Unix Linux Programming (CSIT803)-Semester III

Unix Linux Programming (CSIT803)-Semester III

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

1st Module Assessment

______ is the innermost layer in UNIX System architecture.

a.

Hardware

b.

Kernel

c.

Shell

d.

None of these

Question 2. For each new device attached to the computer there is a _______ associated with it.

a.

device driver

b.

MAC address

c.

IP address

d.

None of these

Question 3. The ___________ is simply a program that reads in the commands you type and converts them into a form more readily understood by the UNIX system.

a.

Kernel

b.

shell

c.

Hardware

d.

None of these

Question 4. Linux operating system evolved from a kernel created by ______.

a.

Power mode

b.

sleep mode

c.

hibernate mode

d.

Both B and C

Question 5. The lowest level of any Operating system is its _________.

a.

Processes

b.

Kernel

c.

Programs

d.

None of these

Question 6. An ________ is often distributed with tools for programs to display and manage a graphical user interface.

a.

operating system

b.

Graphical System

c.

Device Driver

d.

None of these

Question 7. State whether True or False: Operating System and Application Software are same.

a.

TRUE

b.

FALSE

c.

May be True

d.

None of these

Question 8. _______ are files that contain a list of commands you want to run.

a.

Scripts

b.

Commands

c.

CLI

d.

None of these

Question 9. Which of these is an Operating System?

a.

Unix

b.

DOS

c.

Windows

d.

All of these

Question 10. The UNIX family consists of ______ components.

a.

two

b.

One

c.

three

d.

four

A _____ is a specially written program which understands the operation of the device it interfaces to.

a.

driver

b.

Device

c.

Application()

d.

None of these

Question 11. Operating systems did not exist in their modern and more complex forms until the early _________.

Select one:

a.

1940

b.

1950

c.

1960

d.

1970

Question 12. Broadly we can classify users into _______ and _______ categories.

a.

Super user and Layman User()

b.

Programmer and Non Programmer

c.

Root and non-root user

d.

All of these()

Question 13. UNIX uses ______ scheduling to support its multi-user and time-sharing feature.

a.

FIFO

b.

SJF

c.

Round-Robin

d.

All of these

Question 14. Development of the GNU operating system was initiated by ________.

a.

Dennis Ritchie

b.

Richard Stallman

c.

John Hallman

d.

None of these

Question 15. _______ are used to monitor computer performance, debug problems, or maintain parts of the system.

a.

System Tools

b.

Device Driver

c.

Kernel

d.

None of these

Question 16. During initialization, shell reads the _____ and ____ files.

a.

/init and p file

b.

/pro and p file

c.

/etc/profile and profile

d.

Both A and C

Question 17. The current version of the standard Shell and Utilities volume of IEEE Std 1003.1-2001 is also known as _________.

a.

POSTFIX

b.

PREFIX

c.

POSIX

d.

None of these

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

2nd Module Assessment

POSIX shell provides job control facilities like bg or fg.

a.

TRUE

b.

FALSE

c.

May be True

d.

May be False

Question 2. A process is an instance of _______ program.

a.

waiting

b.

executing

c.

terminated

d.

halted

Question 3. Process is a program in ________ state.

a.

initializing

b.

dead

c.

execution

d.

None of these

Question 4. Each process is identified by a unique integer called ______

a.

PID

b.

PPID

c.

TID

d.

PTID

Question 5. What is a job?

a.

group of tasks

b.

group of commands

c.

group of processes

d.

group of signals

Question 6.  Programs and process are synonymous.

a.

TRUE

b.

FALSE

c.

May be Ture

d.

All of these

Question 7. Which command will push the current foreground job to the background?

a.

bg

b.

fg

c.

ctrl-Z

d.

kill

Question 8. Which command is used to list the status of jobs?

a.

fg

b.

JOBS

c.

jobs

d.

fg

Question 9.  A process is said to be ____ when it starts its execution.

a.

born

b.

die

c.

waiting

d.

terminated

Which of the following commands is used to suspend a job?

a.

ctrl-Z

b.

ctrl-Q

c.

bg

d.

