DevOps: Trivia Questions Quiz On Development And Operations!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By LakshmojiRao
L
LakshmojiRao
Community Contributor
Quizzes Created: 1 | Total Attempts: 389
Questions: 50 | Attempts: 389

SettingsSettingsSettings
DevOps: Trivia Questions Quiz On Development And Operations! - Quiz

Welcome to the trivia questions quiz on Development and Operations! It is a quiz that is designed for software developers so that they can review what they know about DevOps and how they attain their goals in the department. Do you think you have what it takes to answer all the questions right? Do give it a try and all the best!


Questions and Answers
  • 1. 

    Command used to create an empty file.

    • A.

      Mtfile

    • B.

      Touch

    • C.

      Intouch

    • D.

      File

    Correct Answer
    B. Touch
    Explanation
    The correct answer is "touch". The touch command is used to create an empty file in various operating systems, including Unix, Linux, and macOS. It can also be used to update the access and modification timestamps of existing files. By using the touch command followed by a file name, a new empty file with that name will be created.

    Rate this question:

  • 2. 

    Which is the command used to remove or delete a file without confirmation msg?

    • A.

      Rm-f

    • B.

      Rm

    • C.

      Del

    • D.

      Remove

    Correct Answer
    B. Rm
    Explanation
    "rm" this command removes/deletes the file which is not required, but it does not display a confirmation message.

    Rate this question:

  • 3. 

    ........command is used to show the logger or user.

    • A.

      ?

    • B.

      Who

    • C.

      No of

    • D.

      ???

    Correct Answer
    B. Who
    Explanation
    This command shows who is logged or who is the user.

    Rate this question:

  • 4. 

    "cat" is the command used to

    • A.

      Change directory

    • B.

      Move directory

    • C.

      Come out of shell

    • D.

      See the contents of file

    Correct Answer
    D. See the contents of file
    Explanation
    "cat" commands show the complete contents of the file that is being used.

    Rate this question:

  • 5. 

    What command clears the contents of your terminal display?

    Correct Answer
    clear, Clear
    Explanation
    The command "clear" or "Clear" is used to clear the contents of the terminal display. It removes all the text and commands that have been entered, providing a clean and empty screen. This can be useful when the terminal is cluttered with previous commands or output, allowing the user to start with a fresh and clear display.

    Rate this question:

  • 6. 

    What command and parameter (or switch) will force a program to quit (even one running in the background)?

    Correct Answer
    kill, kill -9
    Explanation
    The "kill" command is used to terminate a running program in a Unix-like operating system. By default, it sends a signal to the program requesting it to exit gracefully. However, in some cases, a program may not respond to the signal, and in such situations, the "-9" parameter (or switch) can be used with the "kill" command. This sends a "SIGKILL" signal to the program, which forcefully terminates it, even if it is running in the background.

    Rate this question:

  • 7. 

    What command(s) shows you disk partitions and percentage of disk space used?

    Correct Answer
    df, du
    Explanation
    The df command displays the amount of disk space used and available on a file system, including the percentage of disk space used. The du command, on the other hand, shows the disk usage of files and directories. Both commands provide information about disk partitions and the percentage of disk space used, making them the correct answer.

    Rate this question:

  • 8. 

    What command shows you what directory you are in?

    Correct Answer
    pwd
    Explanation
    The "pwd" command stands for "print working directory" and it is used to display the current directory you are in. By running this command, the system will show the full path of the directory you are currently located in. This can be helpful when navigating through the file system and confirming your current location.

    Rate this question:

  • 9. 

    What command displays your current username?

    Correct Answer
    whoami
    Explanation
    The "whoami" command displays the current username of the user logged into the system. It is a simple and straightforward command that provides the information about the user's identity.

    Rate this question:

  • 10. 

    What command shows you CPU and memory utilization for running processes?

    Correct Answer
    top
    Explanation
    The command "top" shows the CPU and memory utilization for running processes. It provides real-time information about the processes running on a system, including their CPU usage, memory usage, and other system statistics. By using the "top" command, users can monitor the performance of their system and identify any processes that may be consuming excessive resources.

