(Test Bank all Chapters)
Chapter 1
TRUE/FALSE
1. In a peer-to-peer network, the system administrator secures all the information on the network by
securing the server.
ANS: F REF: 4
2. You can switch from one shell to another by typing the shell’s name on the command line.
ANS: T REF: 9 | 10
3. UNIX/Linux are not case sensitive.
ANS: F REF: 14
4. The clear command has no options or arguments.
ANS: T REF: 18
5. Most shells keep a list of your recently used commands and allow you to recall a command without
retyping it.
ANS: T REF: 23
6. The system administrator’s prompt is the $ (dollar sign).
ANS: F REF: 24
7. The less command scrolls only down, whereas more enables you to scroll down and up.
ANS: F REF: 26
MULTIPLE CHOICE
1. UNIX/Linux are ____ systems, which let many people simultaneously access and share the
resources of a server computer.
a. superuser c. multitasking
b. peer-to-peer d. multiuser
ANS: D REF: 5
2. UNIX and Linux are ____ systems, which allow one user to execute more than one program at a
time.
a. server-based c. multitasking
b. peer-to-peer d. multiuser
ANS: C REF: 5
3. ____ is an Internet terminal emulation program.
a. IP c. Telnet
, b. Emulab d. Terminal
ANS: C REF: 5
4. Currently, the ____ project, a joint effort of experts from industry, academia, and government, is
working to standardize UNIX.
a. POSIX c. ANSI
b. BSD d. Ubuntu
ANS: A REF: 6
5. Stephen Bourne at AT&T Bell Labs developed the ____ shell as the first UNIX command
processor.
a. Bash c. C
b. Bourne d. Korn
ANS: B REF: 8
6. Linux uses the freeware ____ shell as its default command interpreter.
a. Bash c. C
b. Bourne d. Korn
ANS: A REF: 8
7. The UNIX/Linux ____ command displays the system date, which the system administrator
maintains.
a. today c. system
b. sysdate d. date
ANS: D REF: 15
8. You can use the ____ command to show the system calendar.
a. clndr c. cal
b. syscal d. calendar
ANS: C REF: 16
9. To determine information about who is logged in, you can use the ____ command.
a. whatis c. whois
b. who d. whoami
ANS: B REF: 18
10. In the Linux Bash shell, the ____ key combination moves the cursor to the previous letter.
a. Ctrl+b c. Alt+l
b. Alt+d d. Ctrl+a
ANS: A REF: 22
11. In the Linux Bash shell, the ____ key combination deletes the content of the command line from
the current cursor position to the end of the command line.
a. Ctrl+b c. Ctrl+k
b. Alt+d d. Ctrl+a
ANS: C REF: 22
,12. In the Linux Bash shell, the ____ key combination moves the cursor to the position just before the
first character of the next word.
a. Alt+l c. Ctrl+k
b. Alt+d d. Ctrl+a
ANS: A REF: 22
13. In the Linux Bash shell, the ____ key combination deletes a word or consecutive characters.
a. Ctrl+b c. Alt+l
b. Alt+d d. Ctrl+a
ANS: B REF: 22
14. In the Linux Bash shell, the ____ key combination moves the cursor to the beginning of the
command line.
a. Ctrl+b c. Alt+l
b. Alt+d d. Ctrl+a
ANS: D REF: 22
15. You can type more than one command on the command line by separating commands with a ____.
a. vertical bar (|) c. semicolon (;)
b. colon (:) d. dash (-)
ANS: C REF: 23
16. To log out of UNIX/Linux (Bourne, Korn, or Bash shells) you can enter exit on the command line
or press ____.
a. Ctrl+l c. Ctrl+x
b. Ctrl+g d. Ctrl+d
ANS: D REF: 23
17. The ____ is the prompt symbol traditionally associated with ordinary users.
a. dollar sign ($) c. tilde (~)
b. pound sign (#) d. percent sign (%)
ANS: A REF: 24
18. Fedora, Red Hat Enterprise Linux, SUSE, and Knoppix, recognize up to ____ characters in your
user name.
a. 8 c. 32
b. 16 d. 64
ANS: C REF: 25
19. A ____ is used to refer to the user’s home directory.
a. dot (.) c. forward slash (/)
b. dollar sign ($) d. tilde (~)
ANS: D REF: 25
20. You can change your password, if necessary, by using the ____ command, but you must know
your current password to change it.
a. pwd c. passwd
b. chpwd d. password
, ANS: C REF: 25
21. The head and tail commands, allow you to view the first few or last few lines of a file (____ lines
by default).
a. five c. fifteen
b. ten d. twenty
ANS: B REF: 26
22. To append output to an existing file, you use ____.
a. > c. <
b. >> d. <<
ANS: B REF: 26
COMPLETION
1. A(n) ____________________ computer system, or PC, is usually a stand-alone machine, such as a
desktop or laptop computer.
ANS: personal
REF: 2
2. UNIX/Linux are ____________________ operating systems, which means that these systems can
be used in a variety of computing environments.
ANS: portable
REF: 5
3. ____________________ (FTP) is an Internet protocol used for sending files.
ANS: File Transfer Protocol
REF: 5
4. A(n) ____________________ address is a set of four numbers (in the commonly used version 4)
separated by periods, such as 172.16.1.61.
ANS:
IP
IP (Internet Protocol)
Internet Protocol
Internet Procotol (IP)
REF: 11
5. ____________________ (SSH) was developed for UNIX/Linux systems to provide authentication
security for TCP/IP applications, such as FTP and Telnet.
ANS: Secure Shell
REF: 12