We saw the mention on the Linux BIOS website about one million
devices shipped with Linux BIOS. Could you tell us more about these
devices?
Yes, these are internet terminals that were built in India, based on the [x86
system-on-chip] STPC chip, I am told; also, there evidently is a Turkish-built
digital TV that runs Linux BIOS. I have also heard that there are routers and
many other embedded devices running Linux BIOS. I think at this point that
1 million is a low number. I am in contact with other set-top box vendors
that are talking about numbers in the 10s of millions for their products.
These numbers actually make the OLPC numbers seem small, which is in it
amazing.
How do you see your role fitting into the NCLB goals? With district
goals? With building goals? With departmental goals?
As Instructional Media and Technology Coordinator, my role is to help others
realize the promise of technology to impact teaching, learning and
leadership. Effectively integrating technology, using digital content to
enhance learning to foster inquiry, analysis, collaboration, and creativity is
what NCLB Title 2, Part D is about. Aligning federal, state, district and
building goals can only be done by facilitating ever-deepening conversations
about what it means to use digital content and technology to change teacher
and leadership practices. My role specifically has to focus on helping
teachers and administrators SEE what teaching and learning can be like,
then supporting them as they grow to discover their own technology-
enhanced teaching style. In fact, in my previous position, 3 initiatives were
celebrated as success stories in the new Educational Technology Plan.
Aside from serving as a leader, I’m also committed to handling the day-to-
day aspects of dealing with technology equipment, software and supply
purchases. While I am a guide on the side in the use of technology in the
classroom, I can take a role that is more active when ensure district
compliance with appropriate laws and administrative procedures. Technology
can bridge the chasm between classrooms, public perception, and
administrative procedure. Increasing transparency of what we are doing is
frightening. However, being unafraid in front of your class, your peers, to
the benefit of all, is exactly what we’re called to do as educators.
What is NV-RAM?
Nonvolatile Read Write Memory, also called Flash memory. It is also know as
shadow RAM
What is stack?
Stack is a portion of RAM used for saving the content of Program Counter
and general purpose registers.
What is flag?
Flag is a flip-flop used to store the information about the status of a
processor and the status of the instruction executed most recently
What is a compiler?
Compiler is used to translate the high-level language program into machine
code at a time. It doesn’t require special instruction to store in a memory, it
stores automatically. The Execution time is less compared to Interpreter.
Define HCMOS?
High-density n- type Complimentary Metal Oxide Silicon field effect
transistor.
What is a Microprocessor?
Microprocessor is a program-controlled device, which fetches the instructions
from memory, decodes and executes the instructions. Most Micro Processor
is single- chip devices.
What would you type to send the last 20 lines of a text file to STDIN?
Use the command tail -20 filename to see the last 20 lines of a file. The
answers for a and d both point to an invalid command. The answer for b
points to a valid command. Typing this answer in with a valid file name will
even give you some output. However, the last command tells you who is
logged in, it does not actually list the contents of any file named in the
command. The answer for c, the head command, is used to look at the
beginning of a file, not the end.
last choice will be correct answer because only tail command is used to see
the last content of any file by default it take 10 line
Which daemon controls the network service -> POP3 mail service?
The intend super daemon controls the POP3 mail service. The POP3 mail
service runs through the super daemon, not on its own. Answers c and e
point to nonexistent, or at least nonstandard daemons. Answer d points to
the Usenet news
daemon.
You want to search for sale and sales. What regular expression
should you use?
Use the asterick (*) to match to zero or more characters. The ‘$’ matches to
any one character so sale$ would not find sale.
You have a file named ‘kickoff’ and would like to find every line
beginning with a number. Which of the following commands will
accomplish this?
The command grep ^[0-9] kickoff will cause grep to search the file kickoff
for any line beginning with a digit.
You want to know how many lines in the kickoff file contains ‘prize’.
Which of the following commands will produce the desired results?
Using the -c option with the grep command will show the total number of
lines containing the specified pattern rather than displaying the lines
containing the pattern.
You want to verify which lines in the file kickoff contain ‘Bob’. Which
of the following commands will accomplish this?
