To create a(n) ____________________ link, you use the -s option to the ln command Current Location Fall 2013, NETW 182.91 Linux Administration Review Test Submission: Quiz 13 Skip to Course Content Skip to Top Frame Tabs Menu Management Options Expand All Collapse All Fall 2013, NETW 182.91 Linux Administration Announcements Course Information Course Content 74e9cff2-e0e8-4
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
To create a(n) ____________________ link, you use the -s option to the ln command
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 13
Started 11/18/13 11:17 AM
Submitted 11/18/13 11:29 AM
Status Completed
Attempt Score 10 out of 15 points
Time Elapsed 11 minutes.
Instructions
false
Question 1
1 out of 1 points
NetBIOS names can be up to ____ characters long.
Answer
Selected Answer:
15
Correct Answer:
15
Question 2
1 out of 1 points
Apache daemon listens for HTTP requests on port ____.
Answer
Selected Answer:
TCP 80
Correct Answer:
TCP 80
Question 3
0 out of 1 points
In NFS, one computer shares a certain directory in the directory tree by placing the name of that directory in the /etc/imports file.
Answer
Selected Answer:
True
Correct Answer: False
Question 4
0 out of 1 points
Databases store information in the form of ____, each of which contains ____.
Answer
Selected Answer:
records; tables
Correct Answer:
tables; records
Question 5
1 out of 1 points
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
Answer
Selected Answer:
True
Correct Answer: True
Question 6
1 out of 1 points
NTP uses port ____.
Answer
Selected Answer:
UDP 123
Correct Answer:
UDP 123
Question 7
1 out of 1 points
The ____ command can be used in the BASH prompt to obtain a Web page from the Apache server.
Answer
Selected Answer:
curl
Correct Answer:
curl
Question 8
0 out of 1 points
In the DHCP lease process, halfway through the time period specified by its lease the DHCP client will send a(n) DHCPDISCOVER packet to its DHCP server to renew its IP configuration.
Answer
Selected Answer:
True
Correct Answer: False
Question 9
1 out of 1 points
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
Answer
Selected Answer:
Samba
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match Samba
Question 10
1 out of 1 points
You can use the ____________________ command to connect to both Samba and Windows servers.
Answer
Selected Answer: smbclient
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match smbclient
Question 11
1 out of 1 points
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename.
Answer
Selected Answer:
mput filename
Correct Answer:
mput filename
Question 12
1 out of 1 points
Is Apache is the world’s most common Web server?
Answer
Selected Answer:
True
Correct Answer: True
Question 13
0 out of 1 points
The first DNS server in a zone is called the ____________________ DNS server.
Answer
Selected Answer:
master or primary
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match master
Exact Match primary
Question 14
0 out of 1 points
Client computers can retrieve e-mail from e-mail servers via ____ or ____.
Answer
Selected Answer:
POP; FTP
Correct Answer:
POP; IMAP
Question 15
1 out of 1 points
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 12
Started 11/18/13 10:45 AM
Submitted 11/18/13 11:17 AM
Status Completed
Attempt Score 15 out of 15 points
Time Elapsed 32 minutes.
Instructions
Question 1
1 out of 1 points
Computer names are called ____.
Answer
Selected Answer:
host names
Correct Answer:
host names
Question 2
1 out of 1 points
false
IPv6 IP addresses are delimited by the ____ character.
Answer
Selected Answer:
:
Correct Answer:
:
Question 3
1 out of 1 points
In an IP address, the host ID represents the network on which the computer is located.
Answer
Selected Answer:
False
Correct Answer: False
Question 4
1 out of 1 points
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
Answer
Selected Answer:
0.0.0.0; 255.255.255.255
Correct Answer:
0.0.0.0; 255.255.255.255
Question 5
1 out of 1 points
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
Answer
Selected Answer:
True
Correct Answer: True
Question 6
1 out of 1 points
A common utility used to troubleshoot routing is the ____ command.
Answer
Selected Answer:
traceroute
Correct Answer:
traceroute
Question 7
1 out of 1 points
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
Answer
Selected Answer:
/etc/hosts.equiv
Correct Answer:
/etc/hosts.equiv
Question 8
1 out of 1 points
Can TCP/IP use host names to identify computers?
