How To Exam?

a knowledge trading engine...


DOEACC Society 2007 Advanced Level Course In Computer Science A8-R3: BASICS OF OS, UNIX AND SHELL PROGRAMMING - Question Paper

Thursday, 13 June 2013 12:20Web

A8-R3: BASICS OF OS, UNIX AND SHELL PROGRAMMING

NOTE:
1. There are 2 PARTS in this Module/paper. PART 1 contains 4 ques. and PART 2 contains 4 ques..

2. PART 1 is to be answered in the TEAR-OFFANSWER SHEET only, attached to the ques. paper, as per the instructions contained therein. PART 1 is NOT to be answered in the ans book.

3. Maximum time allotted for PART 1 is 1 HOUR. ans book for PART 2 will be supplied at the table when the ans sheet for PART 1 is returned. However, candidates who complete PART 1 earlier than 1 hour, can collect the ans book for PART 2 immediately after handing over the ans sheet for PART ONE.
TOTAL TIME: three HOURS TOTAL MARKS: 100
(PART ONE-40; PART 2 – 60)

PART ONE
(Answer all the questions)

1. Each ques. beneath provide a multiple option of answers. select the most improper 1 and enter in the “tear-off” ans sheet attached to the ques. paper, subsequent instructions therein. (1 x 10)

1.1 Which 1 of the subsequent commands modifications or assigns an inode number to file?
A) cp
B) mv
C) chmod
D) chgrp

1.2 In which of the subsequent case cmd2 does not begin running until cmd1 has finished?
A) cmd1 | cmd2
B) cmd1 ; cmd2
C) cmd1 & cmd2
D) cmd1 # cmd2

1.3 The command grep ‘^Form” myfile
A) displays those lines that start with From.
B) displays those lines that end with From.
C) displays those lines that do not contain From.
D) displays those lines that contain more than 1 instance of From.

1.4 Consider the subsequent code segment :
x=10 y=20
The command to display the product of x and y is
A) expr $x * $y
B) expr $x \* $y
C) echo $x * $y
D) echo $x \* $y









1.5 Which of the subsequent is not a layer in TCP/IP
A) Application layer
B) Transport layer
C) Internet layer
D) Presentation layer

1.6 Which of the subsequent is not actual for tar command?
A) All the users are permitted to use tar.
B) A tar command can be used to store data on a formatted disk only.
C) A file system must be current on the disk before tar can be used to store data on it.
D) tar can be used to store as well as extract files from a disk.

1.7 The command rm xyz will lead to a dangling link, abc, if it is executed after the command _________.
A) ln –s abc xyz
B) ln –s xyz abc
C) ln abc xyz
D) ln xyz abc

1.8 Which of the subsequent is not a part of the inode for a file?
A) File permissions.
B) File modification time.
C) Inode modification time.
D) Name of the directory to which the file belongs.

1.9 Which of the subsequent statement is actual for a sticky bit?
A) If the sticky bit for a file is set, then nobody can delete that file.
B) The sticky bit can be set for ordinary files only.
C) A file with sticky bit set, remains in the memory even after execution of that file is over.



( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER DOEACC Society 2007 Advanced Level Course In Computer Science A8-R3: BASICS OF OS, UNIX AND SHELL PROGRAMMING - Question Paper