1.
Command used to create an empty file.
Correct Answer
B. Touch
Explanation
The correct answer is "touch". The touch command is used to create an empty file in various operating systems, including Unix, Linux, and macOS. It can also be used to update the access and modification timestamps of existing files. By using the touch command followed by a file name, a new empty file with that name will be created.
2.
Which is the command used to remove or delete a file without confirmation msg?
Correct Answer
B. Rm
Explanation
"rm" this command removes/deletes the file which is not required, but it does not display a confirmation message.
3.
........command is used to show the logger or user.
Correct Answer
B. Who
Explanation
This command shows who is logged or who is the user.
4.
"cat" is the command used to
Correct Answer
D. See the contents of file
Explanation
"cat" commands show the complete contents of the file that is being used.
5.
What command clears the contents of your terminal display?
Correct Answer
clear, Clear
Explanation
The command "clear" or "Clear" is used to clear the contents of the terminal display. It removes all the text and commands that have been entered, providing a clean and empty screen. This can be useful when the terminal is cluttered with previous commands or output, allowing the user to start with a fresh and clear display.
6.
What command and parameter (or switch) will force a program to quit (even one running in the background)?
Correct Answer
kill, kill -9
Explanation
The "kill" command is used to terminate a running program in a Unix-like operating system. By default, it sends a signal to the program requesting it to exit gracefully. However, in some cases, a program may not respond to the signal, and in such situations, the "-9" parameter (or switch) can be used with the "kill" command. This sends a "SIGKILL" signal to the program, which forcefully terminates it, even if it is running in the background.
7.
What command(s) shows you disk partitions and percentage of disk space used?
Correct Answer
df, du
Explanation
The df command displays the amount of disk space used and available on a file system, including the percentage of disk space used. The du command, on the other hand, shows the disk usage of files and directories. Both commands provide information about disk partitions and the percentage of disk space used, making them the correct answer.
8.
What command shows you what directory you are in?
Correct Answer
pwd
Explanation
The "pwd" command stands for "print working directory" and it is used to display the current directory you are in. By running this command, the system will show the full path of the directory you are currently located in. This can be helpful when navigating through the file system and confirming your current location.
9.
What command displays your current username?
Correct Answer
whoami
Explanation
The "whoami" command displays the current username of the user logged into the system. It is a simple and straightforward command that provides the information about the user's identity.
10.
What command shows you CPU and memory utilization for running processes?
Correct Answer
top
Explanation
The command "top" shows the CPU and memory utilization for running processes. It provides real-time information about the processes running on a system, including their CPU usage, memory usage, and other system statistics. By using the "top" command, users can monitor the performance of their system and identify any processes that may be consuming excessive resources.
11.
What command allows you to open and view a file one page at a time?
Correct Answer
less, more
Explanation
The commands "less" and "more" both allow you to open and view a file one page at a time. These commands are commonly used in Unix and Linux systems to view the contents of a file without overwhelming the screen with too much information at once. They allow you to scroll through the file one page at a time, making it easier to read and navigate through large files.
12.
What command is used to change a file name?
Correct Answer
mv
Explanation
The "mv" command is used to change a file name. This command allows users to move or rename files and directories. By using the "mv" command followed by the current file name and the desired new file name, the file can be renamed. This command is commonly used in command-line interfaces to manage file names and locations efficiently.
13.
What is the command to switch to the root user account?
Correct Answer
su
Explanation
The command "su" is used to switch to the root user account in Unix-like operating systems. By typing "su" followed by the root user's password, the current user can gain administrative privileges and access the root account's capabilities and files. This command is commonly used when performing system maintenance tasks or executing commands that require elevated permissions.
14.
What command is used to change the permissions of a file?
Correct Answer
chmod
Explanation
The command "chmod" is used to change the permissions of a file. This command allows the user to modify the access permissions for a file or directory, controlling who can read, write, or execute the file. By using the "chmod" command followed by the appropriate permission codes, the user can grant or revoke permissions for the owner, group, and others. This command is commonly used in Linux and Unix operating systems to manage file permissions effectively.
15.
What is the command to change your password?
Correct Answer
passwd
Explanation
The command "passwd" is used to change the password.
16.
What command is used to display your previous commands?
Correct Answer
up arrow, Up arrow, fc, history
Explanation
The up arrow key is used to display previous commands in a command line interface. It allows the user to cycle through their command history and quickly access previously executed commands. The "Up arrow" and "up arrow" options refer to the same key on the keyboard. "fc" is a command in some Unix-like operating systems that is used to list or edit previous commands, but it is not commonly used for this purpose. "History" is a command that displays a list of previously executed commands in some command line interfaces.
