore case while searching
for patterns?
A.
ic
B.
ai
C.
sm
D.
ts
E.
None of the above
12) Which command is used to list out all the hidden files along with the other files?
A.
ls -l
B.
ls -x
C.
ls -F
D.
ls -a
E.
None of the above
13) Which of the following commands is used to absolutely assign all permissions to the
owner, read and write permissions to the group and only executable permission to the others
of the file note?
A.
B.

chmod 761 note


chmod 671 note

C.
chmod 167 note
D.
chmod 4=rwx, g=rw note
E.
None of the above
14) The chmod ugo+rw note command can be represented in octal notation as
A.
B.
C.
D.
E.

chmod 555 note


chmod 666 note
chmod 444 note
chmod 333 note
None of the above

15) Which of the following commands is used to display the filenames in multiple columns
with indication of directories and executable file?
A.
B.
C.
D.
E.

ls -F -x
ls -l
ls ~ x
Ip
None of the above

16) The command to count the number of files in the current directory by using pipes, is
A.
B.
C.
D.
E.

ls | wc
ls -l | ws -l
ls | wc -w
ls | ws -c
None of the above

17) Which of the following commands is used to get directory one level up?
A.
B.
C.
D.
E.

cd
cd ..
cd/
chdir
None of the above

18) Which of the following commands is used to count the total number of lines, words, and
characters contained in a file.
A.
B.
C.
D.
E.

count p
wc
wcount
countw
None of the above

19) Which command is used to delete all files in the current directory as well as all files and
sub-directories in its subdirectories?
A.
B.

rm *
rm -r *

C.
D.
E.

rm all
rm *.*
None of the above

20. Which of the following commands is used to change the working directory?
A.
cd
B.
changedir
C.
chdir
D.
cdir
E.
None of the above
21) Which of the following commands is used to view your file 24 lines at a time?
A.
B.
C.
D.
E.

pg
cat
lp
/p
None of the above

22) The commonly used UNIX commands like date, ls, cat, etc. are stored in
A.
B.
C.
D.
E.

/dev directory
/bin and /usr/bin directories
/tmp directory
/unix directory
None of the above

23) Which of the following commands is used to summarize the disk usage?
A.
B.
C.
D.
E.

chkdsk
fdisk
du
disk
None of the above

24) Which command is used to sort the lines of data in a file in alphabetical order?
A.
B.
C.
D.
E.

sort
sh
st
sort -r
None of the above

25) If a file has read and write permissions for the owner, then the octal representation of the
permissions will be
A.
B.
C.
D.

1
6
5
3

E.

None of the above

26) The seventh field of /etc/password is


A.
password
B.
login
C.
shell
D.
home
E.
None of the above
27) Which command is used to display the end of the file?
A.
B.
C.
D.
E.

head - r
tail
eof
bof
None of the above

28) Which command is used to create a directory?


A.
B.
C.
D.
E.

crdir
md
mkdir
cr
None of the above

29) Which command is used to display the device name of the terminal you are using?
A.
B.
C.
D.
E.

who
ls
tty
stty
None of the above

30) The ls -l command tells


A.
who the owner of the file is
B.
the name of the group owner of the file
C.
how large the file is and when the file was last modified.
D.
All of the above
E.
None of the above
31) Which option will be used with disk free command to include the total amount of disk
space in the file system?
A.
-t
B.
-tt
C.
-4
D.
-i
E.
None of the above
32) Which command is used to set the three permissions for all the three categories of users
of a file?

A.
chgrp
B.
chown
C.
chmod
D.
chusr
E.
None of the above
33) Which of the following commands can be used to get information about yourself?
A.
who am i
B.
i /4
C.
pwd
D.
which
E.
None of the above
34) Which of the following commands can be used to get information about all users who are
currently logged into the system?
A.
which
B.
who
C.
who am i
D.
1 /u
E.
None of the above
35) Which of the following keys is used to overstrike a whole line?
A.
R
B.
v
C.
C
D.
u
E.
None of the above
36) Which command is used to locate all the .profile files in the system?
A.
ls profile
B.
find /-name profile -print
C.
cd /.profile
D.
l -u .profile
E.
None of the above
37) Which command is used to extract specific columns from the file ?
A. cat
B. grep
C. cut
D. paste
E. None of above
38) Which command is used with the vi editor to save file and remain in the editing mode ?
A. :q
B. q!
C. :w
D. :x
E. None of above
39) Which command is used with the vi editor to move the cursor to the left ?
A. i

B.
C.
D.
E.

k
j
h
None of above

40) Which of the following command is not a cursor movement command ?


A. n
B. a
C. $
D. j
E. None of above
41) The Commands used to compare the files is known as ?
A. comp
B. du
C. cmp
D. ccp
E. None
42) Which of the following command is used with vi editor to delete a single character ?
A. z
B. y
C. a
D. x
E. None of above
43) Which command is used with vi editor to move the cursor one row up ?
A. i
B. j
C. h
D. k
E. None of above
44) The File that contains a set of instructions which are performed when a user logs in, is
A.
B.
C.
D.
E.

