Linux Questions Unit Wise
Linux Questions Unit Wise
1. What is a root account in Linux and how does it differ from a user account?
2. State whether true or false: “Only authorized users can access the Linux system.”
3. The Linux command for shutting down a Linux system is ______ and the command
for changing the user password is _________?
4. What would happen if an incorrect login name was entered by a user and the
username had a password associated with it? Can you kill your own login shell from
other terminal?
5. Describe login scripts and their order in various shells with the help of suitable
examples. (6)
6. How can passwords be changed in Linux? Which rules are followed while giving
passwords?
7. How passwords are managed in Linux? (2)
8. List the steps needed to add a user to a Linux system. What is the purpose of a
shadow password file? (3)
9. How do you perform disabling user accounts in Linux? (5)
10. Write a Linux command that will tell you about the number of users currently logged
onto the system? (5)
11. What is the usage of who and pwd command? (2)
12.
Unit 3
1. Draw the diagram of the standard Linux/Unix file system hierarchy and explain the role
of the bin, etc, lib, tmp, and dev directories. (8)
2. Describe the Linux file system. Describe salient features of the file system of Linux.
Explain the role of different directories used in it. (12)
3. What type of file system does Linux use? List four directories found at the root (/) level
of Linux and describe what kinds of files are kept there. (12)
4. What is the name of Linux’s own file system? (2)
5. Give an account on the Linux commands for managing files and directories. How do you
create null file in Linux? (5)
6. What happens to the text that is redirected to the file /dev/null? (2)
7. List important directories in the Linux file system and their purpose. (8)
8. Why Linux directory system is important? Explain various “responsibilities of all
facilities” offered by Linux Directory System.
9. Can you explain how the directory structure of Linux works?
10. Discuss in detail about the standard Linux subdirectories of the Root Directory. (7)
11. Explain the purpose of the following Linux directories: /bin, /dev, /etc, /home, /mnt,
/root, /sbin, /usr. (8)
12. Describe about directory representation in Linux.
13. What purpose does the /home directory serve? How is it referenced in the login process?
(2)
14. How directories are named in Linux? (4)
15. Match the following default file systems with their intended use: (5)
a. / (root) 1. System files that change or grow such as logs or spool areas
b. /usr 2. User home directories
c. /home 3. Kernel and device files
d. /var 4. Third-party software and applications
e. /opt 5. System commands and programs
16. Give difference between ext2 and ext3 Linux file system. How do you create these file
systems and convert from one file system type to another? (8)
17. Differentiate among ext2, ext3 and ext4 file systems. (8)
18. What is the /proc directory used for? (2)
19. What are various file types available in Linux? Explain with examples. (8)
20. What is a file? Write the rules of name them in Linux. Discuss different types of files
available in Linux. (6)
21. What are Pseudo File Systems? List significance of various pseudo file systems. (8)
22. Give synopsis, description, options and examples of tune2fs Linux command that allows
the system administrator to adjust various tunable file system parameters. (4)
23. In a Linux file system, there are multiple timestamps (usually 3) associated with each file.
What does each of these timestamps represent? (5)
24. For each of the following pairs of terms, identify the context in which they occur. Then
define each term and clarify the key difference between the two terms with examples:
a. File and directory
b. File and inode
25. What is the function of an i-node in Linux? (2)
26. Explain the structure of a directory with i-nodes.
27. What is an i-node? Explain with an example how i-nodes are allocated?
28. What is an inode in a Linux file system? Give six examples of fields contained in an
inode (other than pointers to disk blocks). (8)
29. A Linux i-node has 10 disk addresses for data blocks, as well as the addresses of single,
double and triple indirect blocks. If each of these holds 256 disk addresses, what is the
size of the largest file that can be handled, assuming that a disk block is 1KB?
