Final FP501 OSOS
Final FP501 OSOS
SECTION A OBJECTIVE (50 marks) INSTRUCTION: This section consists of FORTY (40) objective questions. Answer ALL questions. Open Standards and the organizations that administer them do not favor one implementer over another for any reason other than the technical standards compliance of a vendor's implementation. This statement best describes which Open Standard main principle? [CLO1]
1.
A. B. C. D.
2.
In which category of license does Berkeley Software Distribution (BSD) fall into? [CLO1] A. B. C. D. Academic Community Business Enterprise
Page 2 of 23
CONFIDENTIAL
3.
Which Open Source Software (OSS) principle is being referred to in the statement below: Create a fair, competitive market for implementations of the standard without locking the customer into a particular vendor or group. [CLO1]
A. B. C. D.
4.
[CLO1]
A. B. C. D.
5.
[CLO1]
A. B. C. D.
Page 3 of 23
CONFIDENTIAL
6.
The statement below refers to which benefit of Linux? The majority of Linux variant and versions can often run for months and years without needing to reboot.
[CLO 1]
A. B. C. D.
7.
What are the methods used to install a Linux Operating System in a machine? [CLO 1]
using hard disks via HTTP Web Server via Virtual Network Computing (VNC) server across the network using CD installer
A. B. C. D.
8.
[CLO1]
A. B.
CONFIDENTIAL
C. D. 9.
Metacity Fdisk
Select the correct Linux file system that is the default location for user home directory. [CLO1]
A. B. C. D.
10.
[CLO1]
A. B. C. D.
11.
Adam has done dual-booting in his computer which consists of Windows and Linux Ubuntu operating system. He is currently logged into Windows operating system. He wants to log in to Ubuntu directly from Windows. Which option is the best method to allow this? [CLO 1]
A. B. C. D.
Page 5 of 23
CONFIDENTIAL
12.
What are the disadvantages of X Window System compared to modern desktop? [CLO3] i. ii. iii. iv. Application interoperability is too difficult Lack of features in usability User interface is inconsistent and of unequal quality Need more memory to run the interface
A. B. C. D.
13.
[CLO2]
A. B. C. D.
14.
A. B. C.
cd ls ls/l
Page 6 of 23
CONFIDENTIAL
D.
pwd
15. You would like to create FIVE empty files named as fruit1, fruit2, fruit3, fruit4 and fruit5 with a single command. Which command will accomplish this? [CLO2]
A. B. C. D.
vi fruit{1..5} touch fruit1, fruit2, fruit3, fruit4, fruit5 vi fruit1 fruit2 fruit3 fruit4 fruit5 touch fruit{1..5}
16.
_____________ command is used to display which users are currently logged in to the Linux system. [CLO2]
A. B. C. D.
Page 7 of 23
CONFIDENTIAL
Figure 2: def.txt
What is the output of a new file named MyAnimal.txt if the command below is applied? [CLO2] cat def abc > MyAnimal.txt
A.
Page 8 of 23
CONFIDENTIAL
B.
C.
D.
Figure 3
18.
Page 9 of 23
CONFIDENTIAL
A. B. C. D. 19.
New directories named Folder1 and Folder2 New files named Folder1 and Folder2 Folder2 as a subdirectory for Folder1 Folder1 as a subdirectory for Folder2
Select the correct statement regarding the command below. [CLO2] #chmod 771 FILE1 A. B. C. D. Owner is allowed to read and execute Owner is allowed to read only Group is allowed to read, write and execute Group is allowed to read only
20.
21.
Which command needs to be applied, if the root user wants to view five lines at the end of file /etc/passwd? [CLO3]
A. B. C. D.
CONFIDENTIAL
22.
Which command can be used to find files in CLI based on name, type, group and date of modification? [CLO3]
A. B. C. D.
23.
A. B. C. D.
24.
Ariana want to edit jobs.txt using VI editor. What command should she type to save and exit the editor at the same time? [CLO3]
A. B. C. D.
CONFIDENTIAL
25.
In the Linux system, the program used to interpret and manage commands is known as_________________ [CLO2]
A. B. C. D.
26.
Select the correct statement regarding the advantages of shell. [CLO2] I. II. III. IV. Create executable script files Run programs Work with file systems Compile computer code
A. B. C. D.
Page 12 of 23
CONFIDENTIAL
27.
To create a new archive To list the files and directories for archiving To write into a file To extract the content of a tar file
A. B. C. D.
28.
The ping command is used to ______________________________. [CLO 2] A. B. C. D. to test network connection to identify existing network packets in the connection to manually configure network connection to set the host and domain name
29.
The _____________ command works by attaching the file system found on some devices to the big file tree. [CLO 2] A. boot B. mount C. unmount D. load
Page 13 of 23
CONFIDENTIAL
30.