The -n option when used with sed prints only the lines containing the
pattern. In this case, the pattern is ‘Bob’ and the file to be searched is
kickoff.
You have a file called docs.Z but do not know what it is. What is the
easiest way to look at the contents of the file?
The .Z extension indicates that this is a file that has been compressed using
the compress utility. The zcat utility provides the ability to display the
contents of a compressed file.
You want to make it possible for your users to mount floppy disks.
What do you need to do?
If you add the user option to the line in the fstab file that defines how to
mount your CD-ROM, then your users will be able to mount it.
What is contained in the directory
The /proc directory is a virtual file system that contains system information.
You have set quotas for all your users but half of your users are
using more space than they have been allotted. Which of the
following could be the problem?
Quotas are set on a partition by partition basis. If your users have home
directories on different partitions, you will need to configure quotas for each
partition.
What command should you use to check the number of files and disk
space used and each user’s defined quotas?
The repquota command is used to get a report on the status of the quotas
you have set including the amount of allocated space and amount of used
space.
you have a large spreadsheet located in the /data directory that five
different people need to be able to change. How can you enable each
user to edit the spreadsheet from their individual home directories?
By creating a link to the file in each user’s home directory, each user is able
to easily open and edit the spreadsheet. Also, any changes that are made
are seen by all the users with access.
You have a file called sales data and create symbolic links to it in
bob’s home directory. Bob calls you and says that his link no longer
works. How can you fix the link?
Because the link in bob’s directory is a symbolic link, if the file sales data in
the /data directory is deleted, the symbolic link will no longer work.
You have two files in two different directories with the same inode.
What type of link is involved?
Hard links all have the same inode number, unlike symbolic links.
You need to locate a file called sales data that one of your user’s
created in his home directory but you do not know which one. How
could you use the find command to locate this file?
When using the find command to locate a file by name you must specify the
starting place in the directory
hierarchy and the -name option to specify the file to search for.
You have a tab delimited file called phonenos and want to change
each tab to four spaces. What command can you use to accomplish
this?
By default, expand converts tabs to eight spaces. Use the -t option to
change this behavior.
You issue the command head *. What would the resulting output be?
If the number of lines to display is not specified, the first ten lines of the
specified file are displayed. The asterick tells head to display the content of
each file in the present working directory.
what text filter can you use to display a binary file in octal numbers?
The od text filter will dumpt the contents of a file and display it in 2-byte
octal numbers.
You wish to print the file vacations with 60 lines to a page. Which of
the following commands will accomplish this?
The default page length when using pr is 66 lines. The -l option is used to
specify a different length.
You need to see the last fifteen lines of the files dog, cat and horse.
What command should you use?
The tail utility displays the end of a file. The -15 tells tail to display the last
fifteen lines of each specified file.
You have the file phonenos that contains telephone numbers and
names separated by a comma. You want to change each comma to a
semicolon. Which of the following will accomplish this?
The tr utility is used to replace one string by another. Here the input for tr is
provided by the cat command and the commas are all replaced by
semicolons.
If you type the command cat dog > cat what would you see on your
display?
When you use > for redirection, it only effects the standard output. Any
messages sent to standard error would still appear on your display.
What type of local file server can you use to provide the distribution
installation materials to the new machine during a network
installation?
You can use an NFS server to provide the distribution installation materials
to the machine on which you are performing the installation. Answers a, b,
c, and d are all valid items but none of them are file servers. Inetd is the
superdaemon which controls all intermittently used network services. The
FSSTND is the Linux File System Standard. DNS provides domain name
resolution, and NNTP is the transfer protocol for usenet news.
Which daemon controls the network service -> POP3 mail service?
The inetd superdaemon controls the POP3 mail service. The POP3 mail
service runs through the superdaemon, not on its own. Answers c and e
point to nonexistent, or at least nonstandard daemons. Answer d points to
the Usenet news daemon.
What is SELinux?
