Front | Back |
Why is Linux popular? Why is it particularly popular in academia?
|
Linux is popular because it is not only consistent of multiple free distribtuions, but its popular in academics because the source code is easily available.
|
Why is the Linux filesystem referred to as hierarchical?
|
It arranges files in a directory then places those files in another directory and repeats this process until it reaches the root directory
|
What is the difference between a multiprocessor and a multiprocessing system?
|
Multiprocessor is when a computer has more than one processor to do the work, Multiprocessing is when one processor does multiple jobs at once.
|
Where on the disk should you put your /boot partition or the root (/) partitionif you do not use a /boot partition?
|
Depending on the age of the system, before / was placed within the readable area, now the systems arent limited
|
When does a Linux system start X by default?
|
Depending on the users OS setup, X is automatically after other daemons are started.
|
Why would you place /var at the start of the disk?
|
It contains recent modified or changed files allowing them to be accessed faster in less time.
|
What is Konqueror?
|
A web browser and file manager that provides file viewer options.
|
What is a utility program?
|
Provides file management capabilities for the system
|
What is a shell?
|
Software that provides user interface with the OS
|
Would you set up a GUI on a server system? Why or why not?
|
No, it wastes system recources
|
What is a terminal emulator?
|
Application that emulates a video terminal within other display architecture
|
Which commands can you use to determine who is logged in on a specific terminal?
|
Who, w, user, finger
|
True or False: gzip compresses test files by more than 80 percent.
|
True if the test file is a text file
|
Match each of the following to an absolute pathname, a relative pathname, or asimple filename?
a. milk_cob. correspond/business/milk_coc. /home/alex 1. absolute2. simple3. relative |
A=2b=3c=1
|
Do you think that the system administrator has access to a program that can decode userpasswords?
|
No, hash encryptions detect correct passwords
|