    Rate this question:

  • 11. 

    What command allows you to open and view a file one page at a time?

    Correct Answer
    less, more
    Explanation
    The commands "less" and "more" both allow you to open and view a file one page at a time. These commands are commonly used in Unix and Linux systems to view the contents of a file without overwhelming the screen with too much information at once. They allow you to scroll through the file one page at a time, making it easier to read and navigate through large files.

    Rate this question:

  • 12. 

    What command is used to change a file name?

    Correct Answer
    mv
    Explanation
    The "mv" command is used to change a file name. This command allows users to move or rename files and directories. By using the "mv" command followed by the current file name and the desired new file name, the file can be renamed. This command is commonly used in command-line interfaces to manage file names and locations efficiently.

    Rate this question:

  • 13. 

    What is the command to switch to the root user account?

    Correct Answer
    su
    Explanation
    The command "su" is used to switch to the root user account in Unix-like operating systems. By typing "su" followed by the root user's password, the current user can gain administrative privileges and access the root account's capabilities and files. This command is commonly used when performing system maintenance tasks or executing commands that require elevated permissions.

    Rate this question:

  • 14. 

    What command is used to change the permissions of a file?

    Correct Answer
    chmod
    Explanation
    The command "chmod" is used to change the permissions of a file. This command allows the user to modify the access permissions for a file or directory, controlling who can read, write, or execute the file. By using the "chmod" command followed by the appropriate permission codes, the user can grant or revoke permissions for the owner, group, and others. This command is commonly used in Linux and Unix operating systems to manage file permissions effectively.

    Rate this question:

  • 15. 

    What is the command to change your password?

    Correct Answer
    passwd
    Explanation
    The command "passwd" is used to change the password.

    Rate this question:

  • 16. 

    What command is used to display your previous commands?

    Correct Answer
    up arrow, Up arrow, fc, history
    Explanation
    The up arrow key is used to display previous commands in a command line interface. It allows the user to cycle through their command history and quickly access previously executed commands. The "Up arrow" and "up arrow" options refer to the same key on the keyboard. "fc" is a command in some Unix-like operating systems that is used to list or edit previous commands, but it is not commonly used for this purpose. "History" is a command that displays a list of previously executed commands in some command line interfaces.

    Rate this question:

  • 17. 

    What is the command to run a program with elevated permissions?

    Correct Answer
    sudo
    Explanation
    The command "sudo" is used to run a program with elevated permissions. It allows users to execute commands as a superuser or another user specified in the sudoers file. This command is commonly used in Unix-like operating systems to perform administrative tasks that require higher privileges than the current user has. By prefixing a command with "sudo", the user can temporarily elevate their privileges and execute the command as if they were the superuser.

    Rate this question:

  • 18. 

    What is the command to delete a file?

    Correct Answer
    rm
    Explanation
    The command "rm" is used to delete a file in a Unix or Linux operating system. It stands for "remove" and is followed by the file name that you want to delete. This command permanently removes the file from the system, and it cannot be recovered once deleted.

    Rate this question:

  • 19. 

    What command is used to change directories?

    Correct Answer
    cd
    Explanation
    The command "cd" is used to change directories in a command line interface. It stands for "change directory" and is commonly used in operating systems like Unix, Linux, and Windows. By typing "cd" followed by the name of the directory you want to navigate to, you can switch to a different location within the file system. This command is essential for navigating through folders and accessing different files and directories.

    Rate this question:

  • 20. 

    What command is used to get the IP address of all interfaces on a server?

    Correct Answer
    ifconfig -a
    Explanation
    The command "ifconfig -a" is used to get the IP address of all interfaces on a server. The "-a" option stands for "all" and it displays information about all network interfaces, including their IP addresses, on the server. By running this command, the user can easily obtain the IP addresses associated with each interface, allowing for network troubleshooting or configuration purposes.

    Rate this question:

  • 21. 

    What command is used to change ownership of a file?