Answer
Selected Answer:
False
Correct Answer: False
Question 9
1 out of 1 points
You can view or set the host name for a Linux computer using the ____________________ command.
Answer
Selected Answer: hostname
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match hostname
Question 10
1 out of 1 points
The IP address of the network interface on the router to which you send packets is called the ____________________.
Answer
Selected Answer: default gateway
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match default gateway
Question 11
1 out of 1 points
IPv6 IP addresses are written using eight 16-bit ____ numbers.
Answer
Selected Answer:
hexadecimal
Correct Answer:
hexadecimal
Question 12
1 out of 1 points
The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers.
Answer
Selected Answer:
False
Correct Answer: False
Question 13
1 out of 1 points
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
Answer
Selected Answer:
ifconfig
Correct Answer:
ifconfig
Question 14
1 out of 1 points
A route table is a list of TCP/IP networks that is stored in system memory.
Answer
Selected Answer:
True
Correct Answer: True
Question 15
1 out of 1 points
Remote computers can connect to a configured VNC server using the ____ command.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 8
Started 10/9/13 11:42 AM
Submitted 10/13/13 8:30 PM
Status Completed
Attempt Score 15 out of 16 points
Time Elapsed 104 hours, 48 minutes.
Instructions
Question 1
1 out of 1 points
The Linux kernel is stored in the ____ directory.
Answer
Selected Answer:
/boot
false
Correct Answer:
/boot
Question 2
1 out of 1 points
After the entries in /etc/inittab have been executed, the ____ file is executed to perform tasks that must occur after system startup.
Answer
Selected Answer:
/etc/rc.d/rc.local
Correct Answer:
/etc/rc.d/rc.local
Question 3
1 out of 1 points
If you are using a Linux boot loader to dual boot another operating system in addition to Linux, it is easiest if Linux is installed after the other operating system has been installed.
Answer
Selected Answer:
True
Correct Answer: True
Question 4
1 out of 1 points
In Linux, runlevel ____ is also known as multiuser mode.
Answer
Selected Answer:
2
Correct Answer:
2
Question 5
0 out of 1 points
To see the current runlevel of the system and the previous runlevel (if runlevels have been changed since system startup), you can use the runlevel command.
Answer
Selected Answer:
False
Correct Answer: True
Question 6
1 out of 1 points
The first daemon process on a system is called the ____________________ daemon.
Answer
Selected Answer: initialize
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match initialize (init)
Exact Match initialize
Exact Match init
Question 7
1 out of 1 points
In the /etc/lilo.conf file, the ____ keyword specifies the absolute pathname to the Linux kernel.
Answer
Selected Answer:
image=
Correct Answer:
image=
Question 8
1 out of 1 points
After configuring X Windows, you can fine-tune the vsync and hsync of the video card using the ____ utility within the desktop environment.
Answer
Selected Answer:
xvidtune
Correct Answer:
xvidtune
Question 9
1 out of 1 points
GRUB must be reinstalled after editing its configuration file.
Answer
Selected Answer:
False
Correct Answer: False
Question 10
1 out of 1 points
A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.
Answer
Selected Answer: runlevel
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match runlevel
Question 11
1 out of 1 points
A Linux system in runlevel ____ is a system that has no daemons active in memory and is ready to be powered off.
Answer
Selected Answer:
0
Correct Answer:
0
Question 12
1 out of 1 points
LILO is the most common boot loader used on modern Linux systems and the only boot loader supported by Fedora 13.
Answer
Selected Answer:
False
Correct Answer: False
Question 13
1 out of 1 points
When a computer first initializes, the system BIOS performs a(n) _________________________.
Answer
Selected Answer:
POST
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact MatchPower On Self Test (POST)
Exact Match Power On Self Test
Exact Match POST
Question 14
1 out of 1 points
The ____ window manager is used for the GNOME desktop in Red Hat Fedora Core 2.
