unix mcq question and answer

Unix Operating System Multiple Choice Questions with Answers:-

1. Unix OS was first developed by
a. Dennis Ritchie
b. Bjarne stroustrup
c. Ken Thompson
d. Brian Kernighan

Ans.C

2. Unix OS was first developed at
a. Microsoft corp. USA
b. AT & T Bell Labs, USA
c. IBM, USA
d. Borland International, USA

Ans.B

3. Unix is written in
a. C language
b. Ada language
c. Perl language
d. Pascal language

Ans.A

4. Unix is a
a. Single User, Single tasking OS
b. Single User, Multi-tasking OS
c. Multi-User, Multi- tasking OS
d. None

Ans.C

5. Which of the following is a command for searching a pattern in a file?
a. Find
b. b. group
c. c.look up.
d. None

Ans.B

6. Unix Command can be typed in
a. Lower case
b. Upper case
c. Both the cases
d. None

Ans.A

7. Shell Program is stored in a file called
a. Unix
b. Sh
c. Dd
d. Cc

Ans.B

8. WhicBh shell offers a command history feature
a. C shell
b. Visual shell
c. Bourne shell
d. Korn shell

Ans.C

9. The minimum number of links for any directory file are
a. 3
b. 4
c. 1
d. 2

Ans.D

10. The default value of Umask is
a. 1024
b. 4021
c. 0022
d. 1001

Ans.C

11. Binary executable required for system administration is usually placed in ________ directory.
a. Letc
b. lusr
c. ldev
d. none

Ans.A

12. All user directories are usually placed in _________ directory.
a. Letc
b. lusr
c. ldev
d. none

Ans.B

13. If there are three links for a file then the number of copies of the file would be
a. One
b. two
c. three
d. four

Ans.A

14. After typing the contents of file test created by you by giving the command cat>test you save the contents by
a. Pressing the keys ctrl-c
b. Typing save and pressing enter
c. Pressing Esc key
d. Pressing ctrl-d

Ans.D

15. The file for which we do not have write permission can be deleted using the command
a. rm-i file
b. rm-I file
c. rm-r-file
d. rm-f-file

Ans.D

16. The permission 746 can be represented as
a. rwxrwx- -x
b. rw- -w-r-x
c. rwxr-xr-x
d. rwxr- -rw–

Ans.D

17. A Sticky bit applies to a file would mean that
a. No one can remove it
b. It would stick around in memory even when its execution is over
c. Next time you login it would get executed on its own
d. None of the above

Ans.B

18. The command pwd gives
a. Present working directory
b. Password in encrypted form
c. Password in decrypted form
d. None

Ans.A

19. Which of the following is not a unix command
a. Cd
b. rm
c. pwd
d. del

Ans.D

20. The size of any block in the unix file system is
a. 512 bytes
b.1024 bytes
c. 2048 bytes
d. Any of the above

Ans.D

21) To find the block size on your file system the command is
a. Blksz
b. Szblk
c. Chksz
d. Cmchk

Ans.D

22) Each entry in inode table is of size
a. 64 kb
b. 32kb
c. 32 bytes
d. 64 bytes

Ans.D

23) The program contained in boot block, that loads kernel into memory is called
a. Disk Bootstrap program
b. Master boot program
c. Shell program
d. None of the above

Ans.A

24) The state of the file system is contained in
a. Boot block
b. A special block created by Book Block
c. Super Block
d. None of the above

Ans.C

25) Which file gets executed when we use the passwd command
a. /etc/passwd
b. /etc/pwd
c. /bin/passwd
d. /passwd

Ans.C

26) The command cal j 1997 would give the output as

a. The calendar of jan, june and july 1997
b. Only calendar of jan 1997
c. An error
d. None of the above

Ans.C

27) The output of command banner “Unix shell programming” would be
a. A banner showing ‘unix’,’shell’ and ‘programming’ words displayed in separate lines
b. A banner showing ‘unix shell’ in one single line
c. Nothing
d. A banner showing ‘unix shell programming’ in one line.