A.
Directories in this set contain files that define how the crond utility runs applications on a daily, hourly, monthly, or weekly schedule.
B.
A variety of files used to configure the behaviour of your Apache Web server (specifically, the httpd daemon process).
C. D.
Most of the basic Linux system-configuration files. Files used to configure the CUPS printing service.
31.
_____________ provides a secure, stable and fast file and print services for all clients using versions of DOS and Windows, OS/2, Linux and many others. [CLO 3]
32.
Most of the files in the /var/log directory are maintained by the syslog daemon service. What is its benefit? [CLO 3]
A. B. C. D.
Enables user to centrally manage how log files are handled. Every program automatically updates directly to its own log file. It can intercept and logs Linux kernel messages. User can use it to receive messages when the kernel becomes unstable.
Page 14 of 23
CONFIDENTIAL
33.
If a user wants to do anything that requires a high privilege level (e.g. administering your system) in Linux, they will have to. [CLO3]
A. B. C. D.
become the administrator become the root become the super user become the user
34.
Regardless of which Linux you are using, you can use your Web browser to configure the following open source projects, EXCEPT [CLO3]
A. B. C. D.
35.
A. B. C. D.
Page 15 of 23
CONFIDENTIAL
36.
Below are the procedures of troubleshooting a hardware related problem. Unmount filesystem Run fsck command with f(full) option If fsck command cannot repair filesystem, use mkfs command to recreate the filesystem. Restore filesystem original data.
[CLO3]
A.
B. C. D.
37.
One can troubleshoot any system faults by using __________________ configuration tool. [CLO 3]
A. B. C. D.
Page 16 of 23
CONFIDENTIAL
38.
Repository Package Management (RPM) software packaging format is used to store and maintain software. Which of the following Linux distributions use RPM manager? [CLO 2]
i. ii. iii.
A. B. C. D.
39.
ldconfig determines the runtime links required by shared libraries. Running ldconfig with no arguments simply update the ________ file. [CLO 2]
A. B. C. D.
Page 17 of 23
CONFIDENTIAL
40.
__________ command is used to print the names of shared libraries required by a certain file. [CLO 2] A. B. C. D. rpm V ldd mkdir ulimit
Page 18 of 23
CONFIDENTIAL
SECTION B STRUCTURED (50 marks) INSTRUCTION: This section consists of TWO (2) structured questions. Answer ALL the questions.
QUESTION 1 a) Give THREE (3) examples of Open Standards in Open Source Software Technology. [CLO 1] (3 marks)
b) There are many benefits of using Linux Operating System. Explain the given benefits in your own words. [CLO 1]
i. Scalability ii. Security iii. Open Source licensing model (ROI) (3 marks) c) There are many methods to install Linux OS in a computer. Amys netbook does not have a DVD slot. Suggest THREE (3) methods for her to install Linux OS in her netbook. [CLO 1] (3 marks)
Page 19 of 23
CONFIDENTIAL
d) Explain TWO (2) differences between Linux Loader (LILO) and Grand Unified Boot loader (GRUB). [CLO 1] (5 marks) e) State THREE (3) common file systems in Linux. Explain each of them in your own words. [CLO 2] (6 marks)
f) In Linux, command line is a powerful tool for users to manage files in their machine. Explain the function for each of the Linux commands below. [CLO 2]
Page 20 of 23
CONFIDENTIAL
QUESTION 2
a) Based on the Figure 1 below, apply the correct command for the given question.
-rw-rw-rw- 1 Jason student 40 2012-04-27 15:03 pass.txt
Figure 1
i.
ii.
Change the group that can access the file to staff. [CLO3] (1 mark)
iii. Change the permission of the file so the owner can execute and other cannot write. [CLO3]
(1 mark)
Page 21 of 23
CONFIDENTIAL
b) Given a list of users and their primary and secondary groups, define what is the permission for notes.txt for aiman
[CLO3]
User aiman siva boon Primary Group admin staff clerk Secondary Group staff admin staff
[CLO3]
(6 marks)
d) A user of Linux distribution needs to understand the difference in action taken by normal user and root user to configure services. [CLO3] i. Differentiate between root user and normal user.
(5 marks)
ii.
Describe TWO (2) types of web-based administration tools normally used in Linux environment.
(4 marks)
Page 22 of 23
CONFIDENTIAL
e) Assume that you are trying to install Open Office software in Linux. While you are waiting for the installation process to complete, you received an error message. The error message stated that something is missing in the software and the libraries used by the program. Explain TWO (2) commands that can be used to identify the missing file and libraries in the program. [CLO3] (4 marks)
Page 23 of 23