Answer
Selected Answer:
metacity
Correct Answer:
metacity
Question 15
1 out of 1 points
____ is a freely available version of X Windows used in many Linux distributions.
Answer
Selected Answer:
XFree86
Correct Answer:
XFree86
Question 16
1 out of 1 points
The two most common desktop environments that are used on Linux are ____ and ____.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 7
Started 9/24/13 3:09 PM
Submitted 10/5/13 10:51 PM
Status Completed
Attempt Score 13 out of 15 points
Time Elapsed 271 hours, 41 minutes.
Instructions
Question 1
1 out of 1 points
The test statement ____ would be used to determine if A is numerically greater than B.
Answer
false
Selected Answer:
[ A –gt B ]
Correct Answer:
[ A –gt B ]
Question 2
1 out of 1 points
To see a list of the environment variables and their current values on a system, you can use the ____ command.
Answer
Selected Answer:
set
Correct Answer:
set
Question 3
1 out of 1 points
Aliases are shortcuts to commands stored in special variables that can be created and viewed using the alias command.
Answer
Selected Answer:
True
Correct Answer: True
Question 4
1 out of 1 points
If you have ____ permission to a shell script, you can execute the shell script like any other executable program on the system.
Answer
Selected Answer:
read and execute
Correct Answer:
read and execute
Question 5
0 out of 1 points
The ____________________ command takes user input from stdin and places it in a variable specified by an argument.
Answer
Selected Answer: echo -e"What is your name? -->\c"
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match read
Question 6
1 out of 1 points
Most commands that are run by the shell are run in a separate ____________________, which is created by the current shell.
Answer
Selected Answer:
subshell
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match subshell
Question 7
1 out of 1 points
The file descriptor stdin is represented by the number ____.
Answer
Selected Answer:
0
Correct Answer:
0
Question 8
1 out of 1 points
Any command that can take standard input and transform it into standard output is called a(n) ____________________ command.
Answer
Selected Answer: Filter
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match filter
Question 9
1 out of 1 points
The file descriptor stderr is represented by the number ____.
Answer
Selected Answer:
2
Correct Answer:
2
Question 10
1 out of 1 points
You can redirect a file to the standard input of a command using the ____ metacharacter.
Answer
Selected Answer:
<
Correct Answer:
<
Question 11
1 out of 1 points
The ____ command counts the number of lines, words, and characters in a file.
Answer
Selected Answer:
wc
Correct Answer:
wc
Question 12
1 out of 1 points
The ____ command could be used to view the contents of the environment variable that represents the BASH shell prompt.
Answer
Selected Answer:
echo $PS1
Correct Answer:
echo $PS1
Question 13
1 out of 1 points
A case construct must be ended by ____________________.
Answer
Selected Answer: esac
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match esac
Question 14
0 out of 1 points
To prevent a file from being cleared by the BASH shell and append output to the existing output, you can specify three > metacharacters alongside the file descriptor.
Answer
Selected Answer:
True
Correct Answer: False
Question 15
1 out of 1 points
To see a list of all exported environment and user-defined variables in the shell, you can use the ____ command.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 6
Started 9/5/13 4:25 PM
Submitted 9/24/13 2:53 PM
Status Completed
Attempt Score 15 out of 15 points
Time Elapsed 454 hours, 27 minutes.
Instructions
Question 1
1 out of 1 points
A(n) ____________________ CPU is a CPU that has a speed greater than the speed that was originally intended for the processor.
Answer
Selected Answer: overclocked
Correct Answer:
false
Evaluation Method Correct Answer Case Sensitivity
Exact Match overclocked
Question 2
1 out of 1 points
To ensure that Linux has detected the correct amount of RAM in the system after installation, you can view the contents of the ____ file.
Answer
Selected Answer:
/proc/meminfo
Correct Answer:
/proc/meminfo
Question 3
1 out of 1 points
RAID level 4 configurations are not fault tolerant.
Answer
Selected Answer:
False
Correct Answer: False
Question 4
1 out of 1 points
Each SCSI device is assigned a unique ID number known as a(n) ____.
Answer
Selected Answer:
target ID
Correct Answer:
target ID
Question 5
1 out of 1 points
RAID level ____ is often referred to as disk mirroring.