30. A file containing 1500Kb of data is to be stored in a Linux file system with 1Kb data
blocks. Each indirect block can hold 256 disk addresses (i.e. 32-bits per address). What is
the total number of data blocks required to store this file (including all indirect blocks but
not the inode itself)? Explain your answer in detail. (7)
31. What is a Linux file system “superblock”? What purpose does it serve? What information
does it contain? How is this information protected? (5)
32. Summarize the differences between symbolic and hard links and differentiate between
using links and simply duplicating a file. (6)
33. What is the difference between hard links and soft links? When is it appropriate to use
one or the other? (5)
34. Explain the notion of links and why it is useful to have more than one name for a file.
Write the command to create a link between the name filelist and the ls command. (5)
35. Long pathnames are a pain to type in, is there any sort of shortcut you can use?
36. Give two examples of the advantages of relative pathnames over absolute ones in Linux.
(3)
37. Differentiate between absolute pathname and relative pathname in Linux.
38. Explain the facilities available in Linux for the following by taking suitable examples:
a. Removing files and directories
b. Concatenating files
c. Displaying beginning and End of files
d. Cut and paste
e. Sorting
39. How do “more” and “less” differ from “cat”? (2)
40. How can you create text files with cat? Can this method be used to alter an existing file?
41. Write the commands to create and delete files and directories. Give examples.
42. How can we create, move and copy files and directories in Linux? Write the syntax and
examples. (10)
43. Explain the command used to view detail of files and directories. (2)
44. Explain any four file manipulation commands.
45. Explain Linux system commands, which manipulate files and directories and control
processes, with the help of examples.
46. Write a Linux command that will list lines 5 through 10 in a given file
47. How do you remove only the hidden file of your directory?
48. Give a Linux command that merges the contents of files File1, File2 & File3 in that order
into a new file File4
49. Give a single Linux command, which will delete the sub directory from the current
working directory along with all the contents of the sub directory.
50. Give a Linux command to convert all digits in FileX into Question marks and save the
result to FileY ($cat filex | sed ‘s/[0-9]/?/g’ > filey)
51. Give a pipeline of Linux command that uses HEAD & TAIL to produce as output the
18th, 19th& 20th lines of the file OLD FILE ($ head -20 old file | tail - 3)
52. Which of the following characters are allowed as part of a file name under Linux?
a. +
b. S
c. /
d. \
e. @
f. >
g. .
53. Give a Linux command that will change the current working directory to the root
directory for the system
54. Explain and differentiate cp and mv commands. (2)
55. What is the effect of cd ~. (1)
56. Explain the difference and similarity between the following three commands: (2)
a. cp a b
b. cn a b
c. cp –l a b
57. Define and differentiate the following in Linux: (4)
a. cd and md
b. rm and rmdir
58.
Unit 5
1. What is sharing of files? How can file protection and security be maintained?
2. How Linux provide file protection? Examine this method with its merits/demerits.
3. How are file permissions assigned and removed from files? Discuss with examples.
4. What do you mean by file access permissions in Linux? How are they used? Discuss
Linux commands with syntax.
5. How can we change file and directory Permissions? Give commands and examples. (10)
6. Explain the different file access permission and different types of user.
7. Explain the security options available under standard Linux systems, including user IDs,
passwords and the use of owner, group and world rights.
8. What is the difference between umask and chmod? Explain the difference among the
following umask values: 077, 027, 022 and 755. How would you attempt to implement
one of these values as a site-wide default for new users? (9)
9. A file has got a protection 777 (octal). What protection does it really have? (2)
10. A file has got a protection 756 (octal). What protection does it really have? (2)
11. A file has got a protection 644(octal). What protection does it really have? (2)
12. Suppose your umask is set to 022. What is the initial access permission for a file you
create? What is it for a directory? (4)
13. Suppose your umask is set to “123”. What is the initial access permission for a file you
create? What is it for a directory?
14. If umask shows the value 000 or 002. What implications do they have form the security
viewpoint?
15. What does rwx stand for when viewing file permissions? What about for directories? (2)
16. What is the octal representation of the file permissions: rwx - - x – w - ? Explain. (2)
17. You discover a file in your home directory that is owned by the superuser(root). The
permission on the file is 600. Can you delete this file?