$

Question 10. When a process has completed its execution, it is called ______

a.

born

b.

terminated

c.

waiting

d.

exit

Question 11.  Which data structure is used to store information about a process?

a.

process control block (pcb)

b.

array

c.

queue

d.

program control block

Question 12 . Two types of processes existing in the system are _____________.

a.

Super and non-super processes

b.

high level and low level processes

c.

kernel and user processes

d.

None of these

Question 13. Process table and process control block store same attributes of a process. State whether it is True or False.

a.

TRUE

b.

FALSE

c.

May be True

d.

May be False

Question 14.  ____ command will bring the background jobs to the foreground.

a.

bg

b.

fg

c.

ctrl-Z

d.

kill

Ready state processes are scheduled by ______.

Select one:

a.

Shell

b.

Hardware()

c.

kernel

d.

None of these()

Question 15. Some attributes of every process are maintained by the kernel in memory in a separate structure, called the ______

a.

pcb

b.

task control block

c.

process table

d.

task table

Question 16. _________is the state of process when it completes its task.

a.

Dead

b.

Zombie

c.

Final

d.

Both A and B

Question 17. The command bg %2 is valid. State whether it is True or False.

a.

a) True

b.

b) False

c.

May be True

d.

None of These

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

3rd Module Assessment

In how many categories are the commands of UNIX operating system classified?

Select one:

a.

1

b.

2

c.

Many

d.

0

Question 2. Which command is used for displaying date and calendar in UNIX?

a.

date and cal

b.

DATE and CAL

c.

date and calendar

d.

dt and cl

Question 3.  Permissions of a file are represented by which of the following characters?

a.

r, w, x

b.

e, w, x

c.

x, w, e

d.

e, x, w

Question 4. Echo command is used for _________.

a.

displaying errors

b.

displaying operating system details

c.

displaying diagnostic messages

d.

displaying date and time

Question 5.  Shell provides us with an interface to the operating system.

a.

True

b.

False

c.

May be True

d.

None of these

Question 6. Which of these commands is used for searching a pattern in one or more file(s)?

a.

cd

b.

cp

c.

paste

d.

grep

Question 7. How many types of permissions a file has in UNIX?

a.

1

b.

2

c.

3

d.

4

Question 8. The prompt issued by the shell is called ______.

a.

prompt

b.

command translator

c.

command prompt

d.

command executor

Question 9. Multiple arguments as filenames can be specified in cat command.

a.

True

b.

False

c.

May be True

d.

May be False

Question 10. Sometimes it is not possible to copy a file.

a.

True

b.

False

c.

May be True

d.

None of these

Question 11.  What is the output of who command?

a.

a) display information about users who are currently logged in.

b.

b) display file hierarchy

c.

c) display administrator information

d.

6

Question 12.  What is the default symbol for command prompt in Bourne shell?

a) $

b.

b) %

c.

c) #

d.

d) @

Question 13. How can we specify more than one command in the command line at the same time?

a.

a) using ;

b.

b) using >

c.

c) using ==

d.

d) not possible

Question 14. Which of the following is not an option of cp command?

a.

minus z

b.

minus i

c.

minus R

d.

minus u

Question 15. If there are special characters in a pattern, then we’ve to enclose them in __________.

a) single quotes

b.

b) double quotes

c.

c) without any quotes

d.

d) all quotes

Question 16.  If we create a file using cat command with the same filename which already exists in the current directory, then:

a) existing file is deleted

b) new file will be created separately

c) existing file will be overwritten

d) an error will be produced

Question 17. What are meta-characters?

a) special characters having predefined meaning to the shell

b) special symbols

c) shell symbols

d) command symbols

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

4th Module Assessment

How many types of modes are used by vi editor?

a.

2

b.

4

c.

3

d.