SELinux
Security-enhanced Linux is a research prototype of the Linux® kernel and a
number of utilities with enhanced security functionality designed simply to
demonstrate the value of mandatory access controls to the Linux community
and how such controls could be added to Linux. The Security-enhanced
Linux kernel contains new architectural components originally developed to
improve the security of the Flask operating system. These architectural
components provide general support for the enforcement of many kinds of
mandatory access control policies, including those based on the concepts of
Type Enforcement®, Role-based Access Control, and Multi-level Security.
What is the most graceful way to get to run level single user mode?
The most graceful way is to use the command init s.
If you want to shut everything down before going to single user mode then
do init 0 first and from the ok prompt do a boot -s.
Write a command to find all of the files which have been accessed within the
last 10 days.
The following command will find all of the files which have been accessed
within the last 10 days
find / -type f -atime -10 > December.files
This command will find all the files under root, which is ‘/’, with file type is
file. ‘-atime -30′ will give all the files accessed less than 10 days ago. And
the output will put into a file call Monthname.files.
What is LILO?
LILO stands for Linux boot loader. It will load the MBR, master boot record,
into the memory, and tell the system which partition and hard drive to boot
from.
What is CVS?
CVS is Concurrent Version System. It is the front end to the RCS revision
control system which extends the notion of revision control from a collection
of files in a single directory to a hierarchical collection of directories
consisting of revision controlled files. These directories and files can be
combined together to form a software release.
There are some useful commands that are being used very often. They are
cvs checkout
cvs update
cvs add
cvs remove
cvs commit
What is NFS? What is its job?
NFS stands for Network File System. NFS enables filesystems physically
residing on one computer system to be used by other computers in the
network, appearing to users on the remote host as just another local disk.
What are the techniques that you use to handle the collisions in hash
tables?
We can use two major techniques to handle the collisions. They are open
addressing and separate chaining. In open addressing, data items that hash
to a full array cell are placed in another cell in the array. In separate
chaining, each array element consists of a linked list. All data items hashing
to a given array index are inserted in that list.
When you create a new partition, you need to designate its size by
defining the starting and ending?
cylinders-When creating a new partition you must first specify its starting
cylinder. You can then either specify its size or the ending cylinder.
What can you type at a command line to determine which shell you
are using?
echo $SHELL-The name and path to the shell you are using is saved to the
SHELL environment variable. You can then use the echo command to print
out the value of any variable by preceding the variable’s name with $.
Therefore, typing echo $SHELL will display the name of your shell.
In order to display the last five commands you have entered using
the fc command, you would type?
fc -5-The fc command can be used to edit or rerun commands you have
previously entered. To specify the number of commands to list, use -n.
What file defines the levels of messages written to system log files?
kernel.h-To determine the various levels of messages that are defined on
your system, examine the kernel.h file.
5. What structure can you implement for the database to speed up table reads? -
Follow the rules of DB tuning we have to: 1] properly use indexes ( different types of
indexes) 2] properly locate different DB objects across different tablespaces, files and so
on.3] create a special space (tablespace) to locate some of the data with special datatype (
for example CLOB, LOB and …)
6. What are the tradeoffs with having indexes? - 1. Faster selects, slower updates. 2.
Extra storage space to store indexes. Updates are slower because in addition to updating
the table you have to update the index.
7. What is a "join"? - ‘join’ used to connect two or more tables logically with or without
common field.
8. What is "normalization"? "Denormalization"? Why do you sometimes want to
denormalize? - Normalizing data means eliminating redundant information from a table
and organizing the data so that future changes to the table are easier. Denormalization
means allowing redundancy in a table. The main benefit of denormalization is improved
performance with simplified data retrieval and manipulation. This is done by reduction in
the number of joins needed for data processing.
9. What is a "constraint"? - A constraint allows you to apply simple referential integrity
checks to a table. There are four primary types of constraints that are currently supported
by SQL Server: PRIMARY/UNIQUE - enforces uniqueness of a particular table column.
DEFAULT - specifies a default value for a column in case an insert operation does not
provide one. FOREIGN KEY - validates that every value in a column exists in a column
of another table. CHECK - checks that every value stored in a column is in some
specified list. Each type of constraint performs a specific type of action. Default is not a
constraint. NOT NULL is one more constraint which does not allow values in the specific
column to be null. And also it the only constraint which is not a table level constraint.