    Correct Answer
    chown
    Explanation
    The command "chown" is used to change the ownership of a file. It allows the user to modify the owner of a file or directory to a specified user or group. By using this command, the user can transfer ownership rights from one user to another, granting or revoking permissions as necessary.

    Rate this question:

  • 22. 

    What command shows you how long it has been since the server was rebooted?

    Correct Answer
    uptime
    Explanation
    The command "uptime" is used to display the amount of time that has passed since the server was last rebooted. It provides information such as the current time, how long the server has been running, the number of users currently logged in, and the system load average for the past 1, 5, and 15 minutes. By using this command, administrators can determine the server's uptime and assess its performance and stability.

    Rate this question:

  • 23. 

    What is the command to run a program with elevated permissions?

    Correct Answer
    sudo
    Explanation
    The command "sudo" is used to run a program with elevated permissions. "sudo" stands for "superuser do" and allows a user to execute a command as a superuser or another user, depending on the configuration. This command is commonly used in Unix-based systems, such as Linux, to perform administrative tasks that require elevated privileges. By using "sudo" before a command, the user can temporarily gain the necessary permissions to execute the command with administrative privileges.

    Rate this question:

  • 24. 

    What is the command to delete a file?

    Correct Answer
    rm
    Explanation
    The command "rm" is used to delete a file in a Unix/Linux operating system. It stands for "remove" and is followed by the name of the file that needs to be deleted. This command permanently removes the file from the system, and it cannot be recovered once deleted.

    Rate this question:

  • 25. 

    .............is the command used to create new directory.

    • A.

      Mkdir

    • B.

      Newdir

    • C.

      Dir

    • D.

      Mk/dir

    Correct Answer
    A. Mkdir
    Explanation
    The command "mkdir" is used to create a new directory.

    Rate this question:

  • 26. 

    What is cloud computing replacing?

    • A.

      Corporate data centers

    • B.

      Expensive personal computer hardware

    • C.

      Expensive software upgrades

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    Cloud computing is replacing all of the above options, which include corporate data centers, expensive personal computer hardware, and expensive software upgrades. Cloud computing allows businesses and individuals to store and access data and software applications remotely through the internet, eliminating the need for on-site data centers and expensive hardware. Additionally, cloud computing services often provide regular software updates and upgrades, reducing the cost and hassle of purchasing and installing new software versions. Therefore, cloud computing offers a more cost-effective and flexible alternative to traditional computing methods.

    Rate this question:

  • 27. 

    What is the default directory path for system log files?

    Correct Answer
    /var/logs, /var/logs/
    Explanation
    The default directory path for system log files is /var/logs or /var/logs/. This is where the log files are stored by default on a system.

    Rate this question:

  • 28. 

    Which of these companies is not a leader in cloud computing?

    • A.

      Google

    • B.

      Amazon

    • C.

      Ctrl -S

    • D.

        Microsoft

    Correct Answer
    C. Ctrl -S
    Explanation
    Ctrl -S is not a company, but rather a keyboard shortcut used to save files in various computer applications. Therefore, it is not a leader in cloud computing like Google, Amazon, and Microsoft.

    Rate this question:

  • 29. 

    How many times the program will print "Zelarsoft"? #include<stdio.h> int main() { printf("Zelarsoft"); main(); return 0; }

    • A.

      Infinite times

    • B.

      32767 times

    • C.

      65535 times

    • D.

      Till stack overflows

    Correct Answer
    D. Till stack overflows
    Explanation
    The program will print "Zelarsoft" until the stack overflows. This is because the main function calls itself recursively without any condition to stop the recursion. As a result, the program will keep printing "Zelarsoft" indefinitely until it runs out of stack space, causing a stack overflow.

    Rate this question:

  • 30. 

    Which cloud deployment model is managed by a cloud provider, has an infrastructure that is offsite, and is accessible to the general public?

    • A.

       Community cloud

    • B.

       Hybrid cloud

    • C.

      Public cloud   

    • D.