1

Question 2. Which command is used for comparing two files?

a.

cmp

b.

comp

c.

diff

d.

comm

Question 3. Which stream is connected to the display?

a.

standard input

b.

standard output

c.

standard error

d.

error

Question 4. We can delete multiple files using a single rm command. State whether it is True or False.

a.

True

b.

False

c.

May be True

d.

May be False

Which option is used by vi editor to open a file in read mode only?

a.  -r 

b. -R 

c. -d 

d. -f

Question 5. Which command is used to change the permission of a file?

a.

chmod

b.

ch

c.

chown

d.

chgrp

Question 6. The command wc < sample.txt will count data from the file sample.txt. State whether it is True or False.

a.

True

b.

False

c.

May be True

d.

May be False

Question 7. Which editor is used by the UNIX system to edit files?

a.

vi

b.

notepad

c.

word

d.

notepad++

Question 8. Redirection is a process of switching of the standard stream of data. State whether True or False.

a.

True

b.

False

c.

May be true

d.

May be False

Question 9. What is the exit status of cmp command if both the files are identical?

a.

0

b.

1

c.

2

d.

undefined

Question 10.  What does the following command do: $vi file001

a.

open file named file001

b.

edit file named file001

c.

delete a file named file001

d.

open the file if it exists, else creates a new file

Which symbol is used for taking input from standard input?

a) & 

b) % 

c) – 

d) $

Question 11.  Which of the following characters specify the user and group category?

a) ‘u’ and ‘g’

b.

b) ‘g’ and ‘o’

c.

c) ‘us’ and ‘gr’

d.

d) ‘u’ and ‘o’

Question 12. How can we skip some initial bytes from both the files to be compared?

a) using -b option

b.

b) using -n option

c.

c) using -l option

d.

d) using -i option

Question 13. $ cp -f copies forcefully. State whether it is True or False.

a.

a) True

b.

b) False

c.

May be True

d.

May be False

Question 14. dw command ________

a) deletes one line

b.

b) deletes one word

c.

c) deletes one character

d.

d) deletes one sentence

Question 15. Which option is used with cat command for displaying non-printable characters?

a) -v

b.

b) -n

c.

c) -x

d.

d) -a

Question 16. Which option is used with cmp command to limit the number of bytes to be compared?

a.

a) -n

b.

b) -l

c.

c) -f

d.

d) -b

Question 17. The expression used with chmod command to change permissions in a relative manner contains _______ components.

a) 5

b.

b) 2

c.

c) 4

d.

d) 3

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

5th Module Assessment

Which of the following commands is known as stream editor?

a. sed 

b. gnu 

c. grep 

d. tr

To remove users from the system we use userdel. State whether it is True or False.

a.

True

b.

False

c.

Partially True

d.

Partially False

Question 2. Which command shuts down and reboot the system?

a.

shutdown -g2

b.

shutdown -y -g0 -i6

c.

shutdown -g2 -g0

d.

shutdown -g2 i6

Question 3. Mounting a file system attaches that file system to a ________.

a.

directory

b.

file

c.

name

d.

None of these

Question 4.  _______ command is used for setting limits on file size.

a.

limit

b.

flimit

c.

ulimit

d.

flim

Question 5. What is the correct syntax for using sed?

a.

sed options file(s)

b.

sed options ‘action’

c.

sed options ‘address action’ file(s)

d.

sed ‘action’ file(s)

Question 6. Which option do we use with the shutdown command to override the default waiting time?

a.

-s

b.

-e

c.

-g

d.

-i

Question 7. Awk filter operates at field level. State whether it is True or False.

a.

TRUE

b.

FALSE

c.

May be

d.

Can’t say

Question 8. _________ command allows superuser to communicate with the users.

a.

comm

b.

cron

c.

date

d.

wall

Question 9. Which of the following commands is used with sed for outputting as well as printing the selected lines?

a.

q

b.

n

c.

p

d.

i

Question 10. Whenever you mount or unmount a file system, the /etc/mnttab also known as _____ file is modified with the list of currently mounted file systems.

a.

mont pointer

b.

mount table

c.

mount point

d.

