1.
Most source code is available on the Internet in
tarball format. True or False?
Correct Answer
A. True
Explanation
Most source code is indeed available on the Internet in tarball format. Tarball is a common way of packaging source code files, especially in the open-source community. It allows for easy distribution and sharing of code, making it widely accessible for developers and users. Therefore, the statement "Most source code is available on the Internet in tarball format" is true.
2.
Which dump level indicates a full backup?
Correct Answer
A. 0
Explanation
Dump level 0 indicates a full backup. In the context of data backup, dump level refers to the level of incremental backup being performed. Level 0 represents a full backup, where all the selected data is backed up.
3.
Which filename extension indicates a tarball?
Correct Answer
A. .tar.gz
Explanation
The filename extension .tar.gz indicates a tarball. Tarball is a file format that combines multiple files into a single file, often used in Unix-based systems. The .tar extension denotes a tar archive file, while the .gz extension indicates that the file has been compressed using gzip compression. Therefore, the .tar.gz extension signifies a tarball file that has been compressed using gzip compression.
4.
Files that have been compressed using the compress utility typically have the ________
extension.
Correct Answer
C. .Z
Explanation
Files that have been compressed using the compress utility typically have the .Z extension. The compress utility is commonly used to compress files on Unix systems. The .Z extension indicates that the file has been compressed using the compress algorithm.
5.
The bzip2 and
gzip utilities use similar
compression algorithms. True or False?
Correct Answer
B. False
Explanation
False. The bzip2 and gzip utilities do not use similar compression algorithms. While both utilities are used for compression, they employ different algorithms. Bzip2 uses the Burrows-Wheeler block sorting algorithm combined with Huffman coding, while gzip uses the DEFLATE algorithm, which combines LZ77 compression and Huffman coding.
6.
When compiling source code into a binary program,
which command does the compiling using the GNU C Compiler?
Correct Answer
C. Make
Explanation
The correct answer is "make". When compiling source code into a binary program, the "make" command is used to invoke the GNU C Compiler (gcc) and perform the compilation process. The "make" command reads the instructions specified in a Makefile and executes the necessary compilation steps to generate the binary program.
7.
The -9 option to the gzip utility results in a higher compression ratio. True or False?
Correct Answer
A. True
Explanation
Using the -9 option with the gzip utility does result in a higher compression ratio. The gzip utility is used to compress files and the -9 option represents the highest compression level available. This means that when using this option, the gzip utility will apply more intensive compression algorithms, resulting in a higher compression ratio compared to lower compression levels. Therefore, the statement "The -9 option to the gzip utility results in a higher compression ratio" is true.
8.
You have created a full backup and four
incremental backups. In which order must you restore these backups?
Correct Answer
A. 0, 1, 2, 3, 4
Explanation
The correct order to restore the backups is 0, 1, 2, 3, 4. This is because a full backup is always required as the base for the incremental backups. Therefore, the full backup (0) needs to be restored first. After that, the incremental backups can be restored in the order they were created, starting from 1 and ending with 4. This ensures that all changes made after the full backup are properly applied.
9.
Which of the following commands extracts an
archive?
Correct Answer
B. Cpio –vicdu –I /dev/fd0
Explanation
The command "cpio –vicdu –I /dev/fd0" extracts an archive. The "cpio" command is used to copy files to and from archives. The "-v" option is used to display verbose output, the "-i" option is used to extract files from an archive, the "-c" option is used to create a new archive, the "-d" option is used to create directories as needed, and the "-u" option is used to overwrite existing files. The "-I" option specifies the input file as "/dev/fd0", which is typically the floppy disk drive. Therefore, the given command extracts files from the archive located on the floppy disk drive.
10.
Source code is commonly obtained in Red Hat
Package Manager format. True or False?
Correct Answer
B. False
Explanation
The statement is false because source code is commonly obtained in the form of compressed archives or version control systems, such as Git or Subversion. The Red Hat Package Manager (RPM) format is used for distributing pre-compiled binary packages, not source code.
11.
Which of the following commands can be used to
list the files contained within an installed RPM package?
Correct Answer
C. Rpm –ql packagename
Explanation
The command "rpm -ql packagename" can be used to list the files contained within an installed RPM package. The "rpm" command is used to manage RPM packages in Linux systems, and the "-ql" option specifically lists the files in a package. The "packagename" should be replaced with the actual name of the RPM package you want to list the files for.
12.
When compiling source code into a binary program,
which command copies compiled binary files to the correct location on the
filesystem?
Correct Answer
D. Make install
Explanation
The "make install" command is used to copy the compiled binary files to the correct location on the filesystem. This command is typically used after the source code has been compiled using the "make" command. The "make install" command ensures that the binary files are copied to the appropriate directories so that the program can be executed properly.
13.
Compiling and installing software from source
code updates a central database that can then be used to query and remove
the software at a later time. True or False?
Correct Answer
B. False
Explanation
Compiling and installing software from source code does not update a central database. Instead, it directly installs the software onto the system. Therefore, it cannot be used to query and remove the software at a later time.
14.
Which file contains full and incremental back-up
information for use with the dump/restore utility?
Correct Answer
B. /etc/dumpdates
Explanation
The file /etc/dumpdates contains full and incremental backup information for use with the dump/restore utility. This file keeps track of the dates and levels of each backup performed, allowing the restore utility to determine which files need to be restored and from which backup.
15.
Which of the following represents the first
nonrewinding SCSI tape device on a system?
Correct Answer
D. /dev/nst0
Explanation
The correct answer is /dev/nst0. In SCSI tape devices, the "n" prefix stands for nonrewinding. Therefore, /dev/nst0 represents the first nonrewinding SCSI tape device on a system.
16.
What is the most common method for obtaining
Linux software?
Correct Answer
C. Internet download
Explanation
The most common method for obtaining Linux software is through internet download. This is because Linux distributions are freely available for download from various websites. Users can easily access and download the software directly to their computers, without the need for physical media such as CD-ROMs or floppy disks. Additionally, internet download allows for quick and convenient access to the latest versions and updates of Linux software.
17.
Which option to the rpm command can be used to remove a package from the
system?
Correct Answer
B. E
Explanation
The option "e" can be used with the rpm command to remove a package from the system. This option stands for "erase" and is used to uninstall or remove a package that has been installed using the rpm package manager. By specifying the "e" option followed by the package name, the rpm command will remove the package and any associated files or dependencies from the system.
18.
Which of the following commands creates an
archive?
Correct Answer
D. Tar –zcvf /dev/fd0 *
Explanation
The correct answer is "tar –zcvf /dev/fd0 *". This command creates an archive using the tar utility with the options -z (compress), -c (create), -v (verbose), and -f (file) to specify the output file as /dev/fd0. The * at the end indicates that all files and directories in the current directory should be included in the archive.
19.
When compiling source code into a binary program,
which command performs a system check and creates the Makefile?
Correct Answer
B. ./configure
Explanation
The correct answer is "./configure". When compiling source code into a binary program, the "./configure" command is used to perform a system check and create the Makefile. The Makefile is a configuration file that contains instructions for the "make" command, which is used to build the program. The "./configure" command checks the system for required dependencies and sets up the build environment accordingly. It is an important step in the compilation process as it ensures that the program can be built successfully on the specific system.
20.
Which of the following commands can be used to
list detailed information about a package such as its installation date
and license?
Correct Answer
B. Rpm –qi packagename
Explanation
The correct answer is "rpm –qi packagename". This command is used to list detailed information about a package, including its installation date and license.