      Private cloud

    Correct Answer
    C. Public cloud   
    Explanation
    A public cloud deployment model is managed by a cloud provider, meaning that the provider takes care of the infrastructure and maintenance. The infrastructure is offsite, which implies that it is located in a remote data center. Additionally, a public cloud is accessible to the general public, allowing anyone to access and use the services provided by the cloud provider. Therefore, the correct answer is Public cloud.

    Rate this question:

  • 31. 

    What command is used to count the total number of lines, words, and characters contained in a file?

    • A.

      Countw

    • B.

      Wcount

    • C.

      Wc

    • D.

      Count p

    • E.

      None of the above

    Correct Answer
    D. Count p
    Explanation
    The correct answer is "wc". The "wc" command is used to count the total number of lines, words, and characters contained in a file.

    Rate this question:

  • 32. 

    Each problem consists of three statements. Based on the first two statements, the third statement may be true, false, or uncertain. Tanya is older than Eric. Cliff is older than Tanya. Eric is older than Cliff. If the first two statements are true, the third statement is

    • A.

      True

    • B.

      False

    • C.

      Uncertain

    • D.

      None

    Correct Answer
    B. False
    Explanation
    Based on the first two statements, it is stated that Tanya is older than Eric and Cliff is older than Tanya. Therefore, if Tanya is older than Eric and Cliff is older than Tanya, it is not possible for Eric to be older than Cliff. Hence, the third statement "Eric is older than Cliff" is false.

    Rate this question:

  • 33. 

    Look at this series: 7, 10, 8, 11, 9, 12, ... What number should come next?

    • A.

      7

    • B.

      10

    • C.

      12

    • D.

      13

    Correct Answer
    B. 10
    Explanation
    The pattern in the series is that the first number increases by 3, then the second number decreases by 2, and this pattern continues alternately. Therefore, the next number should be obtained by increasing 8 by 3, resulting in 11.

    Rate this question:

  • 34. 

    Odometer is to mileage as compass is to

    • A.

      Speed

    • B.

      Hiking

    • C.

      Needle

    • D.

      Direction

    Correct Answer
    D. Direction
    Explanation
    The odometer measures the distance traveled, which is represented by mileage. Similarly, the compass is used to determine which way to go, indicating the direction. Therefore, the correct answer is "direction."

    Rate this question:

  • 35. 

    Which of the following is most important area of concern in cloud computing ?

    • A.

      Security

    • B.

      Storage

    • C.

       Scalability

    • D.

      All of the mentioned

    Correct Answer
    A. Security
    Explanation
    In cloud computing, security is the most important area of concern. This is because cloud computing involves storing and accessing data and applications over the internet, which can make them vulnerable to unauthorized access, data breaches, and other security threats. It is crucial to ensure that proper security measures are in place to protect sensitive data and maintain the privacy and integrity of the cloud infrastructure.

    Rate this question:

  • 36. 

    Which of the following is a system for creating block level storage devices that can be used for Amazon Machine Instances in EC2 ?

    • A.

      CloudWatch

    • B.

      Amazon Elastic Block Store

    • C.

      AWS Import/Export

    • D.

      All of the mentioned

    Correct Answer
    B. Amazon Elastic Block Store
    Explanation
    Amazon Elastic Block Store (EBS) is a system for creating block level storage devices that can be used for Amazon Machine Instances (AMI) in EC2. EBS allows users to create persistent storage volumes that can be attached to EC2 instances, providing durable and reliable storage for data. It is designed to be highly available and scalable, offering features such as snapshots and encryption. Therefore, Amazon Elastic Block Store is the correct answer to the question.

    Rate this question:

  • 37. 

    When it was feared that the serfs might go too far and gain their freedom from serfdom, the protestant leaders joined the princes at crushing them.

    • A.

      Into crushing

    • B.

      In crushing

    • C.

      Without crushing

    • D.

      No improvement

    Correct Answer
    B. In crushing
    Explanation
    The correct answer is "in crushing". This preposition is used to indicate the involvement or participation of someone in an action. In this context, it suggests that the Protestant leaders joined the princes in the act of crushing the serfs, implying that they were actively involved in suppressing the serfs' potential freedom from serfdom.