18. With a umask of 011, the permissions for newly created files will be _______. (2)
19. Discuss about alias command and its usage. (2)
20. What is umask? Create umask that would give no permissions to the group and others.
21. Can you remove files from a directory if you lack write permissions on them?
22. Explain how file permissions operate in a Linux environment. How do you display what
file permissions are associated with a file called myfile. How you would arrange for
myfile to have the following permissions: (8)
a. Only the file owner can read/write the file – no other access if provided
b. Only the file owner and members of the owner’s group can execute the file
c. All users can read the file
23. Name the Linux command that can be used to specify the user and group ownership of a
file?
24. What is shell? How does the shell get started? List the most common shells. (5)
25. How does shell function? How it interacts with OS?
26. In a Linux system, the shell is an interface that allows the user to communicate with the
kernel of the operating system. (True or False)
27. Describe various features of bash shell. (5)
28. List some hot keys for ‘bash’ shell. (2)
29. Define a shell in Linux. Discuss various types of shells. Also list some of the
environment variables available in the Bourne Again Shell (BASH). (8)
30. Compare and contrast Bourne Again Shell (BASH) and TC-Shell (TCSH). Explain the
function of the login initialization file and related system files in both the shells. (9)
31. How do you customize both BASH and TCSH? List some of the environment variables
in each of these shells. (6)
32. Compare and contrast the features of Bourne Again Shell (BASH) with TCSH. (5)
33. Differentiate between BASH and TCSH. (2)
34. Suppose you have downloaded script script.sh into your home directory. When you tried
running it, you get an error: “-bash: ./script.sh: Permission denied”. What is the problem
with the script and how can you fix it? (2)
35. Explain the function of the login initialization file and related files in a Linux shell. Write
Linux shell commands to carry out the following:
a. Define an alias “ll” for the command “ls-lt”.
b. Change the prompt to show your current directory.
c. Change the default search path so that a “bin” directory in your home directory is
included in the search path. (9)
36. List some of the most useful commands built into the bash shell. (1)
37. Some filenames are preceded by a dot(.). What does this mean? Explain the purpose
of .bash and .bash_profile files in a bash shell.
38. What do the files .(dot) and ..(dot dot) represent in Linux? (2)
39.
Unit 6
1. What is tcsh? List some of the improvements over the csh in the areas of command-line
editing, history, navigation and aliases. (8)
2. How tcsh is better than other shells? How do you customize tcsh? (8)
3. Explain the following in the context of tcsh shell:
a. Tcsh built-in variables
b. Command history
c. Job control (6)
4. Discuss various conditional control statements available in tcsh with suitable examples.
(10)
5. Explain the case and while programming constructs in a tcsh script by taking a suitable
example. (9)
6. How do you set up your own prompt in tcsh shell?
7. Explain the following tcsh variables/commands in Linux by taking suitable examples:
autocorrect, histfile, history, path, alias, exit, source, set. (4)
8. Give the default file name for the history file. How can it be changed? Discuss various
options used to view command history in tcsh shell. (6)
9.
Unit 7
$calc 3 – 3
$calc 2 \* 3
$calc 3 % 2
$calc 3 / 5
unknown operator
56.
Unit 8
1. What are editors? How a file is opened using VI editor? Also discuss commands used in
different modes of VI. List various editors.
2. What are the various text-editing features provided VI text editor? What are the two
operational modes of VI editor? What is the use of each? (7)
3. What is VI editor? What are features of VI editor? Write steps to create any program in
VI editor and run it.
4. Write short note on VI editor. (6)
5. Explain the facilities available in a VI editor for the following by taking suitable
examples:
a. Moving around the file
b. Copying and moving text
c. Cursor movement commands
d. Pattern finding commands
e. Searching and replacing text
f. Changing one mode to another mode of VI
6. Explain the search and replace features of VI editor. (5)
7. List some important features of VI editor to create and modify a file. (5)
8. What is the difference between the following VI commands
a. W
b. :q!
c. :wq
d. :zz
9. 3yy is a command in VI editor, which means ____________. (2)
10. How can we delete the current line in VI editor?
11. How can we insert/delete text in different ways? (2)
12. What text editor do you use the most in Linux? How do you save changes and exit in that
text editor? (2)
13. List out few text editor used with Linux. (2)
14. Discuss at least one non-graphical text editors that may be included with a Linux
distribution.