Ans.B

28) To see the last access time of various files in a file system the command is
a. Is-Iu
b. Is-I
c. Is-acc
d. Is-mt

Ans.A

29) To ascertain what are the contents of the file in your the system the best way would be
a. Do a cat command on each file and find its contents
b. Use the command cat*
c. Use the command file*
d. None of the above

Ans.C

30) Which of these is not a command of Unix related with DOS
a. Dosdir a:proj
b. Doscopy trial a:/
c. Doscp/HOME/Proj/Prg a:/
d. Dosls

Ans.B

31) Which of the following is not true

a. Sorting is done on the basics of first character of each line
b. Sort command sorts a file word by word rather than line by line
c. Sort command has s provision to do a numeric sort
d. Sort is not a filter

Ans. B

32) To change the access time of a file to 12:40 PM on 26th Jan 1997 the command would be

a. Touch –a 2601971240 file
b. Touch –a 1240260197 file
c. Touch –a 0126124097 file
d. Touch –a 9701261240 file

Ans. C

33) The command cut –f 2,8 –d”:”file I would output

a. The fields 2 to 8 from file I where delimiter between fileds is:
b. The fields 2 to 8 from file I including the delimiter : between fields
c. The columns 2 to 8 from file I with : between each column
d. None of the above

Ans. A

34) The command to search the pattern “Hi there” in file I would be

a. Grep “Hi there” file 1
b. Grep Hi there file 1
c. Grep file1
d. Grep ‘Hi there’ file 1

Ans. A

35) The command head f1 would display

a. First line of the file f1
b. Nothing
c. First 10 lines of the file f1
d. The whole file f1

Ans.C

36) After you have entered text in your file, to save and quit vi you will use

a. Esc shift ZZ
b. Shift ZZ
c. Esc:q Enter
d. None of the above

Ans. A

37) To search a pattern which starts with uni the command would be

a. :/
d. :/
d. List of all abbreviations that have been set can be seen through the command :set abbr
e. All are false

Ans.E

41) Which of following commands do not belong to multiple file editing commands
a. :n!
b. :q!
c. :rnew!
d. All the above

Ans.D

42) The difference between the commands ps –e and ps –a is
a. Ps –e gives details of every process running in memory whereas ps –a gives output for all the process that you have launched
b. Ps –e gives details of every process running in memory whereas ps –a gives details of all user processes
c. No difference , both give same output
d. None of the above

Ans.B

43) The father of all processes is
a. Root
b. Sh
c. Sched
d. Init

Ans.C

44) The process id numbers of the processes vhand,bdflush,sched and init are
a. 1,2,3 and 4
b. 2,3,0 and 1
c. 3,4,1 and 2
d. 0,1,2 and 3

Ans.B

45) Which of the following is not true regarding the command $ nohup cat *.let | nohup sort >f1 &
a. The process would die if the user logs out before the command’s execution is over
b. If the user logs out the output of sort would be dtored in a file nohup.out
c. It is optional to give nohup before sort
d. This background process is also known as a deamon process

Ans.A,D

46) Which of the following is not true regards the kill command
a. Super user can kill deamon processes
b. For sure kill the signal no is 9
c. There is no surety that the shell process will get killed by the command kill
d. Using Kill command you can kill other user’s processes too

Ans.A,D

47) Which of the following is not true
a. The at command permits you to receive messages only by mail
b. A person’s login name appears in the file at.allow if he is not allowed to use the at command
c. Both are false
d. Both are true

Ans.C

48) Which statement are true if the file which contains the following line is submitted to the crontab command
10 2 3 * 0 echo “ There is no substitute for hard work”
a.The message is echoed on the 3rd of every month at 2.10 a.m
b.The message is echoed on the 3rd of every month at 2.10 p.m
c.The message is echoed on the 3rd of every month at 2.10 a.m if it happens to be a Sunday
d. None of the above

