Unix commands

Description: UNIX
Number of Questions: 28
Created by:
Tags: UNIX Programming
Attempted 0/28 Correct 0 Score 0

Which of the following UNIX commands is used to make copies of files or entire directories?

  1. rmdir

  2. mkdir

  3. cp

  4. none of these


Correct Option: C
Explanation:

This command is used to make copies of files or entire directories.

Which command displays the full absolute path to your current location in the file system?

  1. cd

  2. mkdir

  3. pwd

  4. mv


Correct Option: C
Explanation:

The 'pwd' command displays the full absolute path to your current location in the file system.

Which command is used to find the place where an application program or system utility is stored on a disk?

  1. which

  2. uniq

  3. cut

  4. od


Correct Option: A
Explanation:

The ' which' command is used to find the place where an application program or system utility is stored on a disk.

Which of the following backsup entire directories and files onto a tape device or into a single disk file known as an archive?

  1. tar

  2. cpio

  3. compress, gzip

  4. none of these


Correct Option: A
Explanation:

The 'tar' commands backsup entire directories and files onto a tape device or into a single disk file known as an archive.

Which command kills the job number 1?

  1. fg%1

  2. kill 1

  3. kill%1

  4. jobs


Correct Option: C
Explanation:

 This command kills the job number 1.

Which command is used to remove the duplicate adjacent lines from a file?

  1. cut

  2. uniq

  3. which

  4. none of these


Correct Option: B
Explanation:

The 'uniq' command removes the duplicate adjacent lines from a file.

___________command means suspend the job, running in the foreground.

  1. ^C

  2. ^Z

  3. Bg

  4. Ps


Correct Option: B
Explanation:

This command means suspend the job, running in the foreground. 

Which of the following commands kills the job, running in the foreground?

  1. ^C

  2. ^Z

  3. &

  4. none of these


Correct Option: A
Explanation:

This command kills the job, running in the foreground.

Which of the following commands is used to concatenate the files?

  1. Command1 Command2

  2. Command &

  3. Cat file1 file2 > file0

  4. None of these


Correct Option: C
Explanation:

 This command concatenates file1 and file2 to file0.

Which of the following is a secure alternative for remote login and also for executing commands in the remote machines?

  1. ssh

  2. rlogin, rsh

  3. telnet

  4. none of these


Correct Option: A
Explanation:

An 'ssh' is a secure alternative for remote login and also for executing commands in the remote machines.

Which command helps us to use directly to send and receive files and is designed for use with standard serial cable modems and telephone service?

  1. uuname

  2. uuto

  3. UUCP

  4. None of these


Correct Option: C
Explanation:

UUCP command helps us to use directly to send and receive files and is designed for use with standard serial cable modems and telephone service.

Which of the following provides a way to browse the web on a text- only terminal?

  1. wget

  2. lynx

  3. ping

  4. traceroute


Correct Option: B
Explanation:

The 'lynx' command provides a way to browse the web on a text- only terminal.

___________ command is used to determine the local node name as well as the names of all uucp systems that are immediately known to the system.

  1. uuto

  2. UUCP

  3. unname

  4. None of these


Correct Option: C
Explanation:

 The unname command is used to determine the local node name as well as the names of all uucp systems that are immediately known to the system.

 

Which of the following keys is used in emac to delete at the end of the line or lines?

  1. C-d

  2. M-d

  3. C-w

  4. C-k


Correct Option: D
Explanation:

 This command is used to delete at the end of a line or lines.

_____________cursor movement key is used to move the cursor at the beginning of a line.

  1. C-a

  2. C-e

  3. C-<

  4. C->


Correct Option: A
Explanation:

 This command is used to move the cursor at the beginning of a line.

__________ performs a forward incremental search.

  1. C-r

  2. C-%

  3. C-s

  4. C-g


Correct Option: C
Explanation:

C-s performs a forward incremental search.

____________ is particularly useful in tracking down the location of network problem.

  1. wget

  2. traceroute

  3. ping

  4. none of these


Correct Option: B
Explanation:

The 'traceroute' command is particularly useful in tracking down the location of a network problem.

______________ customisable keys are used to compile program.

  1. C-x c

  2. C-x C-u

  3. C-x a

  4. None of these


Correct Option: A
Explanation:

 C-x c customisable keys are used to compile program.

________ is used to reformat the paragraph.

  1. C-x o

  2. C-x b

  3. C-x C-c

  4. M-q


Correct Option: D
Explanation:

 M-q  is used to reformat the paragraph.

Which command is used to quit a file, without saving?

  1. :w

  2. :wq

  3. :q!

  4. u


Correct Option: C
Explanation:

 This command is used to quit the file, without saving.

Which of the following commands in vi editor is used to delete upto the end of a line?

  1. d$

  2. dd

  3. dd

  4. dw


Correct Option: A
Explanation:

To delete upto the end of the line, d$ command is used.

Which command is used to save and quit the file?

  1. :w

  2. :wq

  3. :q!

  4. None of these


Correct Option: B
Explanation:

 This command is used to save and quit the file.

Which command performs the append text operation with respect to vi command?

  1. i

  2. J

  3. $a

  4. h


Correct Option: C
Explanation:

 This command is used to append the text.

___________ is used to move the cursor at the beginning of a line.

  1. k

  2. l

  3. j

  4. ^


Correct Option: D
Explanation:

This command is used to move the cursor at the beginning of a line.

Which cursor movement commands is used to move the cursor at the end of a line?

  1. ^F

  2. $

  3. G

  4. ^


Correct Option: B
Explanation:

This command is used to move the cursor at the end of a line.

___________ is an utility used for checking round-trip response time between machines.

  1. wget

  2. ping

  3. lynx

  4. none of these


Correct Option: B
Explanation:

The 'ping' command is an utility used for checking round-trip response time between machines.

_____________ redirects the standard output to a file.

  1. Command >> file

  2. Command > file

  3. Command < file

  4. Command &


Correct Option: B
Explanation:

This command redirects the standard output to a file. 

___________ provides an insecure mechanism for logging into remote machines. It is an insecure facility because all data is passed in unencrypted format over the network.

  1. rlogin, rsh

  2. telnet

  3. ssh

  4. unname


Correct Option: B
Explanation:

 The telnet command provides an insecure mechanism for logging into remote machines. It is an insecure facility because all data is passed in unencrypted format over the network. 

 

- Hide questions