10. What types of index data structures can you have? - An index helps to faster search
values in tables. The three most commonly used index-types are: - B-Tree: builds a tree
of possible values with a list of row IDs that have the leaf value. Needs a lot of space and
is the default index type for most databases. - Bitmap: string of bits for each possible
value of the column. Each bit string has one bit for each row. Needs only few space and
is very fast.(however, domain of value cannot be large, e.g. SEX(m,f);
degree(BS,MS,PHD) - Hash: A hashing algorithm is used to assign a set of characters to
represent a text string such as a composite of keys or partial keys, and compresses the
underlying data. Takes longer to build and is supported by relatively few databases.
11. What is a "primary key"? - A PRIMARY INDEX or PRIMARY KEY is something
which comes mainly from
database theory. From its behavior is almost the same as an UNIQUE INDEX, i.e. there
may only be one of each value in this column. If you call such an INDEX PRIMARY
instead of UNIQUE, you say something about
your table design, which I am not able to explain in few words. Primary Key is a type of
a constraint enforcing uniqueness and data integrity for each row of a table. All columns
participating in a primary key constraint must possess the NOT NULL property.
12. What is a "functional dependency"? How does it relate to database table design? -
Functional dependency relates to how one object depends upon the other in the database.
for example, procedure/function sp2 may be called by procedure sp1. Then we say that
sp1 has functional dependency on sp2.
13. What is a "trigger"? - Triggers are stored procedures created in order to enforce
integrity rules in a database. A trigger is executed every time a data-modification
operation occurs (i.e., insert, update or delete). Triggers are executed automatically on
occurance of one of the data-modification operations. A trigger is a database object
directly associated with a particular table. It fires whenever a specific statement/type of
statement is issued against that table. The types of statements are insert,update,delete and
query statements. Basically, trigger is a set of SQL statements A trigger is a solution to
the restrictions of a constraint. For instance: 1.A database column cannot carry PSEUDO
columns as criteria where a trigger can. 2. A database constraint cannot refer old and new
values for a row where a trigger can.
14. Why can a "group by" or "order by" clause be expensive to process? - Processing of
"group by" or "order by" clause often requires creation of Temporary tables to process
the results of the query. Which depending of the result set can be very expensive.
15. What is "index covering" of a query? - Index covering means that "Data can be found
only using indexes, without touching the tables"
16. What types of join algorithms can you have?
17. What is a SQL view? - An output of a query can be stored as a view. View acts like
small table which meets our criterion. View is a precomplied SQL query which is used to
select data from one or more tables. A view is like a table but it doesn’t physically take
any space. View is a good way to present data in a particular format if you use that query
quite often. View can also be used to restrict users from accessing the tables directly.
Linux command line Q&A
1. You need to see the last fifteen lines of the files dog, cat and horse. What command
should you use?
tail -15 dog cat horse
The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines
of each specified file.
2. Who owns the data dictionary?
The SYS user owns the data dictionary. The SYS and SYSTEM users are created when
the database is created.
3. You routinely compress old log files. You now need to examine a log from two
months ago. In order to view its contents without first having to decompress it, use
the _________ utility.
zcat
The zcat utility allows you to examine the contents of a compressed file much the same
way that cat displays a file.
4. You suspect that you have two commands with the same name as the command is
not producing the expected results. What command can you use to determine the
location of the command being run?
which
The which command searches your path until it finds a command that matches the
command you are looking for and displays its full path.
5. You locate a command in the /bin directory but do not know what it does. What
command can you use to determine its purpose.
whatis
The whatis command displays a summary line from the man page for the specified
command.
6. You wish to create a link to the /data directory in bob’s home directory so you issue
the command ln /data /home/bob/datalink but the command fails. What option
should you use in this command line to be successful.
Use the -F option
In order to create a link to a directory you must use the -F option.
7. When you issue the command ls -l, the first character of the resulting display
represents the file’s ___________.
type
The first character of the permission block designates the type of file that is being
displayed.