Ans.C

49) For a person to receive messages he should have his terminal set to a parameter which will allow him receive messages.The command to set this parameter is
a.message –on
b.msg –o
c.mesg –y
d.message–y

Ans.C

50) The command that unix offers to a user to find out whether he can send messages to a particular terminal are
a.finger and who
b.finger –mesg and who –T
c.finger –I and who –t
d.finger –I and who –T

Ans.D

51) If the user has read a news item he cannot read it again because of creation of the file
a. _news_time
b. news.time
c. .news.time
d. .news_time

Ans.D

52) To read the stale news the option available is
a. news –a
b. Delete the file /usr/news
c. Delete the file _news.time
d. Delete the file .news_time

Ans.A&D

53) The message of the day is stored in a file called
a. /etc/profile
b. /etc/motv
c. .profile
d. Autoexec.bat

Ans.B

54) The incoming mail of user with the login name aa12 is stored in the file
a. /usr/spool/mail/aa12
b. /usr/aa12/mbox
c. /spool/mail/aa12
d. /usr/aa12/.mbox

Ans.A

55) .mailrc is the file
a. Which stores the incoming mail
b. Which is used to type the mail to be sent
c. Which is invoked when the mail command is executed
d. Which permits you to customize the vi environment

Ans.C

56) The escape sequence 33[4m is used to
a. underlying characters
b. mark them as bold
c. display them in reverse video
d. none of the above

Ans.B

57) Which of the following assignments is illegal
a. a=’ls’
b. b=’ls –l’
c. c=’1972’
d. d=’who | grepaal’

Ans.C

58) Which of the following assignment is illegal
a. a=’cat file’
b. a=100 b=50
c. age=25
d. all the above

Ans.C

59) A null variable a can be created using
a. a=
b. a=’’
c. a=””
d. All the above

Ans.D

60) The shell metacharacter $# represents
a. Total number of arguments supplied to the shell script
b. Total number of files in the current directory
c. Total number of users who have logged in
d. Total number of processes running in the background

Ans.A

61. When we are executing a shell script the shell acts as
a. An interpreter
b. A compiler
c. An operating system
d. None of the above

Ans.A

62. On executing a statement set -3+1
a. $1 would be -3
b. $1 would be –
c. $1 would be set
d. This command would result into an error

Ans.D

63. On executing the command Shift $v
a. The positional parameters would be shifted by the value of the variable v
b. The positional parameters would be shifted by 1
c. The positional parameters would not be shifted at all
d. This command would result into an error

Ans.A

64. Which of the following is NOT a shell keyword
a. Shift
b. Readonly
c. Unset
d. ls

Ans. D

65. To the statement read v1 v2 v3 we can supply
a. maximum 3 values
b. only 1 value
c. exactly 3 values
d. any number of values

Ans.D

66. The metacharacter $* represents
a. Number of parameters supplied at the command prompt
b. Parameters supplied at the command prompt
c. Value of the variable *
d. All files in the current directory

Ans.B

67. A shell variable cannot start with
a. An alphabet
b. A number
c. A special symbol other than an underscore
d. Both b and c above

Ans.D

68. Which of the following shows the correct hierarchy of arithmetic operations in shell
a. (),**,* or /, + or –
b. (), **, *,/,+,-
c. (),**,/,*,+,-
d. (),/,% or *,- or +

Ans.D

69. Which of the following statements is correct
a. a=expr $b + $c
b. a=’expr $b * $c’
c. a=’expr $b * ($c + $d)’
d. a=’expr $b * ( $c + $d )’

Ans.D

70. Which of the following is allowed in an arithmetic statement involving exprinstruction
a. []
b. {}
c. ()
d. None of the above

