Unix
Unix
1. Which symbol will be used with grep command to match the pattern pat at the beginning of
a line?
A) ^pat
B) $pat
C) pat$
D) pat^
Answer : A
______________________________________________________________________www.study2online.com
2. Which command is used to sort the lines of data in a file in reverse order
A) sort
B) sh
C) st
D) sort -r
Answer : D
______________________________________________________________________www.study2online.com
4. Which command is used to copy all files having the string chap and any two characters after
that to the progs directory?
A) cp chap?? progs
B) cp chap* progs
C) cp chap[12] /progs/*.*
D) cp chap?? /progs/*
Answer : A
______________________________________________________________________www.study2online.com
5. Which command is used to change protection mode of files starting with the string emp and
7. Which of the following keys is used to replace a single character with new text?
A) S
B) s
C) r
D) C
Answer : B
______________________________________________________________________www.study2online.com
9. Which command sends the word count of the file infile to the newfile.
A) wc infile >newfile
B) wc newfile
C) wc infile - newfile
D) wc infile | newfile
Answer : A
______________________________________________________________________www.study2online.com
10. Which command is used to remove the read permission of the file 'note' from both the
group and others?
A) chmod go+r note
B) chmod go+rw note
C) chmod go-x note
D) chmod go-r note
Answer : D
______________________________________________________________________www.study2online.com
11. Which of the following commands is used to display the directory attributes rather than its
contents?
A) ls -l -d
B) ls -l
C) ls -x
D) ls -F
Answer : A
______________________________________________________________________www.study2online.com
12. Which of the following files will displayed by this command cat *ch*
A) patch
B) catch
C) .ch
D) All of the above
Answer : D
______________________________________________________________________www.study2online.com
13. The Octal number to be given alogn with chmod command to make a file readable,
writable and executable to the owner, readable and executable to group and others is:
A) 0
B) 755
C) 744
D) 555
Answer : B
______________________________________________________________________www.study2online.com
14. If you are to use [Control-c] as the interrupt key instead of [Del], then you will have to use
A) tty ^c
B) stty intr ^c
C) stty echoe
D) stty echo ^a
Answer : B
______________________________________________________________________www.study2online.com
16. Which of the following keys is used to move the cursor to the end of the paragraph.
A) }
B) {
C) |
D) $
Answer : A
______________________________________________________________________www.study2online.com
17. Which command is used to concatenate all files beginning with the string 'emp' and
followed by a non-numeric characters?
A) cat emp[!0-9]
B) more [emp][!0-9]
C) cat emp[x-z]
D) cat emp[a-z]
Answer : A
______________________________________________________________________www.study2online.com
18. The command which transcribes the standard input to the standard output and also makes a
copy of the same in a file is
A) tee
B) tr
C) sort
D) grep
Answer : A
______________________________________________________________________www.study2online.com
20. Which symbol is used to separate more than one command in the same command line?
A) $
B) #
C) :
D) ;
Answer : D
______________________________________________________________________www.study2online.com
21. The agency that sits between the user and the UNIX system is called the
A) logic
B) profile
C) shell
D) erxc
Answer : C
______________________________________________________________________www.study2online.com
22. Which of the following commands is used to update access and modification times of a
file?
A) grep
B) wc
C) touch
D) cat
Answer : C
______________________________________________________________________www.study2online.com
23. Which command is used to count just the number of characters in a file?
A) wc - 1
B) wc -c
C) wc -w
D) wc -r
Answer : B
______________________________________________________________________www.study2online.com
26. Which command will be used with vi editor to insert text to left of cursor?
A) s
B) S
C) a
D) i
Answer : D
______________________________________________________________________www.study2online.com
28. Which of the following special shell variables is used to process number of the last
background job?
A) $!
B) $#
C) $0
D) $*
Answer : A
______________________________________________________________________www.study2online.com
29. Which option will be used with ps command to slow the entire command line of the
process being run?
A) -4
B) #NAME?
C) -1
D) -2
Answer : B
______________________________________________________________________www.study2online.com
30. Which of the following command addresses all users who are currently hooked on?
A) write
B) mail
C) wall
D) mesg
Answer : C
______________________________________________________________________www.study2online.com
31. Which option is used with rm command to make the command prompt the user with each
filename and a ?, before acting on it
A) -r
B) #NAME?
C) #NAME?
D) -1
Answer : C
______________________________________________________________________www.study2online.com
32. Which of the following directories contain all the Alias created by a user, including his
login directory?
A) /tmp
B) /etc
C) /usr
D) /dev
Answer : C
______________________________________________________________________www.study2online.com
33. Which of the following commands is used to obtain a list of all files by modification time?
A) ls -1
B) ls -t
C) ls -i
D) ls -R
Answer : B
______________________________________________________________________www.study2online.com
Answer : A
______________________________________________________________________www.study2online.com
36. Which of the following commands is used to identify the type of file by context?
A) ls
B) cat
C) file
D) more
Answer : C
______________________________________________________________________www.study2online.com
38. Which of the following options will be used to display number of blocks used by a file?
A) -c
B) #NAME?
C) #NAME?
D) #NAME?
Answer : D
______________________________________________________________________www.study2online.com
39. Which command is used to make all files and sub-directories in the directory (progs)
41. The second set of the three permissions (r-) indicates that
A) group has read permission only
B) other has read permission only
C) owner has read permission only
D) group has write permission only
Answer : A
______________________________________________________________________www.study2online.com
42. Which column contains all details of the permissions of a file when you issue the ls -l
command?
A) second
B) fourth
C) third
D) first
Answer : D
______________________________________________________________________www.study2online.com
43. Which of the following commands is used to display your working directory?
A) dir
B) prompt $p$g
C) pwd
D) path
Answer : C
______________________________________________________________________www.study2online.com
44. While working with mail command, which command is used to save mail in a separate
file?
A) s
B) r
C) w
D) d
Answer : A
______________________________________________________________________www.study2online.com
______________________________________________________________________www.study2online.com
48. Which of the following files contains information related to password aging?
A) Shadow
B) password
C) profile
D) All the three
Answer : B
______________________________________________________________________www.study2online.com
49. Which command will be used with vi editor to replace text from cursor to right?
A) r
B) R
C) s
D) S
Answer : B
______________________________________________________________________www.study2online.com