8. What utility can you use to show a dynamic listing of running processes?
__________
top
The top utility shows a listing of all running processes that is dynamically updated.
9. Where is standard output usually directed?
to the screen or display
By default, your shell directs standard output to your screen or display.
10. You wish to restore the file memo.ben which was backed up in the tarfile
MyBackup.tar. What command should you type?
tar xf MyBackup.tar memo.ben
This command uses the x switch to extract a file. Here the file memo.ben will be restored
from the tarfile MyBackup.tar.
11. You need to view the contents of the tarfile called MyBackup.tar. What command
would you use?
tar tf MyBackup.tar
The t switch tells tar to display the contents and the f modifier specifies which file to
examine.
12. You want to create a compressed backup of the users’ home directories. What
utility should you use?
tar
You can use the z modifier with tar to compress your archive at the same time as creating
it.
13. What daemon is responsible for tracking events on your system?
syslogd
The syslogd daemon is responsible for tracking system information and saving it to
specified log files.
14. You have a file called phonenos that is almost 4,000 lines long. What text filter can
you use to split it into four pieces each 1,000 lines long?
split
The split text filter will divide files into equally sized pieces. The default length of each
piece is 1,000 lines.
15. You would like to temporarily change your command line editor to be vi. What
command should you type to change it?
set -o vi
The set command is used to assign environment variables. In this case, you are
instructing your shell to assign vi as your command line editor. However, once you log
off and log back in you will return to the previously defined command line editor.
16. What account is created when you install Linux?
root
Whenever you install Linux, only one user account is created. This is the superuser
account also known as root.
17. What command should you use to check the number of files and disk space used and
each user’s defined quotas?
repquota
The repquota command is used to get a report on the status of the quotas you have set
including the amount of allocated space and amount of used space.
Linux application programming questions
1. Explain the difference between a static library and a dynamic library? - Static
library is linked into the executable, while a dynamic library (or shared object) is loaded
while the executable has started.
2. How do you create a static library? - If you have a collection of object (.o) files, you
can do it by running ar command. Generally a static library has a .a extension, and you
can link it into an executable by providing -l libraryname to gcc.
3. Where should the developed libraries be installed on the system? - GNU recommends
/usr/local/bin for binaries and /usr/local/lib for libraries.
4. What’s LD_LIBRARY_PATH? - It’s an environment variable that lists all the
directories which should be searches for libraries before the standard directories are
searched.
5. How do you create a shared library? - Create the object file with -fPIC for position-
independent code, then run gcc with -shared option.
6. How do you install a shared library? - Run ldconfig in the standard directory that it’s
installed in.
7. What does ldd do? - It shows a list of installed shared libraries.
8. How do you dynamically load a library in your app? - Use dlopen()
9. What does nm command do? - It reports the list of symbols in a given library.
The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each
specified file.
You routinely compress old log files. You now need to examine a log from two months ago.
In order to view its contents without first having to decompress it, use the _________
utility.
zcat
The zcat utility allows you to examine the contents of a compressed file much the same way that
cat displays a file.
You suspect that you have two commands with the same name as the command is not
producing the expected results. What command can you use to determine the location of
the command being run?
which
The which command searches your path until it finds a command that matches the command you
are looking for and displays its full path.
You locate a command in the /bin directory but do not know what it does. What command
can you use to determine its purpose.
whatis
The whatis command displays a summary line from the man page for the specified command.
You wish to create a link to the /data directory in bob's home directory so you issue the
command ln /data /home/bob/datalink but the command fails. What option should you use
in this command line to be successful.
Use the -F option
When you issue the command ls -l, the first character of the resulting display represents the
file's ___________.
type
The first character of the permission block designates the type of file that is being displayed.
What utility can you use to show a dynamic listing of running processes? __________
top
The top utility shows a listing of all running processes that is dynamically updated.
You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar.
What command should you type?
tar xf MyBackup.tar memo.ben
This command uses the x switch to extract a file. Here the file memo.ben will be restored from
the tarfile MyBackup.tar.
You need to view the contents of the tarfile called MyBackup.tar. What command would
you use?
tar tf MyBackup.tar
The t switch tells tar to display the contents and the f modifier specifies which file to examine.