.exrc
.profile
.autoexec
autoexec.bat
None of the above
45) Which of the following command is used to count just the number of lines contained
in a file?

A.
B.
C.
D.
E.

wc -l
wc -c
wc -w
wc -r
None of the above

46. Which of the following command is used to go to home directory?

A.
B.
C.
D.
E.

cd..
cd/
cd
cd HOME.
None of the above

47) Which command is used to move all files to the bin sub-directory of the parent directory?
A.
mv *.* /bin/
B.
mv * /bin/*
C.
mv * ../bin
D.
mv * ../bin *.*
E.
None of the above
48) Which command is used to save the standard output in a file, as well as display it on the
terminal?
A.
B.
C.
D.
E.

more
cat
grep
tee
None of the above

49) The command that can be used to restrict incoming messages to a user is
A.
B.
C.
D.
E.

mesg
grep
halt
sleep
None of the above

50) Which of the following commands is used to copy directory structures in and out
A.
B.
C.
D.
E.

cp
cpio
cp - p
copy
None of the above

51) Which of following commands is used for an automatic reminder service?


A.
B.
C.
D.
E.

write
mesg
calendar
mail
None of the above

52) Which command allows you to view your file 24 lines at a time?
A.

more

B.
pg
C.
cat
D.
lp
E.
None of the above
53) Which of the following commands is used to save the output of the who command in a
file named user.lst, as well as display it?
A.
B.
C.
D.
E.

who | tee user.lst


who > user.lst
who >> user.lst
who < user.lste
None of the above

54) Which of the following shell's wildcards are used to match any number of characters
including none?
A.
[ijk]
B.
[!ijk]
C.
?
D.
*
E.
None of the above
55) The command used to remove the directory is;
A.
rmdir
B.
rd
C.
remove
D.
rdir
E.
None of the above
56) Which of the following commands is used to remove files?
A.
B.
C.
D.
E.

erase
delete
rm
dm
. None of the above

57) In UNIX which of the following command is used to set the the task priority?
A.
init
B.
nice
C.
kill
D.
PS
58 ) Which of the following feature of UNIX may be used for inter-process communication?
A.
Signals
B.
Pipes
C.
Semaphores
D.
All of these

59 ) The advantage of binary files over text files is


A. It is compact
B. It can be accessed faster
C. They are more reliable
D. All of these
60 ) The default permission bits of a file when it is created for the first time is controlled by
A. chmod value
B. fmask value
C. unmask value
D. None of the above
61) Choose the incorrect statement
A. Shell scripts can accept arguments
B. Shell scripts are interpreted
C. Shell is the programming language
D. Shell scripts are compiled
62) Which of the following tools can be used to keep track of the evolving version of a file?
A. make
B. yacc
C. sccs
D. dv
63) The (.dot) shell command
A. can take command line argument
B. will fork a child shell to execute the named shell script
C. can be used to change the environment of the current shell
D. All of the above
64) If 7 terminals are currently logged on, then the command
date ; who|wc-l displays
A. Date followed by 7
B. Date followed by 8
C. Date followed by 1
D. An error message
65) The cc command sequentially invokes
a)
Pre-processor, compiler and link editor
b)
compiler and link editor
c)
Pre-processor, compiler, assembler and link editor
d)
compiler, assembler and link editor
66) Which of the following is not a system call?
a)
chmod
b)
open
c)
lseek
d)
getc

67) The PID of the kernel process is


a)
undefined
b)
0
c)
1
d)
3
68) Which command is used to sort the lines of data in a file in reverse order
a) sort
b) sh
c) st
d) sort -r
69) Which command is used to display the top of the file?
a) cat
b) head
c) more
d) grep
70) Which of the following commands is used to update access and modification times of a
file?
a) grep
b) wc
c) touch
d) cat
71) Which of the following commands is used to obtain a list of all files by modification
time?
a) ls -1
b) ls -t
c) ls -i
d) ls r
72) Which of the following files contains information related to password aging?
a) shadow
b) password
c) profile
d) All the three
73) Which command will be used with vi editor to replace text from cursor to right?
a) r
b) R
c) s
d) S
74) Which command is used with vi editor to search a pattern in the forward direction?
a) /
b) ?
c) //
d) ??

75) Which of the following commands is used to assign executable permission to the owner
of the file named "note"?
a) chmod g+x note
b) chmod u+w note
c) chmod u+x note
d) chmod ugo+x note
76)
a)
b)
c)
d)

Which of the following best explains a process?