Answer
Selected Answer:
1
Correct Answer:
1
Question 6
1 out of 1 points
In Fedora Linux, a ____ file is a script file that specifies the choices that you would normally choose when you install the operating system.
Answer
Selected Answer:
kickstart
Correct Answer:
kickstart
Question 7
1 out of 1 points
If a Linux installation ends abnormally and the screen displays a “fatal signal ____” error message, it indicates an error known as a segmentation fault.
Answer
Selected Answer:
11
Correct Answer:
11
Question 8
1 out of 1 points
The ____ file in the /proc directory contains a list of memory address ranges reserved for device use.
Answer
Selected Answer:
ioports
Correct Answer:
ioports
Question 9
1 out of 1 points
RAID level ____ is commonly referred to as disk striping with parity.
Answer
Selected Answer:
5
Correct Answer:
5
Question 10
1 out of 1 points
Some installations fail to place a boot loader on the hard disk properly; this is often the case with large hard disk drives that have over ____ cylinders.
Answer
Selected Answer:
1024
Correct Answer:
1024
Question 11
1 out of 1 points
If you have an installed Linux system, you can use the ____________________ command to write an ISO image to a USB flash memory drive.
Answer
Selected Answer:
dd
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match dd
Question 12
1 out of 1 points
Any line in a kickstart file that starts with a(n) ____ symbol is a comment line and is ignored by the installation program.
Answer
Selected Answer:
#
Correct Answer:
#
Question 13
1 out of 1 points
To verify hardware settings, you can examine the contents of the ____ directory.
Answer
Selected Answer:
/proc
Correct Answer:
/proc
Question 14
1 out of 1 points
The ____ file in the /proc directory contains statistics on the performance of the processor.
Answer
Selected Answer:
loadavg
Correct Answer:
loadavg
Question 15
1 out of 1 points
RAID level 3 requires a minimum of three hard disk drives to function.
The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
Answer
Selected Answer:
df
Correct Answer:
false
df
Question 3
1 out of 1 points
An extended partition can contain many subpartitions called ____________________.
Answer
Selected Answer: logical drives
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match logical drives
Question 4
1 out of 1 points
At installation, Fedora Linux creates a symbolic link called ____________________ to the correct device file for your first CD-ROM drive.
Answer
Selected Answer: /dev/cdrom
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match /dev/cdrom
Question 5
1 out of 1 points
The ____ filesystem is used by software programs that write to a CD-RW or DVD-RW drive.
Answer
Selected Answer:
udf
Correct Answer:
udf
Question 6
1 out of 1 points
In Linux, you must use only one type of filesystem on a system.
Answer
Selected Answer:
False
Correct Answer: False
Question 7
1 out of 1 points
The ____ filesystem contains most of the operating system files.
Answer
Selected Answer:
root
Correct Answer:
root
Question 8
1 out of 1 points
If you do not know the type, major, or minor number of a device, you can use the ____ command to re-create the device based on the common name.
Answer
Selected Answer:
/dev/MAKEDEV
Correct Answer:
/dev/MAKEDEV
Question 9
1 out of 1 points
If you find a corrupted device file, or accidentally delete a device file, the ____________________ command can be used to re-create the device file if you know the type, major, and minor numbers.
Answer
Selected Answer:
mknod
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match mknod
Question 10
1 out of 1 points
Each track on a hard disk is divided into ____________________ of information.
Answer
Selected sector
Answer:
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match sectors
Question 11
1 out of 1 points
Data is read off of hard disks in concentric circles called ____.
Answer
Selected Answer:
tracks
Correct Answer:
tracks
Question 12
1 out of 1 points
After a typical Fedora Linux installation, over 700 different device files are in the /dev directory.
Answer
Selected Answer:
True
Correct Answer: True
Question 13
1 out of 1 points
Creating a filesystem on a device is commonly referred to as ____________________.
Answer
Selected Answer: formatting
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match formatting
Question 14
1 out of 1 points
The ____ device file represents the first primary partition on the second IDE hard disk drive (primary slave).