You want to create a compressed backup of the users' home directories. What utility
should you use?
tar
You can use the z modifier with tar to compress your archive at the same time as creating it.
The syslogd daemon is responsible for tracking system information and saving it to specified log
files.
You have a file called phonenos that is almost 4,000 lines long. What text filter can you use
to split it into four pieces each 1,000 lines long?
split
The split text filter will divide files into equally sized pieces. The default length of each piece is
1,000 lines.
You would like to temporarily change your command line editor to be vi. What command
should you type to change it?
set -o vi
The set command is used to assign environment variables. In this case, you are instructing your
shell to assign vi as your command line editor. However, once you log off and log back in you
will return to the previously defined command line editor.
Whenever you install Linux, only one user account is created. This is the superuser account also
known as root.
What command should you use to check the number of files and disk space used and each
user's defined quotas?
repquota
The repquota command is used to get a report on the status of the quotas you have set including
the amount of allocated space and amount of used space.
In order to run fsck on the root partition, the root partition must be mounted as
readonly
In order to improve your system's security you decide to implement shadow passwords.
What command should you use?
pwconv
The pwconv command creates the file /etc/shadow and changes all passwords to 'x' in the
/etc/passwd file.
Bob Armstrong, who has a username of boba, calls to tell you he forgot his password. What
command should you use to reset his command?
passwd boba
The passwd command is used to change your password. If you do not specify a username, your
password will be changed.
The top utility can be used to change the priority of a running process? Another utility that
can also be used to change priority is ___________?
nice
Both the top and nice utilities provide the capability to change the priority of a running process.
What command should you type to see all the files with an extension of 'mem' listed in
reverse alphabetical order in the /home/ben/memos directory.
ls -r /home/ben/memos/*.mem
The -c option used with ls results in the files being listed in chronological order. You can use
wildcards with the ls command to specify a pattern of filenames.
To determine the various levels of messages that are defined on your system, examine the
kernel.h file.
The gpasswd command is used to change the password assigned to a group. Use the -r option to
remove the password from the group.
What command would you type to use the cpio to create a backup called backup.cpio of all
the users' home directories?
find /home | cpio -o > backup.cpio
The find command is used to create a list of the files and directories contained in home. This list
is then piped to the cpio utility as a list of files to include and the output is saved to a file called
backup.cpio.
What can you type at a command line to determine which shell you are using?
echo $SHELL
The name and path to the shell you are using is saved to the SHELL environment variable. You
can then use the echo command to print out the value of any variable by preceding the variable's
name with $. Therefore, typing echo $SHELL will display the name of your shell.
What type of local file server can you use to provide the distribution installation materials
to the new machine during a network installation?
A) Inetd
B) FSSTND
C) DNS
D) NNTP
E) NFS
E - You can use an NFS server to provide the distribution installation materials to the machine
on which you are performing the installation. Answers a, b, c, and d are all valid items but none
of them are file servers. Inetd is the superdaemon which controls all intermittently used network
services. The FSSTND is the Linux File System Standard. DNS provides domain name
resolution, and NNTP is the transfer protocol for usenet news.
If you type the command cat dog & > cat what would you see on your display? Choose one:
a. Any error messages only.
b. The contents of the file dog.
c. The contents of the file dog and any error messages.
d. Nothing as all output is saved to the file cat.
When you use & > for redirection, it redirects both the standard output and standard error. The
output would be saved to the file cat.
You are covering for another system administrator and one of the users asks you to restore
a file for him. You locate the correct tarfile by checking the backup log but do not know
how the directory structure was stored. What command can you use to determine this?
Choose one:
a. tar fx tarfile dirname
b. tar tvf tarfile filename
c. tar ctf tarfile
d. tar tvf tarfile
The t switch will list the files contained in the tarfile. Using the v modifier will display the stored
directory structure.
You have the /var directory on its own partition. You have run out of space. What should
you do? Choose one:
a. Reconfigure your system to not write to the log files.
b. Use fips to enlarge the partition.
c. Delete all the log files.
d. Delete the partition and recreate it with a larger size.