It is a program
It is a program in execution
It is an instance of a program in execution
It is a program that uses system calls

77)
Which module gives control of the CPU to the processes selected by the short term
scheduler?
a) Scheduler
b) Dispatcher
c) Loader
d) Controller
78) Number of processor (the amount of work) that completes its execution per unit time is
called
a) Throughput
b) Turnaround time
c) Waiting Time
d) Response time
79) A process may include -------------------, which is memory that is dynamically allocated
during process runtime.
a)
Stack
b)
Heap
c)
Virtual memory
d)
Register
80) A critical section is a program segment
a) which should run in a certain specified amount of time.
b) which avoids deadlocks.
c) where shared resources are accessed.
d) which must be enclosed by a pair of semaphore operations, P and V.
81) An operating system contains 3 user processes each requiring 2 units of resource R .The
minimum number of units of R such that no deadlocks will ever arise is
a) 4
b) 3
c) 5
d) 6.
82) ___________ is a technique of temporarily removing inactive programs from the
memory of computer system
a) Swapping

b) Spooling
c) Semaphore
d) Scheduler
83)___________ is a technique of improving the priority of process waiting in Queue
for CPU allocation
a) Starvation
b) Ageing
c) Revocation
d) Relocation
84) CPU burst time indicates the time, the process needs the CPU. The following are the set
of processes with their respective CPU burst time (in milliseconds).
Processes CPU-burst time
P1
10
P2
5
P3
5
What is the average waiting time if the process arrived in the order P2, P3 & P1
a)
8
b)
5
c)
3
d)
0
86) We have the following reference string
1, 2, 3, 4, 1, 2, 5, 1, 2, 3, 4, 5
Compute the no. of page faults using FIFO page replacement algorithm with 3 frames.
a)
9
b)
10
c)
11
d)
8
87) If the disk head is located initially initiated at 32, find the number of disk moves required
with FCFS if the disk queue of I/O blocks requests are:
98, 37,14,124, 65,67
a)
239
b)
310
c)
321
d)
325
88) A thread is a light weight process. In the above statement , weight refers to
a) time
b) no of resources
c) speed
d) all of the above
89) The percentage of time the desired page is found in the TLB is called the hit ratio.
Find the effective memory access time in nanosecond for a 98-percent hit ratio.
a)
100
b)
130
c)
122

d)

98

90) Which of the following is a necessary condition of deadlock?


a) Mutual exclusion
b) No pre-emption
c) Hold and wait
d) All of the above
91) Consider the following Snapshot at time T0:
Allocation
Max
A B CD

ABCD

Available
A B CD

P0
0012
0012
1520
P1
1000
1750
P2
1354
2356
P3
0632
0652
P4
0014
0656
Which of the following sequence is in safe state using Bankers algorithm?
a)
P1, P3, P4, P2, P0
b)
P0, P2, P1, P4, P3
c)
P0, P2, P4, P1,P3
d)
P4, P3, P1, P2, P0
92) The function of a kernel in an operating system is to?
a) Interpret the JCL commands
b) Interact with the hardware device
c) Interact with the user
d) All of above
93) A bootstrap is?
a) Hardware of computer used to check memory
b) A program to start up a computer
c) Memory device
d) An Assembler
94) What is thrashing?
a) A high paging activity is called thrashing
b) A high executing activity is called thrashing
c) An extremely long process is called thrashing
d) An extremely long virtual memory is called thrashing
95) A static partitioned memory management system has a total of six partitions. If one is
allocated to the operating system, this will allow a total of
a) five user jobs
b) six user jobs
c) thirty-two user jobs
d) thirty-six user jobs
96) Given memory partitions of 100K, 500K, 200K, 300K and 600K (in order) and processes
of 212K, 417K, 112K, and 426K (in order), using the first-fit algorithm in which partition
would the process requiring 426K be placed?

a) 100K
b) 500K
c) 600K
d) 300K
97) Virtual memory is ?
A.
B.
C.
D.

Extremely large main memory


Extremely large secondary memory
An illusion of an extremely large memory
A type of memory used in super computers

98) Page fault occurs when ?


A.
B.
C.
D.

The page in corrupted by application software


The page is in main memory
The page is not in main memory
One tries to divide number by 0

99) Concurrent processed are processed that?


A. Do not overlap in time
B. Overlap in time
C. Are executed by processor at the same time
D. None of Above
100) The page replacement policy that sometimes leads to more page faults when the size of
the frame is increased is ?
A.
B.
C.
D.

FIFO
LRU
no such policy exists
None of Above

101)Only the process executing the critical section is allowed access to the shared variable,
all other processes should prevented from doing so until the completion of the critical
section. This is often referred to as ?
A. Mutual exclusion
B. Semaphores
C. Deadlock
D. Interprocess communication
102)Belady's Anomaly is a behavior of which page replacement algorithm ?
A. FIFO
B. Optimal
C. Circular FIFO
D. LRU
103) Multiprogramming systems:
A. Are easier to develop than single programming systems
B. Execute each job faster

C. Execute more jobs in the same time period


D. Are used only one large mainframe computers.

Você também pode gostar