15.
Unit 9
1. What is a scripting language? Discuss features of PERL that make it useful for scripting.
(8)
2. What is PERL used for? (2)
3. What is PERL?
4. How can we create and execute PERL programs? (2)
5. Describe various data types and operators available in Perl. (8)
6. There are three types of variables in Perl: Scalars, Arrays and Hashes. Describe each one
and show how they are initialized? (6)
7. Define an array in PERL. (2)
8. Describe each of the following programming constructs provided by PERL: if, unless,
for, foreach, while, until. (8)
9. Differentiate between while and until statements with the help of examples. (8)
10. How foreach statement is used in Perl? Explain with example. (5)
11. What is the first line in a Perl script? Explain its purpose. (2)
12. Briefly describe how the Perl type system works. Does Perl have dynamic type binding?
(5)
13. In Perl, what is an associative array and what are the advantages of using it (compared to
a normal array)? Give an example of one task for which an associative array is well
suited. (5)
14. What is a function in PERL? How do you create your own functions in PERL? List
various PERL operators. (8)
15. The keyword ‘class’ is used to define a Perl class [True/False]. (1)
16. Compare and contrast PERL and BASH in terms of
a. Target applications-give an example for each
b. Ease of use
c. Execution efficiency (8)
17. Compare and contrast scripting languages (BASH and PERL) to more traditional
application development languages. Be sure to explain what each kind of language is
good for, what each is poor for, and when you would want to use each one. (5)
18. Write a Perl function to display any message. (6)
19. Write a Perl program to prompt the user for a number and then prompt for string. Print
the string that number of times on separate lines. Do not use any looping structures. (8)
20. Write a Perl program that accepts two command-line arguments, a string and a filename,
opens the file specified by filename and lists all lines in file that contain the string. When
lines are printed, occurrences of string in the line should be surrounded by parentheses.
(14)
21. Write a Perl program “copy.pl” that implements a simple version of the Linux cp
command. (9)
22. Write a Perl program to find GCD of 2 numbers.
23. Consider the following Perl program:
a. my($total,$n)=(0,0);
b. while(<>) {
c. my @f=split;
d. $total +=$f[0];
e. ++$n;
f. }
g. print $total/$n;
h. Using plain English, give a brief written description of what this program does.
(5)
24. Write a program myecho in PERL to “echo” its command line parameters as follows: (8)
i. % myecho par1 par2 par3
ii. Program name: myecho
iii. Argument 1: par1
iv. Argument 2: par2
v. Argument 3: par3
25. Explain what the following PERL program (called prog) does: (2)
a. #!/usr/bin/perl
b. print $ARGV[1] + $ARGV[0] + $#ARGV;
26.
Unit 10
1. What is Linux file system? Describe file system administration facilities in Linux, which
involves creating, checking and mounting file systems along with monitoring their use.
(7)
2. Write short notes on:
a. Creating new user account in Linux
b. Use of tar facility
c. Create and check a Linux file system. (15)
3. How do you perform the following in Linux as a system administrator:
a. Using LILO to Boot
b. Setting the login message
c. Maintaining user accounts
d. Checking and repairing file systems
e. Creating, mounting/un-mounting and checking file system
f. Backup and restore strategies
g. Starting and stopping LINUX system (14)
4. What is boot loader? What is LILO and what is its primary configuration file? How do
you use LILO? (2)
5. Explain the concept of run-levels in Linux. What is the most graceful way to get to run-
level single-user mode? What is the relationship between run level 1 and run level 5? (7)
6. Give the command that will boot Linux into single user mode. Also discuss various run
levels. (2)
7. Explain what happens when a user is added to a Linux system in terms of files/directories
that have to be created or modified. Give example and explanations of the commands that
are used to make these changes (e.g. chown, chgrp, chmod). (6)
8. Describe Linux system run levels, the services available at the different run levels, and
how to move between the run levels (including shutdown). (7)
9. How do you administer user and group accounts in Linux? List the system files used to
store the user and group account information and the initialization files associated with
user accounts. (8)
10. What is system administration and what does it entail? Explain the role and function of a
system administrator in Linux. Discuss the role of tar facility for system administration.