The only way to enlarge a partition is to delete it and recreate it. You will then have to restore the
necessary files from backup.
You have a new application on a CD-ROM that you wish to install. What should your first
step be?
Choose one:
a. Read the installation instructions on the CD-ROM.
b. Use the mount command to mount your CD-ROM as read-write.
c. Use the umount command to access your CD-ROM.
d. Use the mount command to mount your CD-ROM as read-only.
Before you can read any of the files contained on the CD-ROM, you must first mount the CD-
ROM.
When you create a new partition, you need to designate its size by defining the starting and
ending _____________.
cylinders
When creating a new partition you must first specify its starting cylinder. You can then either
specify its size or the ending cylinder.
The easiest, most basic form of backing up a file is to _____ it to another location.
copy
The easiest most basic form of backing up a file is to make a copy of that file to another location
such as a floppy disk.
What type of server is used to remotely assign IP addresses to machines during the
installation process?
A) SMB
B) NFS
C) DHCP
D) FT
E) HTTP
C - You can use a DHCP server to assign IP addresses to individual machines during the
installation process. Answers a, b, d, and e list legitimate Linux servers, but these servers do not
provide IP addresses. The SMB, or Samba, tool is used for file and print sharing across multi-OS
networks. An NFS server is for file sharing across Linux net-works. FTP is a file storage server
that allows people to browse and retrieve information by logging in to it, and HTTP is for the
Web.
Which password package should you install to ensure that the central password file
couldn't be stolen easily?
A) PAM
B) tcp_wrappers
C) shadow
D) securepass
E) ssh
C - The shadow password package moves the central password file to a more secure location.
Answers a, b, and e all point to valid packages, but none of these places the password file in a
more secure location. Answer d points to an invalid package.
When using useradd to create a new user account, which of the following tasks is not done
automatically.
Choose one:
a. Assign a UID.
b. Assign a default shell.
c. Create the user's home directory.
d. Define the user's home directory.
The useradd command will use the system default for the user's home directory. The home
directory is not created, however, unless you use the -m option.
You want to enter a series of commands from the command-line. What would be the
quickest way to do this?
Choose One
a. Press enter after entering each command and its arguments
b. Put them in a script and execute the script
c. Separate each command with a semi-colon (;) and press enter after the last command
d. Separate each command with a / and press enter after the last command
The semi-colon may be used to tell the shell that you are entering multiple commands that should
be executed serially. If these were commands that you would frequently want to run, then a script
might be more efficient. However, to run these commands only once, enter the commands
directly at the command line.
You attempt to use shadow passwords but are unsuccessful. What characteristic of the
/etc/passwd file may cause this?
Choose one:
a. The login command is missing.
b. The username is too long.
c. The password field is blank.
d. The password field is prefaced by an asterisk.
The password field must not be blank before converting to shadow passwords.
When you install a new application, documentation on that application is also usually
installed. Where would you look for the documentation after installing an application
called MyApp?
Choose one:
a. /usr/MyApp
b. /lib/doc/MyApp
c. /usr/doc/MyApp
d. In the same directory where the application is installed.
The default location for application documentation is in a directory named for the application in
the /usr/doc directory.
What file would you edit in your home directory to change which window manager you
want to use?
A) Xinit
B) .xinitrc
C) XF86Setup
D) xstart
E) xf86init
Answer: B - The ~/.xinitrc file allows you to set which window man-ager you want to use when
logging in to X from that account.
Answers a, d, and e are all invalid files. Answer c is the main X server configuration file.
What command allows you to set a processor-intensive job to use less CPU time?
A) ps
B) nice
C) chps
D) less
E) more
Answer: B - The nice command is used to change a job's priority level, so that it runs slower or
faster. Answers a, d, and e are valid commands but are not used to change process information.
Answer c is an invalid command.
While logged on as a regular user, your boss calls up and wants you to create a new user
account immediately. How can you do this without first having to close your work, log off
and logon as root?
Choose one:
a. Issue the command rootlog.
b. Issue the command su and type exit when finished.
c. Issue the command su and type logoff when finished.
d. Issue the command logon root and type exit when finished.