Ans.C

71. The statement z=’expr 5/2’ would store in z a value
a. 2.5
b. 3
c. 2
d. 0

Ans.C

72. The expression expr -7 % 2evaluates to
a. 1
b. -1
c. -3.5
d. 0

Ans.B

73. The expression expr -2 % 7 evaluates to
a. 2
b. -2
c. 0
d. 0.285

Ans.B

74. Hierarchy decides which operator
a. Is most important
b. Is used first
c. Is fastest
d. Operates on largest numbers

Ans.B

75. The break statement is used to exit from
a. An if statement
b. A for loop
c. A program
d. None of the above

Ans.B

76. An until loop ensures that the statement within the loop get executed
a. Only once
b. Atleast once
c. Not even once
d. None of the above

Ans.D

77. The cp command uses
a. Standard input file
b. Standard output file
c. Both input and output file
d. Neither input nor output file

Ans.D

78. Which option will be used with sort command to start sorting after the nth column of the (m+1)th field
a. –m.n
b. +m.n
c. +n.m+1
d. +(m+1).n

Ans.B

79. Which command is used to terminate a process
a. Shutdown
b. Haltsys
c. Cancel
d. Kill

Ans.D

80. The command is used to compare the files is known as
a. Comp
b. Cmp
c. Do
d. Ccp

Ans.B

81) Which of the following keys is used to move the cursor to the end of the paragraph
a. }
b. {
c. |
d. $

Ans.A

82) The command which transcribes the standard input to the standard output and also makes a copy of the same in a file is
a. Tee
b. Tr
c. Sort
d. Grep

Ans.A

83) Which command is used to remove a directory
a. Rd
b. Rmdir
c. Dldir
d. Rdir

Ans.B

84) Which of the following keys is used to replace a dingle character with new text
a. S
b. s
c. r
d. C

Ans.B

85) Which command is used to extract a specific columns from the file
a. Cat
b. Cut
c. Grep
d. Paste

Ans.B

86) Which command sends the word count of the file infile to the newfile.
a. wcinfile>newfile
b. wcnewfile
c. wcinfile – newfile
d. wcinfile | newfile

Ans.A

87) Which command is used to remove the read permission of the file ‘note’ from both the group and others?
a. chmodgo+r note
b. chmodgo+rw note
c. chmod go-x note
d. chmod go-r, 4-x note

Ans.D

88) Which command is used to concatenate all files beginning with the string ’emp’ and followed by a non-numeric characters?
a. cat emp[!0-9]
b. more [emp][!0-9]
c. cat emp[x-z]
d. cat emp[a-z]

Ans.A

89) Which command will be used with vi editor to insert text to left of cursor?
a. s
b. S
c. a
d. i

Ans.D

90) In vi editor, forward search is performed using the command.
a. :pat
b. :pat
c. /pat
d. All of the above

Ans.D

91) Which of the following special shell variables is used to process number of the last background job?
a. $!
b. $#
c. $0
d. $*

Ans.A

92) Which option will be used with ps command to slow the entire command line of the process being run?
A. -4
B. -f
C. -1
D. -4

Ans.B

93) Which of the following command addresses all users who are currently hooked on?
A. write
B. mail
C. wall
D. mesg

Ans.C

94) Which of the following commands is used to identify the type of file by context?
A. ls
B. cat
C. file
D. more

Ans.C

95) The filed separator in cut command is specified with
A. -a option
B. -d option
C. -r option
D. -x option

Ans.B

96) Which of the following options will be used to display number of blocks used by a file?
A. -c
B. -i
C. -d
D. -s

Ans.D

97) Which option will be used with touch command to change the access time?
A. -a
B. -b
C. -t
D. -h

Ans.A

98) Which command is used to make all files and sub-directories in the directory (progs) executable by all users?
A. chmod -R a+xprogs
B. chmod -R 222 progs
C. chmod -1 a+xprogs
D. chmod -x a+xprogs

Ans.A

99) Which command is used to display and create files?
A. cat
B. vi
C. ed
D. lyrix

Ans.A

100) The second set of the three permissions (r-) indicates that
A. group has read permission only
B. other has read permission only
C. owner has read permission only
D. group has write permission only

Ans.A

Leave a Comment