(9)
11. How does a Linux system manager send a message to all user terminals? (3)
12. How do you display the jobs in a print queue? How are jobs added to and removed from a
print queue? (2)
13. How do you display, how much disk space is used by files and how much disk space is
free? (2)
14. What is the need for maintaining backups? Explain the processes of backup and
restoration in Linux.
15. What is a root account and how does it differ from a user account? (2)
16. What is a shadow password? (2)
17. What is rpm utility in Linux? Explain its options in detail. (3)
18. How do you set the Login message? (2)
19. The init process is directly responsible for starting up the programs listed in /etc/inittab.
(True/False) (2)
20. An instantiation of a program is called ______. (2)
21. Give the command that will boot Linux into single user mode. (2)
22. Name the Linux command that would allow a user to switch from a user account to the
root account to execute a program that requires root permissions. (2)
23. Give LINUX commands to accomplish the following tasks:
a. Execute permissions on the file README: to read/write the owner and read for
everyone else.
b. Turn on a file’s setuid bit without changing (or knowing) the current permissions
c. List the contents of the current directory, sorting by modification time and listing
the most recently modified file last.
24. What is xfree86? How do you install and configure it? What is the purpose of .xinitrc
file?
25. What are the various commands available in Linux for taking backup? (5)
26. List the advantages of Linux. (3)
27. What is full form of LILO? (1)
28. What is the RPM tool used with the Red Hat compatible systems? (4)
29. What are the run levels used for on a Linux system? What is the role of the run level
directories (rc.d) in the boot process? (8)
30. Compare tar and dump archiving tools. (4)
31. How is a user added to the Linux system? Explain why the /etc/shadow password file
exists. (6)
32. What is the relationship of the mount command and fstab? (2)
33. What is the purpose of the SetUID bit? (2)
34. Distinguish between archiving and compression. Explain the syntax and use of various
archiving tools for Linux Server Administration. (8)
35. Describe gzip command. (2)
36. How can you compress files with gzip? (5)
37. What is the purpose of /etc/fstab file in Linux? (4)
38. How do you configure Linux disk quotas to limit user disk resources? (4)
39. What are the various files associated with a new user account? What is the difference
between /etc/passwd and the /etc/shadow file? (6)
40. Explain the syntax of /etc/passwd. How do you setup password aging policies in Linux?
(4)
41. What command can you use to remove print job number 12 from the print queue? (2)
42. As a system administration, how do you install and configure Linux as a standalone
workstation or as a multi-user environment? (5)
43. Which command is used to check and repair a Linux file system? (1)
44. What is the relationship between the passwd and shadow files in Linux? Why is it
necessary for all users to be able to read the passwd file? Why is it only necessary for
root to be able to read the shadow file? If only root could read the passwd file, what
changes would need to be made to programs like ps and ls? Why would this change lead
to reduced security for all users? (5)
45. List different types of Access Control List (ACL) elements available in the Squid
configuration file. (6)
46.
Unit 10
1. What do you understand by Linux system administration and what does it entail?
2. Explain the role and function of a system administration in Linux?
3. What is need of system administration in Linux?
4. How do perform the following in Linux as a system administrator?
a. Accounting of system usage and billing
b. Adding and removing users
c. Changing groups and passwords
d. Installation of printers and peripherals
e. Maintaining security
f. Managing hard-disk space
g. Monitoring system activity
h. Recovering from system crash
i. Setting up remote communication
j. Starting and Shutting down of Linux
k. Taking backups on tape and restoring back on disk
5. Explain Functional Activities of system administrator.
6. Explain the role and common tasks of a system administrator. Name various essential
tools to perform system administrative tasks.