Answer: b
You can use the su command to imitate any user including root. You will be prompted for the
password for the root account. Once you have provided it you are logged in as root and can do
any administrative duties.
Which of the following commands will show a list of the files in your home directory
including hidden files and the contents of all subdirectories?
Choose one:
a. ls -c home
b. ls -aR /home/username
c. ls -aF /home/username
d. ls -l /home/username
Answer: b
The ls command is used to display a listing of files. The -a option will cause hidden files to be
displayed as well. The -R option causes ls to recurse down the directory tree. All of this starts at
your home directory.
In order to prevent a user from logging in, you can add a(n) ________at the beginning of
the password field.
Answer: asterick
If you add an asterick at the beginning of the password field in the /etc/passwd file, that user will
not be able to log in.
Which of the following tasks is not necessary when creating a new user by editing the
/etc/passwd file?
Choose one:
a. Create a link from the user's home directory to the shell the user will use.
b. Create the user's home directory
c. Use the passwd command to assign a password to the account.
d. Add the user to the specified group.
Answer: a
There is no need to link the user's home directory to the shell command. Rather, the specified
shell must be present on your system.
You issue the following command useradd -m bobm But the user cannot logon. What is the
problem?
Choose one:
a. You need to assign a password to bobm's account using the passwd command.
b. You need to create bobm's home directory and set the appropriate permissions.
c. You need to edit the /etc/passwd file and assign a shell for bobm's account.
d. The username must be at least five characters long.
Answer: a
The useradd command does not assign a password to newly created accounts. You will still need
to use the passwd command to assign a password.
You wish to print the file vacations with 60 lines to a page. Which of the following
commands will accomplish this? Choose one:
a. pr -l60 vacations | lpr
b. pr -f vacations | lpr
c. pr -m vacations | lpr
d. pr -l vacations | lpr
Answer: a
The default page length when using pr is 66 lines. The -l option is used to specify a different
length.
Linux Interview Questions And Answers Set - 5
Which file defines all users on your system?
Choose one:
a. /etc/passwd
b. /etc/users
c. /etc/password
d. /etc/user.conf
Answer: a
The /etc/passwd file contains all the information on users who may log into your system. If a
user account is not contained in this file, then the user cannot log in.
Answer(s): B, C - You can use rmdir or rm -rf to delete a directory. Answer a is incorrect,
because the rm command without any specific flags will not delete a directory, it will only delete
files. Answers d and e point to a non-existent command.
Answer(s): B - The fdisk partitioning tool is available in all Linux distributions. Answers a, c,
and e all handle partitioning, but do not come with all distributions. Disk Druid is made by Red
Hat and used in its distribution along with some derivatives. Partition Magic and System
Commander are tools made by third-party companies. Answer d is not a tool, but a file system
type. Specifically, FAT32 is the file system type used in Windows 98.
Which partitions might you create on the mail server's hard drive(s) other than the root,
swap, and boot partitions?
[Choose all correct answers]
A) /var/spool
B) /tmp
C) /proc
D) /bin
E) /home
Answer(s): A, B, E - Separating /var/spool onto its own partition helps to ensure that if
something goes wrong with the mail server or spool, the output cannot overrun the file system.
Putting /tmp on its own partition prevents either software or user items in the /tmp directory from
overrunning the file system. Placing /home off on its own is mostly useful for system re-installs
or upgrades, allowing you to not have to wipe the /home hierarchy along with other areas.
Answers c and d are not possible, as the /proc portion of the file system is virtual-held in RAM-
not placed on the hard drives, and the /bin hierarchy is necessary for basic system functionality
and, therefore, not one that you can place on a different partition.
When planning your backup strategy you need to consider how often you will perform a
backup, how much time the backup takes and what media you will use. What other factor
must you consider when planning your backup strategy? _________
what to backup
Choosing which files to backup is the first step in planning your backup strategy.
In order to display the last five commands you have entered using the history command,
you would type ___________ .
Answer: history 5
The history command displays the commands you have previously entered. By passing it an
argument of 5, only the last five commands will be displayed.