None of these

Question 11. Which of these commands is used for quitting after selecting 3 lines from file emp.lst?

a.

a) sed -n 3 emp.lst

b.

b) sed -i 1-3 emp.lst

c.

c) sed ‘3q’ emp.lst

d.

d) sed -n

Question 12. Which field is not stored in /etc/passwd?

a.

username

b.

encrypted password

c.

UID, GID

d.

password

Question 13. Which of these commands is used to obtain root privileges?

a.

uname –p

b.

whereis

c.

su

d.

suspend

Question 14. awk uses ______ for splitting a line into fields.

a) special parameters

b.

b) shell variables

c.

c) env variables

d.

d) command arguments

For pattern-matching, awk uses regular expressions in ____ style.

a) sed

 b. b) grep 

c. c) perl 

d. d) print

Question 15. A default ______ file is created when you install a system depending on the selections you make when installing system software.

a.

/etc/vtab                     

b.

/etc/vfstab

c.

/etc/sup

d.

None of these

Question 16. State whether it is True or False. Consider the following commands. $ sed -n ‘1,2p’ emp.lst, $ sed -n ‘3,$!p’ emp.lst. The output of both commands will be the same.

a.

TRUE

b.

FALSE

c.

May be

d.

Can’t say

Question 17. To report free space on the disk, which command do we use?

 (A). df

b.

(B). fd

c.

(C). du

d.

(D). sg

We Also Provide SYNOPSIS AND PROJECT.

Contact www.kimsharma.co.in for best and lowest cost solution or

Email: amitymbaassignment@gmail.com

Call/what’s app: +91 8290772200

What’s app:8800352777

Assignment solution help, assignment answers help, Assignment Help, Synopsis and Project, Study Material, Exam Notes

Assignment 2

Case Study:

XYZ Corporation ltd. setup a Linux operating system for its organization. The Linux open source operating system, or Linux OS, is a freely distributable, cross-platform operating system based on UNIX.

The Linux consist of a kernel and some system programs.  The kernel is the heart of the operating system which provides a set of tools that are used by system calls. It is responsible for all major activities of this operating system. It consists of various modules and it interacts directly with the underlying hardware. Kernel provides the required abstraction to hide low level hardware details to system or application programs.The defining component of Linux is the Linux kernel, released on 5 October 1991 by Linus Torvalds.  Linux provides a special interpreter program known as Shell which can be used to execute commands of the operating system. Linux Operating System has primarily three components.

1. Kernel – Kernel is the core part of Linux. Installed components of a Linux system include the following:

1. A bootloader is a program that loads the Linux kernel into the computer’s main memory, by being executed by the computer when it is turned on and after the firmware initialization is performed.

2. An init program is the first process launched by the Linux kernel, and is at the root of the process tree.

3. Software libraries contain code that can be used by running processes. The most commonly used software library on Linux systems, the GNU C Library (glibc), C standard library and Widget toolkits.

4. User interface programs such as command shells or windowing environments.

5. System Utility – System Utility programs are responsible to do specialized, individual level tasks.

Based on the case study answer the following:

Question: ____ is the heart of Operating System.

a.

Kernel

b.

Shell

c.

Input/Output

d.

All of these

Question 2. Linux OS is developed by _____.

a.

Linus Torvalds

b.

Dennis Ritchie

c.

John Brown

d.

None of these

Question 3. What is a shell?

a.

It is a program to exceute Operating System commands.

b.

It is a program to provide the permissions.

c.

It is a program under execution.

d.

All of these

Question 4. A/An _____ program is the first process launched by the Linux kernel.

a.

start

b.

stop

c.

init

d.

run

Question 5. _____ programs are responsible to do specialized, individual level tasks.

a.

Adminstrative

b.

System Utility

c.

User

d.

All of these

Leave a Reply

Your email address will not be published. Required fields are marked *