17.
What is the command to run a program with elevated permissions?
Correct Answer
sudo
Explanation
The command "sudo" is used to run a program with elevated permissions. It allows users to execute commands as a superuser or another user specified in the sudoers file. This command is commonly used in Unix-like operating systems to perform administrative tasks that require higher privileges than the current user has. By prefixing a command with "sudo", the user can temporarily elevate their privileges and execute the command as if they were the superuser.
18.
What is the command to delete a file?
Correct Answer
rm
Explanation
The command "rm" is used to delete a file in a Unix or Linux operating system. It stands for "remove" and is followed by the file name that you want to delete. This command permanently removes the file from the system, and it cannot be recovered once deleted.
19.
What command is used to change directories?
Correct Answer
cd
Explanation
The command "cd" is used to change directories in a command line interface. It stands for "change directory" and is commonly used in operating systems like Unix, Linux, and Windows. By typing "cd" followed by the name of the directory you want to navigate to, you can switch to a different location within the file system. This command is essential for navigating through folders and accessing different files and directories.
20.
What command is used to get the IP address of all interfaces on a server?
Correct Answer
ifconfig -a
Explanation
The command "ifconfig -a" is used to get the IP address of all interfaces on a server. The "-a" option stands for "all" and it displays information about all network interfaces, including their IP addresses, on the server. By running this command, the user can easily obtain the IP addresses associated with each interface, allowing for network troubleshooting or configuration purposes.
21.
What command is used to change ownership of a file?
Correct Answer
chown
Explanation
The command "chown" is used to change the ownership of a file. It allows the user to modify the owner of a file or directory to a specified user or group. By using this command, the user can transfer ownership rights from one user to another, granting or revoking permissions as necessary.
22.
What command shows you how long it has been since the server was rebooted?
Correct Answer
uptime
Explanation
The command "uptime" is used to display the amount of time that has passed since the server was last rebooted. It provides information such as the current time, how long the server has been running, the number of users currently logged in, and the system load average for the past 1, 5, and 15 minutes. By using this command, administrators can determine the server's uptime and assess its performance and stability.
23.
What is the command to run a program with elevated permissions?
Correct Answer
sudo
Explanation
The command "sudo" is used to run a program with elevated permissions. "sudo" stands for "superuser do" and allows a user to execute a command as a superuser or another user, depending on the configuration. This command is commonly used in Unix-based systems, such as Linux, to perform administrative tasks that require elevated privileges. By using "sudo" before a command, the user can temporarily gain the necessary permissions to execute the command with administrative privileges.
24.
What is the command to delete a file?
Correct Answer
rm
Explanation
The command "rm" is used to delete a file in a Unix/Linux operating system. It stands for "remove" and is followed by the name of the file that needs to be deleted. This command permanently removes the file from the system, and it cannot be recovered once deleted.
25.
.............is the command used to create new directory.
Correct Answer
A. Mkdir
Explanation
The command "mkdir" is used to create a new directory.
26.
What is cloud computing replacing?
Correct Answer
D. All of the above
Explanation
Cloud computing is replacing all of the above options, which include corporate data centers, expensive personal computer hardware, and expensive software upgrades. Cloud computing allows businesses and individuals to store and access data and software applications remotely through the internet, eliminating the need for on-site data centers and expensive hardware. Additionally, cloud computing services often provide regular software updates and upgrades, reducing the cost and hassle of purchasing and installing new software versions. Therefore, cloud computing offers a more cost-effective and flexible alternative to traditional computing methods.
27.
What is the default directory path for system log files?
Correct Answer
/var/logs, /var/logs/
Explanation
The default directory path for system log files is /var/logs or /var/logs/. This is where the log files are stored by default on a system.
28.
Which of these companies is not a leader in cloud computing?
Correct Answer
C. Ctrl -S
Explanation
Ctrl -S is not a company, but rather a keyboard shortcut used to save files in various computer applications. Therefore, it is not a leader in cloud computing like Google, Amazon, and Microsoft.
29.
How many times the program will print "Zelarsoft"?
#include<stdio.h>
int main()
{
printf("Zelarsoft");
main();
return 0;
}
Correct Answer
D. Till stack overflows
Explanation
The program will print "Zelarsoft" until the stack overflows. This is because the main function calls itself recursively without any condition to stop the recursion. As a result, the program will keep printing "Zelarsoft" indefinitely until it runs out of stack space, causing a stack overflow.