Answer
Selected Answer:
/dev/hdb1
Correct Answer:
/dev/hdb1
Question 15
1 out of 1 points
The ____ device file represents the second serial port on the system (COM2).
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 3
Started 9/5/13 2:34 PM
Submitted 9/5/13 3:41 PM
Status Completed
Attempt Score 13 out of 15 points
Time Elapsed 1 hour, 7 minutes.
Instructions
Question 1
1 out of 1 points
Most files on a Linux system that contain configuration information are ____ files.
Answer
Selected Answer:
text
Correct Answer:
text
Question 2
1 out of 1 points
When you first open the vi editor, you are placed in edit mode.
Answer
Selected Answer:
False
Correct Answer: False
Question 3
1 out of 1 points
To view a list of files and their type, use the ____ switch to the ls command.
Answer
Selected Answer:
false
-F
Correct Answer:
-F
Question 4
1 out of 1 points
The ____ metacharacter can also be used to refer to the current user's home directory.
Answer
Selected Answer:
~
Correct Answer:
~
Question 5
1 out of 1 points
If you type enough unique letters of a directory and press ____ key, the BASH shell will find the intended file or directory being specified and fill in the appropriate information.
Answer
Selected Answer:
Tab
Correct Answer:
Tab
Question 6
1 out of 1 points
Using wildcard metacharacters, how can one indicate a number is either 1, 2, 3, or 4?
Answer
Selected Answer:
[1-4]
Correct Answer:
[1-4]
Question 7
1 out of 1 points
To display the contents of a file called data, use the command ____.
Answer
Selected Answer:
cat data
Correct Answer:
cat data
Question 8
1 out of 1 points
The ____ symbol indicates a linked file.
Answer
Selected Answer:
@
Correct Answer:
@
Question 9
1 out of 1 points
The ____ command displays the last five lines of a text file.
Answer
Selected Answer:
tail -5
Correct Answer:
tail -5
Question 10
1 out of 1 points
The ____ command will confirm the system directory that you are currently in.
Answer
Selected Answer:
pwd
Correct Answer:
pwd
Question 11
0 out of 1 points
In Linux, the root directory is represented by a \ character.
Answer
Selected Answer:
True
Correct Answer: False
Question 12
1 out of 1 points
To display the line number of each line in a file, in addition to its contents, would you use the cat -n command?
Answer
Selected Answer:
True
Correct Answer: True
Question 13
0 out of 1 points
The ____ command can be used to provide a long listing for each file in a certain directory.
Answer
Selected Answer:
ls -L
Correct Answer:
ls -l
Question 14
1 out of 1 points
In a file listing, the 9 characters following the file type (for example, -rwxr-xr-x) refer to the file's ____________________.
Answer
Selected Answer: permission
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match permissions
Exact Match mode
Question 15
1 out of 1 points
Text wildcards used to ease the searching of specific text information are called ____________________.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 2
Started 8/26/13 11:42 AM
Submitted 8/26/13 12:28 PM
Status Completed
Attempt Score 15 out of 15 points
Time Elapsed 45 minutes.
Instructions
Question 1
1 out of 1 points
false
During Linux installation, you need to configure a minimum of ____ user account(s).
Answer
Selected Answer:
two
Correct Answer:
two
Question 2
1 out of 1 points
In Linux, the administrator account is called top.
Answer
Selected Answer:
False
Correct Answer: False
Question 3
1 out of 1 points
The command shutdown -h +30 would halt your system in 30 minutes.
Answer
Selected Answer:
True
Correct Answer: True
Question 4
1 out of 1 points
The ____ filesystem is compatible with the Windows FAT filesystem.
Answer
Selected Answer:
VFAT
Correct Answer:
VFAT
Question 5
1 out of 1 points
A swap partition contains a filesystem.
Answer
Selected Answer:
False
Correct Answer: False
Question 6
1 out of 1 points
____ is the metacharacter for command termination.
Answer
Selected Answer:
;
Correct Answer:
;
Question 7
1 out of 1 points
Another name for virtual memory is ____________________ memory.
Answer
Selected Answer:
SWAP
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match swap
Question 8
1 out of 1 points
Because you need to document so many pieces of hardware and software information, you should create a ____ that contains all important installation information as well as hardware information.