7. What are various system administration commands? Discuss each in detail.
8. Discuss the role of tar facility and fsck facility for system administration.
9. Who is super user? How can one be super user while working as ordinary user? Why
should super user do routine activities as ordinary user?
10. Explain super user. How super user login is maintained in Linux? List down few
privileges of super user.
11. How do you display, how much disk-space is used by file and how much disk space is
free? Discuss commands with different options.
12. How is remote communication setup in Linux?
13. Name two administrative functions that can’t be performed by a non privileged user.
14. What is the difference between ‘su’ and ‘su-romeo’
15. Discuss mounting and unmounting file system.
16. Which commands are used to manage disk space? Write the syntax and usage of these
commands
17. Why should we take backups? Which are the commands used for taking backups?
Explain their syntax and usage?
18. Explain booting process in Linux.
19. Write and explain commands for the following purposes:
a. Security and protection commands (chmod)
b. System administration commands
c. Redirection and piping commands
d. Process management commands
20. Give Linux command to mount Linux file system.
21. Explain the commands used for secondary storage management.
22.
Unit 11
1. Explain the use of netstat and ping networking commands in Linux. (4)
2. What is the function of the netstat utility? (2)
3. What does the command netstat –rn do? (2)
4. What is DNS? (2)
5. What do you understand by DNS? What its purpose? How is it setup? Explain its
services? Give a full form of DNS. What is DNS server?
6. Explain the function of the following DNS records: SOA, PTR, A, MX, CNAME, NS (6)
7. How does DNS do domain name resolution? What is the difference between “forward
resolution” and “reverse resolution” when converting DNS names? When installing DNS
what is the function of named.conf file? (8)
8. How do you perform basic network configuration, including TCP/IP and DNS
(resolv.conf, hosts, nsswitch.conf) and use basic networking monitoring and trouble-
shooting tools such as ping, ipconfig, trace-route and route? (9)
9. What is WWW? What are WWW servers? How do you setup WWW server under Linux
platform? Explain the uses of WWW in Linux.
10. Differentiate between Mail, WWW and FTP. (6)
11. Differentiate between FTP and WWW.
12. Write short note on Setting up the mail server.
13. Explain sending and handling mail.
14. Explain various email protocols. Write the steps to setup an email on a Linux based
system.
15. What is TCP/IP? Explain the use of the following: IP Address, Network Address,
Network Mask, Broadcast Address, Gateway Address, Nameserver Address. (8)
16. Illustrate IP address with an example. Also explain TCP/IP protocol in detail. (7)
17. What is TCP/IP? Provide an overview of FTP and Email protocols. (5)
18. What is TCP/IP?
19. Explain the purpose of the following files for configuring LINUX for TCP/IP:
/etc/hosts, /etc/networks, /etc/host.conf. (5)
20. What is FTP? (2)
21. What is NFS? (2)
22. Illustrate the significance of /etc/exports file with respect to NFS. (2)
23. Describe with the aid of a diagram if necessary, the concepts of Networked File System
(NFS, designed by Sun Microsystems). (5)
24. “Slave servers provide load sharing for the NIS server”. Is this statement true of NIS? (2)
25. What role does NIS play in supporting NFS? Explain one way this capability helps
protect users’ files. (4)
26. The standard Linux command that configures a network interface is _________. (2)
27. Differentiate between NIS and NFS. (6)
28. Explain the concept of subnetting and explain why it is useful. What are net-masks? How
do net-masks relate to the split between the network and the host section of an IP
address?
29. The term localhost is the hostname corresponding to the loopback interface IP address of
127.0.0.1 (True/False) (2)
30. IP address, Network mask and broadcast address are essential for configuring an IP
interface to send packets. (True/False) (2)
31. Explain the use of the following: Network Address, Network Mask, Broadcast Address,
and Gateway Address. (2)
32. Explain the use of the following: IP address, network address, network mask, broadcast
address, gateway address.