30.
Which cloud deployment model is managed by a cloud provider, has an infrastructure that is offsite, and is accessible to the general public?
Correct Answer
C. Public cloud
Explanation
A public cloud deployment model is managed by a cloud provider, meaning that the provider takes care of the infrastructure and maintenance. The infrastructure is offsite, which implies that it is located in a remote data center. Additionally, a public cloud is accessible to the general public, allowing anyone to access and use the services provided by the cloud provider. Therefore, the correct answer is Public cloud.
31.
What command is used to count the total number of lines, words, and characters contained in a file?
Correct Answer
D. Count p
Explanation
The correct answer is "wc". The "wc" command is used to count the total number of lines, words, and characters contained in a file.
32.
Each problem consists of three statements. Based on the first two statements, the third statement may be true, false, or uncertain.
Tanya is older than Eric.
Cliff is older than Tanya.
Eric is older than Cliff.
If the first two statements are true, the third statement is
Correct Answer
B. False
Explanation
Based on the first two statements, it is stated that Tanya is older than Eric and Cliff is older than Tanya. Therefore, if Tanya is older than Eric and Cliff is older than Tanya, it is not possible for Eric to be older than Cliff. Hence, the third statement "Eric is older than Cliff" is false.
33.
Look at this series: 7, 10, 8, 11, 9, 12, ... What number should come next?
Correct Answer
B. 10
Explanation
The pattern in the series is that the first number increases by 3, then the second number decreases by 2, and this pattern continues alternately. Therefore, the next number should be obtained by increasing 8 by 3, resulting in 11.
34.
Odometer is to mileage as compass is to
Correct Answer
D. Direction
Explanation
The odometer measures the distance traveled, which is represented by mileage. Similarly, the compass is used to determine which way to go, indicating the direction. Therefore, the correct answer is "direction."
35.
Which of the following is most important area of concern in cloud computing ?
Correct Answer
A. Security
Explanation
In cloud computing, security is the most important area of concern. This is because cloud computing involves storing and accessing data and applications over the internet, which can make them vulnerable to unauthorized access, data breaches, and other security threats. It is crucial to ensure that proper security measures are in place to protect sensitive data and maintain the privacy and integrity of the cloud infrastructure.
36.
Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?
Correct Answer
B. Amazon Elastic Block Store
Explanation
Amazon Elastic Block Store (EBS) is a system for creating block level storage devices that can be used for Amazon Machine Instances (AMI) in EC2. EBS allows users to create persistent storage volumes that can be attached to EC2 instances, providing durable and reliable storage for data. It is designed to be highly available and scalable, offering features such as snapshots and encryption. Therefore, Amazon Elastic Block Store is the correct answer to the question.
37.
When it was feared that the serfs might go too far and gain their freedom from serfdom, the protestant leaders joined the princes at crushing them.
Correct Answer
B. In crushing
Explanation
The correct answer is "in crushing". This preposition is used to indicate the involvement or participation of someone in an action. In this context, it suggests that the Protestant leaders joined the princes in the act of crushing the serfs, implying that they were actively involved in suppressing the serfs' potential freedom from serfdom.
38.
What TCP/IP protocol is used for remote terminal connection service?
Correct Answer
C. Telnet
Explanation
Telnet is the correct answer because it is the TCP/IP protocol used for remote terminal connection service. Telnet allows a user to remotely access and control another computer or device over a network. It provides a command-line interface for executing commands on the remote device, making it an essential tool for remote administration and troubleshooting. Unlike UDP and TCP, which are transport layer protocols, Telnet operates at the application layer of the TCP/IP protocol suite. Ping, on the other hand, is a utility used to test network connectivity and does not provide remote terminal connection services.
39.
How can you add Amit, a new user, to your system?
Correct Answer
D. All of the above
Explanation
The correct answer is "All of the above" because all three options mentioned (useradd, adduser, and linuxconf) can be used to add a new user, in this case Amit, to the system. Each option represents a different method or command that can be used to perform the task of adding a new user. Therefore, any of these options can be chosen to add Amit as a new user to the system.
40.
What command do you use to create Linux file systems?
Correct Answer
B. Mkfs
Explanation
The command "mkfs" is used to create Linux file systems. This command is used to format a storage device or partition with a specific file system, such as ext4 or xfs, making it ready for use. By using "mkfs", users can create a new file system on a disk or partition, allowing them to store and organize data in a structured manner. This command is an essential tool for managing storage in Linux systems.