Answer
Selected Answer:
preinstallation checklist
Correct Answer:
preinstallation checklist
Question 9
1 out of 1 points
The ____ metacharacter indicates background command execution.
Answer
Selected Answer:
&
Correct Answer:
&
Question 10
1 out of 1 points
Which Linux command displays your login name?
Answer
Selected Answer:
whoami
Correct Answer:
whoami
Question 11
1 out of 1 points
____________________ divides a hard disk into adjacent sections, each of which can contain a separate filesystem used to store data.
Answer
Selected Answer:
Partitioning
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match Partitioning
Question 12
1 out of 1 points
Commands indicate the name of a program to execute and are case sensitive.
Answer
Selected Answer:
True
Correct Answer: True
Question 13
1 out of 1 points
To print the current date and time, type the command ____________________.
Answer
Selected Answer:
date
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match date
Question 14
1 out of 1 points
When a user interacts with his computer, he interacts directly with the kernel of the computer’s operating system.
Answer
Selected Answer:
False
Correct Answer: False
Question 15
1 out of 1 points
The ____ directory contains system commands and utilities.
Course Fall 2013, NETW 182.91 Linux Administration
Test Quiz 1
Started 8/20/13 4:56 PM
Submitted 8/20/13 5:08 PM
Status Completed
Attempt Score 15 out of 15 points
Time Elapsed 11 minutes.
Instructions
Question 1
1 out of 1 points
The Linux ____________________ is the core component of the Linux operating system.
Answer
Selected Answer: kernel
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match kernel
Question 2
1 out of 1 points
____ is software that is distributed free of charge, but the source code is not available.
Answer
false
Selected Answer:
Freeware
Correct Answer:
Freeware
Question 3
1 out of 1 points
The ____ indicates the stability of a Linux kernel.
Answer
Selected Answer:
minor number
Correct Answer:
minor number
Question 4
1 out of 1 points
Which of the following is the greatest expense for companies using Linux?
Answer
Selected Answer:
Hiring people to maintain the Linux system
Correct Answer:
Hiring people to maintain the Linux system
Question 5
1 out of 1 points
A(n) ____ is a piece of software that tells the operating system how to use a specific hardware device.
Answer
Selected Answer:
device driver
Correct Answer:
device driver
Question 6
1 out of 1 points
HOWTO documents are centrally collected by the ____.
Answer
Selected Answer:
Linux Documentation Project
Correct Answer:
Linux Documentation Project
Question 7
1 out of 1 points
Linux is based on the Windows operating system.
Answer
Selected Answer:
False
Correct Answer: False
Question 8
1 out of 1 points
The core component of the GUI in Linux is referred to as ____.
Answer
Selected Answer:
X Windows
Correct Answer:
X Windows
Question 9
1 out of 1 points
A ____ is merely a compressed archive of files that usually contain scripts that install the software contents to the correct location on the system.
Answer
Selected Answer:
tarball
Correct Answer:
tarball
Question 10
1 out of 1 points
The ____ stipulates that the source code of any software published under its license must be freely available.
Answer
Selected Answer:
GNU General Public License
Correct Answer:
GNU General Public License
Question 11
1 out of 1 points
The concept of ____ enables software developers to read other developers’ source code, modify that source code to make the software better, and redistribute that source code to other developers who might improve it further.
Answer
Selected Answer:
Open Source Software
Correct Answer:
Open Source Software
Question 12
1 out of 1 points
Solaris, HP-UX and AIX are all ____ of Unix.
Answer
Selected Answer:
flavors
Correct Answer:
flavors
Question 13
1 out of 1 points
A(n) ____ service provides an efficient method for transferring files over the Internet.
Answer
Selected Answer:
FTP
Correct Answer:
FTP
Question 14
1 out of 1 points
Linux kernel version 2.5.9 is a(n) ____________________ kernel.
Answer
Selected Answer: developmental
Correct Answer:
Evaluation Method Correct Answer Case Sensitivity
Exact Match developmental
Question 15
1 out of 1 points
Each computer participating on the Internet must have an IP address.