    Rate this question:

  • 38. 

    What TCP/IP protocol is used for remote terminal connection service?

    • A.

      UDP

    • B.

      TCP

    • C.

      Telnet

    • D.

      Ping

    Correct Answer
    C. Telnet
    Explanation
    Telnet is the correct answer because it is the TCP/IP protocol used for remote terminal connection service. Telnet allows a user to remotely access and control another computer or device over a network. It provides a command-line interface for executing commands on the remote device, making it an essential tool for remote administration and troubleshooting. Unlike UDP and TCP, which are transport layer protocols, Telnet operates at the application layer of the TCP/IP protocol suite. Ping, on the other hand, is a utility used to test network connectivity and does not provide remote terminal connection services.

    Rate this question:

  • 39. 

    How can you add Amit, a new user, to your system?

    • A.

      Using useradd

    • B.

      Using adduser

    • C.

      Using linuxconf

    • D.

      All of the above

    Correct Answer
    D. All of the above
    Explanation
    The correct answer is "All of the above" because all three options mentioned (useradd, adduser, and linuxconf) can be used to add a new user, in this case Amit, to the system. Each option represents a different method or command that can be used to perform the task of adding a new user. Therefore, any of these options can be chosen to add Amit as a new user to the system.

    Rate this question:

  • 40. 

    What command do you use to create Linux file systems?

    • A.

      Fdisk

    • B.

      Mkfs

    • C.

      Mount

    • D.

      Fsck

    Correct Answer
    B. Mkfs
    Explanation
    The command "mkfs" is used to create Linux file systems. This command is used to format a storage device or partition with a specific file system, such as ext4 or xfs, making it ready for use. By using "mkfs", users can create a new file system on a disk or partition, allowing them to store and organize data in a structured manner. This command is an essential tool for managing storage in Linux systems.

    Rate this question:

  • 41. 

    What command is used to display the characteristics of a process?

    • A.

      Ps

    • B.

      Au

    • C.

      Du

    • D.

      Top

    Correct Answer
    A. Ps
    Explanation
    The command "ps" is used to display the characteristics of a process. It stands for "process status" and provides information about the currently running processes on a system. By executing the "ps" command, users can view details such as the process ID, CPU and memory usage, parent process, and other relevant information. This command is commonly used in Unix-based operating systems to monitor and manage processes.

    Rate this question:

  • 42. 

    Which of the following feature is used for scaling of EC2 sites?

    • A.

      Auto Replica

    • B.

      Auto Scaling

    • C.

      Auto Ruling

    • D.

      All of the mentioned

    Correct Answer
    B. Auto Scaling
    Explanation
    Auto Scaling is the feature used for scaling of EC2 sites. It automatically adjusts the number of EC2 instances in a group based on the demand. It helps in maintaining the desired level of performance and availability by adding or removing instances as needed. This feature allows for automatic scaling up during periods of high traffic and scaling down during periods of low traffic, ensuring cost-effectiveness and efficient resource utilization.

    Rate this question:

  • 43. 

    Which of the following is true?

    • A.

      You can attach multiple route tables to a subnet

    • B.

      You can attach multiple subnets to a route table

    • C.

      Both A and B

    • D.

      None of these.

    Correct Answer
    A. You can attach multiple route tables to a subnet
    Explanation
    In AWS, it is possible to attach multiple route tables to a subnet. This allows for more flexibility in routing traffic within the subnet. By attaching multiple route tables, different sets of rules can be applied to different parts of the subnet, allowing for more granular control over network traffic.

    Rate this question:

  • 44. 

    It was Sunday on Jan 1, 2006. What was the day of the week Jan 1, 2010?

    • A.

      Sunday

    • B.

      Saturday

    • C.

      Friday

    • D.

      Wednesday

    Correct Answer
    C. Friday
    Explanation
    To find the day of the week on Jan 1, 2010, we need to count the number of days between Jan 1, 2006, and Jan 1, 2010. There are 4 years between these dates, and each year has 365 days (since it's not a leap year). So, the total number of days is 4 * 365 = 1460 days. Since 1460 is divisible by 7, the day of the week on Jan 1, 2010, will be the same as Jan 1, 2006. Therefore, the answer is Friday.