41.
What command is used to display the characteristics of a process?
Correct Answer
A. Ps
Explanation
The command "ps" is used to display the characteristics of a process. It stands for "process status" and provides information about the currently running processes on a system. By executing the "ps" command, users can view details such as the process ID, CPU and memory usage, parent process, and other relevant information. This command is commonly used in Unix-based operating systems to monitor and manage processes.
42.
Which of the following feature is used for scaling of EC2 sites?
Correct Answer
B. Auto Scaling
Explanation
Auto Scaling is the feature used for scaling of EC2 sites. It automatically adjusts the number of EC2 instances in a group based on the demand. It helps in maintaining the desired level of performance and availability by adding or removing instances as needed. This feature allows for automatic scaling up during periods of high traffic and scaling down during periods of low traffic, ensuring cost-effectiveness and efficient resource utilization.
43.
Which of the following is true?
Correct Answer
A. You can attach multiple route tables to a subnet
Explanation
In AWS, it is possible to attach multiple route tables to a subnet. This allows for more flexibility in routing traffic within the subnet. By attaching multiple route tables, different sets of rules can be applied to different parts of the subnet, allowing for more granular control over network traffic.
44.
It was Sunday on Jan 1, 2006. What was the day of the week Jan 1, 2010?
Correct Answer
C. Friday
Explanation
To find the day of the week on Jan 1, 2010, we need to count the number of days between Jan 1, 2006, and Jan 1, 2010. There are 4 years between these dates, and each year has 365 days (since it's not a leap year). So, the total number of days is 4 * 365 = 1460 days. Since 1460 is divisible by 7, the day of the week on Jan 1, 2010, will be the same as Jan 1, 2006. Therefore, the answer is Friday.
45.
Two ships are sailing in the sea on the two sides of a lighthouse. The angle of elevation of the top of the lighthouse is observed from the ships are 30° and 45° respectively. If the lighthouse is 100 m high, the distance between the two ships is:
Correct Answer
C. 273 m
Explanation
The angle of elevation of the top of the lighthouse from one ship is 30° and from the other ship is 45°. This means that the two ships form a right-angled triangle with the lighthouse at the right angle. The height of the lighthouse (opposite side) is given as 100 m. Using trigonometry, we can use the tangent function to find the lengths of the adjacent sides. The tangent of 30° is equal to the length of the side opposite to the angle (100 m) divided by the length of the adjacent side (distance between the ships). Similarly, the tangent of 45° is equal to 100 m divided by the length of the other adjacent side. By solving these equations, we find that the distance between the two ships is 273 m.
46.
What command is used with vi editor to save file and remain in the editing mode?
Correct Answer
A. :w
Explanation
The command ":w" is used with the vi editor to save the file. It allows the user to save the changes made to the file while remaining in the editing mode. This command is commonly used to save the progress made in editing a file without exiting the vi editor.
47.
What command is used to sort the lines of data in a file in alphabetical order?
Correct Answer
A. Sort
Explanation
The correct answer is "sort." The sort command is used to sort the lines of data in a file in alphabetical order. It arranges the lines in ascending order by default. If the -r option is used with the sort command, it will sort the lines in descending order.
48.
What command is used with vi editors to search a pattern in the forward direction?
Correct Answer
D. /
Explanation
The forward search command in vi editors is "/". This command allows the user to search for a specific pattern in the forward direction within the text. By using "/", the user can enter the desired pattern and vi will locate the next occurrence of that pattern in the text. This command is commonly used for navigation and editing purposes in vi editors.
49.
Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud ?
Correct Answer
A. Amazon Elastic MapReduce
Explanation
Amazon Elastic MapReduce is built on top of a Hadoop framework using the Elastic Compute Cloud. It is a cloud-based big data processing service that allows users to easily process large amounts of data using the Hadoop framework. By using the Elastic Compute Cloud, Amazon Elastic MapReduce can dynamically scale the cluster size based on the workload, providing a flexible and scalable solution for big data processing.
50.
Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?
Correct Answer
C. Spot Instance
Explanation
A Spot Instance is a method for bidding on unused EC2 capacity based on the current spot price. Spot Instances allow you to take advantage of unused EC2 instances at a significantly lower cost compared to On-Demand or Reserved Instances. By specifying the maximum price you are willing to pay, you can bid for instances and if the spot price is below your bid, your instances will be launched. This allows you to optimize costs and take advantage of available capacity while still meeting your application's requirements.