Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Name the author who wrote the Linux Operating System at the University of Helsinki in 1990. 
Richard Stallman
Dennis Ritchie
Linus Torvalds
Bill Ahern
Ken Thompson

2. Name the Father of the Free Software Foundation (FSF). 
Dennis Ritchie
Ken Thompson
Linus Torvalds
Richard Stallman
Bill Ahern

3. Name the author of the UNIX Operating System at AT&T Bell Labs who also authored the "C" Programming language that made UNIX such a highly portable operating system. 
Dennis Ritchie
Ken Thompsn
Bill Ahern
Linus Torvalds
Richard Stallman

4. Name the two authors who wrote the UNIX Operating System at AT&T Bell Labs in 1969. 
Linus Torvalds
Ken Thompson
Richard Stallman
Dennis Richie
Bill Ahern

5. Select the most accurate description for /dev/hdc. 
/dev/hdc is the secondary hard drive on IDE channel 0.
/dev/hdc is the first (primary) hard drive on IDE channel 0.
/dev/hdc is the first hard drive on IDE channel 1.
/dev/hdc is the secondary hard drive on IDE channel 0.
/dev/dhc does not exist on a Linux PC.

6. The directory is the major subdirectory beneath root that contains spooled files, queued files, log files, mail, ftp files, and web server files. 
rav
par
sar
queue
var

7. The directory is the major subdirectory beneath root that contains most UNIX system configuration files. 

8. The directory is the major subdirectory beneath root that contains casual user commands. 

9. The directory is the major subdirectory beneath root that is the root user (or the superuser's) assigned directory upon login. 


10. What does "i" option represent on the following command-line: # rpm -ivh dhcpd-3.0-1-i386.rpm 
insert a dash
install the rpm package
inability to react
insecure
inode option

11. What type of link does the following shell command-line create?

ln /home/fishg/schedule /home/boss/fishg-schedule

flexible
soft (symbolic)
specific
hard
spanning

12. The major subdirectory beneath root that contains the bootable copy of Linux is named? 
/
root
boot
lib
mnt

13. The three types of files found in UNIX are: 
directory
data
inode
ordinary
device

14. List each component making up a valid Linux shell command-line. 
prompt, command, space, option, space, argument(s)
prompt, action, arguments
prompt, command, shadow
prompt, space, syntax
prompt, command, space, argument, space, option

15. Below are two entries made on the UNIX shell command-line by a casual user, one entry after the other entry. What output is displayed by the "echo" command?

a=100

echo $a

$a
$
0
100
a

16. A Linux workstation has 783 application packages loaded onto the kernel. What is the output of the following command:

# rpm -qa | who -l

334
830
783
784
782

17. On the Linux shell command-line, a dash, "-", peceeds a(n) . 
command
option
prompt
argument
space

18. Linux requires how many partitions at a minimum? 
8
3
2
4
1

19. Name the disk partitioning utility used to create hard drive partitions during the initial installation of Linux. 
fdisk
disk quick
zdisk
disk druid
chkconfig

20. Before loading Linux on 150 workstations at a business location, the Linux distribution vendor's should be checked. 
Hardware Compatibility List
GNU-GPL
Reputation
License cost
Warranty statement


1. Explain why we must "mount" a CD/DVD unit to the UNIX file system tree before being able to access files on a CD/DVD disk.

Because mounting allows the computer to access the cd rom so without it the cd rom will just sit in the cd tray.

1. Explain three primary uses for the rpm command when administering application packages on a Fedora Linux client or server?

1. Explain what functions the "i" , "v" , and "h" options perform for the rpm command as it is interpreted and displayed by the shell.

1. Explain why the "tab key" technique is so important when using the rpm command.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9647182

Have any Question?


Related Questions in Computer Engineering

When using todays digital cameras file sizes are often

When using today's digital cameras file sizes are often saved in a format that is well over 1 Megabyte. This may be great for high definition photo reproductions but is a disaster for uploading to the web. Images on your ...

Sample a signal every 05 milliseconds for 16 signal levels

Sample a signal every 0.5 milliseconds for 16 signal levels. Then, transmit this signal through a noiseless channel. What is the data rate? If we double the sample rate, what is the data rate?

Question bull studentssidnameagegpabull coursesciddeptid

Question : • students(sid,name,age,gpa) • courses(cid,deptid, description) • professors(ssn,name,address,phone,deptid) • enrollment(sid,cid,section • teaches(cid,section,grade). cid makes reference to the courses table. ...

Write a python 3 program please show all outputlambda and

Write a Python 3 Program please show all output. lambda and keyword Magic Goals A bit of lambda functions as objects keyword evaluation Task Write a function that returns a list of n functions, such that each one, when c ...

Question suppose you wish to encrypt the messsge beyonce

Question : Suppose you wish to encrypt the messsge BEYONCE using the one time pad with the key RIHANNA. What is the keyspace of the one-time pad for a ciphertext of length L? Justify.

Suppose you roll a standard 6-sided die if you roll a 1 1

Suppose you roll a standard 6-sided die. If you roll a 1 (1), you randomly select one chip from a bowl containing 2 red (R) and 3 white (W) chips. If you don't roll a 1 (1 c ), you randomly select 1 chip from a bowl cont ...

Question group work this weekbull introduce yourself to

Question: Group work this week: • Introduce yourself to your group • Start planning out the project with your group • The group should compile the following information into a draft document 1. What specific and detailed ...

Subject computer algorithmsbook introduction to algorithms

Subject : Computer Algorithms Book: Introduction to Algorithms 3rd edition 1) a) Using Figure 10.1 as a model, illustrate the result of each operation in the sequence PUSH(S,6), PUSH(S,2), PUSH(S,8), POP(S), PUSH(S,5), P ...

In a software design meeting in your company your manager

In a software design meeting in your company, your manager says that one of the most important engines of the Record Keeping System you are developing is the Index Sorting Engine. Your coworker quickly jumps in and says ...

Question suppose that an attack would do 200000 in damage

Question : Suppose that an attack would do $200,000 in damage and has a 25% annual probability of success. Spending $15,000 per year on Countermeasure A would reduce the damage of a successful attack by 50%. a) Do a risk ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As