    Rate this question:

  • 45. 

    Two ships are sailing in the sea on the two sides of a lighthouse. The angle of elevation of the top of the lighthouse is observed from the ships are 30° and 45° respectively. If the lighthouse is 100 m high, the distance between the two ships is:

    • A.

      173 m

    • B.

      200 m

    • C.

      273 m

    • D.

      300 m

    Correct Answer
    C. 273 m
    Explanation
    The angle of elevation of the top of the lighthouse from one ship is 30° and from the other ship is 45°. This means that the two ships form a right-angled triangle with the lighthouse at the right angle. The height of the lighthouse (opposite side) is given as 100 m. Using trigonometry, we can use the tangent function to find the lengths of the adjacent sides. The tangent of 30° is equal to the length of the side opposite to the angle (100 m) divided by the length of the adjacent side (distance between the ships). Similarly, the tangent of 45° is equal to 100 m divided by the length of the other adjacent side. By solving these equations, we find that the distance between the two ships is 273 m.

    Rate this question:

  • 46. 

    What command is used with vi editor to save file and remain in the editing mode?

    • A.

      :w

    • B.

      :q

    • C.

      :x

    • D.

      Q!

    Correct Answer
    A. :w
    Explanation
    The command ":w" is used with the vi editor to save the file. It allows the user to save the changes made to the file while remaining in the editing mode. This command is commonly used to save the progress made in editing a file without exiting the vi editor.

    Rate this question:

  • 47. 

    What command is used to sort the lines of data in a file in alphabetical order?

    • A.

      Sort

    • B.

      St

    • C.

      Sh

    • D.

      Sort -r

    Correct Answer
    A. Sort
    Explanation
    The correct answer is "sort." The sort command is used to sort the lines of data in a file in alphabetical order. It arranges the lines in ascending order by default. If the -r option is used with the sort command, it will sort the lines in descending order.

    Rate this question:

  • 48. 

    What command is used with vi editors to search a pattern in the forward direction?

    • A.

      \

    • B.

      ?

    • C.

      //

    • D.

      /

    Correct Answer
    D. /
    Explanation
    The forward search command in vi editors is "/". This command allows the user to search for a specific pattern in the forward direction within the text. By using "/", the user can enter the desired pattern and vi will locate the next occurrence of that pattern in the text. This command is commonly used for navigation and editing purposes in vi editors.

    Rate this question:

  • 49. 

    Which of the following is built on top of a Hadoop framework using the Elastic Compute Cloud ?

    • A.

      Amazon Elastic MapReduce

    • B.

       Amazon Mechanical Turk

    • C.

      Amazon DevPay

    • D.

      Multi-Factor Authentication

    Correct Answer
    A. Amazon Elastic MapReduce
    Explanation
    Amazon Elastic MapReduce is built on top of a Hadoop framework using the Elastic Compute Cloud. It is a cloud-based big data processing service that allows users to easily process large amounts of data using the Hadoop framework. By using the Elastic Compute Cloud, Amazon Elastic MapReduce can dynamically scale the cluster size based on the workload, providing a flexible and scalable solution for big data processing.

    Rate this question:

  • 50. 

    Which of the following is a method for bidding on unused EC2 capacity based on the current spot price?

    • A.

      On-Demand Instance

    • B.

      Reserved Instances

    • C.

       Spot Instance

    • D.

      All of the mentioned

    Correct Answer
    C.  Spot Instance
    Explanation
    A Spot Instance is a method for bidding on unused EC2 capacity based on the current spot price. Spot Instances allow you to take advantage of unused EC2 instances at a significantly lower cost compared to On-Demand or Reserved Instances. By specifying the maximum price you are willing to pay, you can bid for instances and if the spot price is below your bid, your instances will be launched. This allows you to optimize costs and take advantage of available capacity while still meeting your application's requirements.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 14, 2019
    Quiz Created by
    LakshmojiRao
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.