33. Compare and contrast: (8)
a. IPv4 vs IPv6
b. POP vs IMAP
34. Why has Network Address Translation been so widely deployed, despite the intent that it
was meant to provide temporary relief from IP address space exhaustion until IPv6 could
be designed and deployed? (2)
35. Which naming service uses ASCII text files, supports hostname-to-IP-address resolution
and IP-address-to-hostname resolution, and is used on the Internet? Explain in detail. (5)
36. Name the most popular type of package manager available for Linux. (2)
37. What are xinetd managed services? What are the various files in the /etc/xinetd.d/
directory that contains the configuration files for each service managed by xinetd? (8)
38. Describe the following: SMTP, SSH, IMAP, IPv4. (16)
39. What is Network Time Protocol (NTP) and where is it used? How can you set up a NTP
client and server in local environment? (8)
40. What are various components of email system? What is the best MTA? Explain the
process of deploying a postfix mail server with related configuration files for the domain:
xyz.com. (8)
41. Compare and contrast Destination NAT (DNAT) vs Sources NAT (SNAT). (8)
42. What is virtual network computing? (2)
43. What Linux command returns the current routing table? (2)
44. What are various naming services used in Linux? Explain how BIND is installed and
configured to run a caching name server, Master Name server for the domain:
example.com. (8)
45. What are the daemons responsible for logging information in Linux? Elaborate the
process of log management with example. (8)
46. What is a netmask? Explain what it is used for? (2)
47. Name and explain the use of various network trouble-shooting tools in Linux and the
corresponding system files that these tools use. (4)
48. What is URL?
49. What does the API Abbreviation stands for?
50. What is server?
51.
Unit 1
1. What is Linux? Draw the architecture of Linux system and describe each layer. (5)
2. What is Linux OS? Discuss salient features of Linux in detail.
3. Name any three main components of Linux OS and briefly describe their role. (5)
4. What is the name of the Linux penguin? (1)
5. What is Red Hat Linux? What features are in Red Hat Linux? (5)
6. Who is the creator of Linux and when was it created? (2)
7. Name three Linux distributions. (3)
8. What are the important features of Linux that make it unique as an OS? Briefly trace the
history of Linux.
9. What are the important features of Linux that make it unique as an operating system? (6)
10. Give various security features available in Linux. (5)
11. Briefly trace the history of Linux OS.
12. Give history of Linux. (2)
13. What are minimum system requirements for installing Linux? List various steps for its
installation. (7)
14. Write various steps for installing a Linux OS. How do you set up your hard disk? (5)
15. List and explain the steps to install, configure and administer the Linux operating system
on a workstation computer connected to a network. (8)
16. What are various ways of installing Linux operating system? Explain kick start
installation with related configuration files. (8)
17. Give a brief overview of the procedure to install the Linux software. How do you set up
the mouse?
18. What is bootstrapping? List the steps involved and discuss what happens at each stage.
(8)
19. Describe various hard disk administration facilities in Linux including formatting and
partitioning of disks. Highlight the naming conventions for disk drives. (8)
20. Explain the disk partitioning process in Linux? What type of planning should a system
administrator do before going through the disk partitioning process? (8)
21. What is the difference between formatting a disk and partitioning a disk? What is the
difference between partitioning and creating a file system? (8)
22. Name the Linux partition that generally contains the kernel. (2)
23. Explain the procedure to make your Linux kernel settings persistent? (8)
24. Name significant events in kernel initialization. (2)
25. What Linux file contains the kernel initialization messages? (2)
26. Explain the following in the context of Linux OS:
a. Setting up your hard drive
b. Creating Linux file-system partitions.
c. partitioning the hard disk and formatting these partitions
d. Setting up the Ethernet. (20)
27. Describe the various Linux OS installation issues such as:
a. partitioning and disk layout
b. disk technology (SCSI versus IDE)
c. logical volume management (9)
28. Discuss some of the common problems and their possible solutions with SCSI controllers
and devices.
29. What are the differences between IDE and SCSI? What are the standard device file
names for the third IDE device and the second SCSI device?
30. Differentiate between IDE and SCSI storage systems.
31. You have a printer attached to a parallel port. What is this port called in Linux?
32. What is floppy drive called in Linux? (1)
33. You have a device attached to a serial port. What is this port called in Linux? (2)
34. During Linux installation Linux creates a swap space partition. Why do you need these
and how is different from a windows swap file?
35. What is a swap partition? What is a program you can use to partition your hard drive? (2)
36. What is the purpose of Linux swap space? (2)
37. How do you partition your hard disk with fdisk? (2)
38. How does fdisk command work in Linux? Write steps. (5)
39. What Linux command will list all the configured partitions from all attached hard drives?
(2)
40. Define and differentiate the following in the context of Linux: fdisk and Disk Druid as
Linux disk partitioning tools. (8)
41. How do you create boot and root floppies?
42. Differentiate between the Root disk and Boot disk. (5)
43. Describe general principles involved in booting a system. Explain the transfer of control
from hardware, to firmware, to software during system boot. (8)
44. Describe briefly the initial process sequence while the system boots up.
45. Explain the sequence of operations when a user logs in and starts working.
46. What is the difference between Linux and DOS?
47. Linux commands tend to be shorter than their DOS counterparts. Why do you think this
is so?
48. Write a brief note comparing and contrasting the key features of Linux with any
Microsoft Windows OS. (7)
49. Differentiate between Linux and Windows.
50. What is the GRUB used for? What is the MBR? What is the relationship between GRUB
and MBR? (4)
51. Define RAID. Explain RAID levels 0, 1, 5. Compare and contrast LVM with RAID.
When is one better than the other? (8)
52. Explain the following in the context of Linux:
a. Yum (Yellow Dog Update Manager) for Linux (5)
b. System V Run Levels (5)
53. During the boot process, how does the Linux OS know which services it needs to run at
different run levels? How does it determine the order in which these services are started?
(8)
54. What is the difference between run levels Q and 6?
55. What is the name of the first Ethernet device in Linux? (2)
56. What is the Apache directive that specifies the base directory for configuration and log
files? (2)
57.
Objective Questions
1. Which of the following statements does not accurately describe an advantage of the Perl
programming language? (2)
a. Perl offers higher-level data structures and algorithms, such as hash tables and
sorting.
b. Perl has unambiguous syntax: there is typically only one natural way to
implement any given algorithm.
c. Perl includes many built-in functions that link up to the UNIX operating system.
d. Perl programs do not require an explicit compilation step between editing the
program and running it.
2. Which of the following are all Perl keywords that can be used to manipulate strings? (2)
a. foreach, each, for
b. reverse, uc, chop
c. while, if, unless
d. reverse, sort, grep
3. The number of inode entry in the kernel for each file used in the system is (2)
a. Exactly one
b. Two
c. Three
d. None of these
4. A special shell variable that includes all of the parameters on the command line is (2)
a. #!
b. $@
c. #$
d. None of these
5. A configuration script that can be located in each user’s home directory (2)
a. .profile
b. .bashrc
c. Macro
d. None of these
6. The configuration file in which encrypted user passwords and password configuration
data are stored (2)
a. /etc/group
b. /etc/password
c. /etc/fstab
d. /etc/shadow
7. The configuration file in which user account information is stored (2)
a. /etc/group
b. /etc/password
c. /etc/fstab
d. /etc/shadow
8. The command used to obtain detailed information about processes running on Linux (2)
a. Pipe
b. Ps
c. Pwd
d. None of these
9. A command used to test a network connection (2)
a. Ps
b. Pipe
c. Ping
d. None of these
10. Command used to create a single archive file that contains many other files, often
compressed to save space (2)
a. Tar
b. Sed
c. Set
d. None of these
11. Command used to set the file permissions assigned when you create a new file (2)
a. Umount
b. Uname
c. Umask
d. None of these
12. Who is original developer of Linux, the free Unix clone on the PC? (2)
a. Bill gates
b. Linus torvalds
c. Dennis Ritchie
d. Richard Stallman
Extra