Deck 1: Introduction to Linux
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 1: Introduction to Linux
1
The GNU General Public License (GPL) was developed by which organization?
A) Free Software Foundation (FSF)
B) Electronic Frontier Foundation (EFF)
C) Microsoft
D) Sun Microsystems
A) Free Software Foundation (FSF)
B) Electronic Frontier Foundation (EFF)
C) Microsoft
D) Sun Microsystems
A
2
On closed-source operating systems, hot fixes for software bugs are deployed very quickly.
False
3
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
False
4
In Linux, the core component of the GUI is known as:
A) GNOME
B) KDE
C) X Windows
D) Red Hat
A) GNOME
B) KDE
C) X Windows
D) Red Hat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
The iptables software on Linux is an example of what kind of software?
A) Routing
B) Anti-virus
C) Firewall
D) Proxy
A) Routing
B) Anti-virus
C) Firewall
D) Proxy
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
What Linux distribution is the most commonly used distribution within organizations today?
A) Mandrake
B) SuSE
C) Debian
D) Red Hat
A) Mandrake
B) SuSE
C) Debian
D) Red Hat
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
A) router
B) package manager
C) DBMS
D) tarball
A) router
B) package manager
C) DBMS
D) tarball
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
What computer system was the first to run the UNIX operating system?
A) Apple II
B) DEC PDP-7
C) Sun SPARC
D) IBM 5150
A) Apple II
B) DEC PDP-7
C) Sun SPARC
D) IBM 5150
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
A) major number
B) revision number
C) minor number
D) production kernel number
A) major number
B) revision number
C) minor number
D) production kernel number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What software type is software that is distributed free of charge, but the source code is not available?
A) Open source software
B) Shareware
C) Close source software
D) Freeware
A) Open source software
B) Shareware
C) Close source software
D) Freeware
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
A) Freeware
B) Shareware
C) GPL
D) Artistic
A) Freeware
B) Shareware
C) GPL
D) Artistic
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
What stipulates that the source code of any software published under its license must be freely available.
A) GNU Public License
B) Free Software Foundation
C) Freeware
D) Artistic License
A) GNU Public License
B) Free Software Foundation
C) Freeware
D) Artistic License
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
In what year was the source code for the Linux kernel released?
A) 1987
B) 1990
C) 1991
D) 1993
A) 1987
B) 1990
C) 1991
D) 1993
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
The Linux kernel was developed and released in 1991 by:
A) Richard Stallman
B) Linus Torvalds
C) Andrew Tannenbaum
D) Dennis Ritchie
A) Richard Stallman
B) Linus Torvalds
C) Andrew Tannenbaum
D) Dennis Ritchie
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is the greatest expense for companies using Linux?
A) Additional software
B) Operating system cost
C) Hiring people to maintain the Linux system
D) Software upgrades
A) Additional software
B) Operating system cost
C) Hiring people to maintain the Linux system
D) Software upgrades
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What service provides a method for the efficient transfer of files over the Internet?
A) FTP
B) HTML
C) SMTP
D) Telnet
A) FTP
B) HTML
C) SMTP
D) Telnet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
What piece of software tells the operating system how to use a specific hardware device?
A) graphical user interface
B) system service
C) device driver
D) user interface
A) graphical user interface
B) system service
C) device driver
D) user interface
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
A) PERL
B) Python
C) Pascal
D) C
A) PERL
B) Python
C) Pascal
D) C
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A(n) _________________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Proxy servers keep track of the information passed to each client by maintaining what type of table?
A) firewall
B) routing
C) Network Address Translation (NAT)
D) caching
A) firewall
B) routing
C) Network Address Translation (NAT)
D) caching
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
The __________ implementation of X Windows is the latest implementation, and is based on the original MIT X Windows project that was released as OSS in 2004.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
The _________________________ is the core component of the Linux operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A person who explores computer science to gain knowledge.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A person who explores computer science to gain knowledge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A term that refers to the specific type of UNIX operating system.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A term that refers to the specific type of UNIX operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
The overall cost of using a particular operating system is known as?
A) Total cost of ownership (TCO)
B) Owner Related Expense (ORE)
C) Cost to Own (CTO)
D) Return on Investment (ROI)
A) Total cost of ownership (TCO)
B) Owner Related Expense (ORE)
C) Cost to Own (CTO)
D) Return on Investment (ROI)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A program loaded into memory and running on the processor performing a specific task.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A program loaded into memory and running on the processor performing a specific task.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The QT toolkit is utilized by which GUI environment?
A) GNOME
B) Enlightenment
C) KDE
D) Xfce
A) GNOME
B) Enlightenment
C) KDE
D) Xfce
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
List and describe the different types of programs that are executed on a computer.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Discuss the difference between developmental kernels and production kernels, and explain how the minor number is used to distinguish between the two.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs). Provide examples of each.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The ability for a computer to increase workload as the number of processors increases is known as _________________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
The central, core program of the operating system.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
The central, core program of the operating system.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A complete set of operating system software, including the Linux Kernel, supporting function libraries, and a variety of OSS packages that can be downloaded from the Internet free of charge.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A complete set of operating system software, including the Linux Kernel, supporting function libraries, and a variety of OSS packages that can be downloaded from the Internet free of charge.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Describe what a fully qualified domain name (FQDN) is, and how it is used, then detail how IP addresses are related to FQDNs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
The mutt software is an example of what type of mail service software on Linux?
A) Mail Transfer Agent
B) Mail Delivery Agent
C) Mail User Agent
D) Mail Transport Agent
A) Mail Transfer Agent
B) Mail Delivery Agent
C) Mail User Agent
D) Mail Transport Agent
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What is scalability? How does it relate to clustering?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
The two main competing GUI environments available in Linux are:
A) XFree86
B) X.org
C) GNU Network Object Model Environment (GNOME)
D) K Desktop Environment (KDE)
A) XFree86
B) X.org
C) GNU Network Object Model Environment (GNOME)
D) K Desktop Environment (KDE)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A person who uses computer software maliciously for personal profit.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A person who uses computer software maliciously for personal profit.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
The software whose source code is not freely available from the original author; Windows 98 is an example.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
The software whose source code is not freely available from the original author; Windows 98 is an example.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A software license, ensuring that the source code for any OSS will remain freely available to anyone who wants to examine, build on, or improve upon it.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A software license, ensuring that the source code for any OSS will remain freely available to anyone who wants to examine, build on, or improve upon it.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What two options below are examples of common UNIX flavors?
A) Macintosh OS X
B) Red Hat Linux
C) OpenSuSE
D) HP-UX
A) Macintosh OS X
B) Red Hat Linux
C) OpenSuSE
D) HP-UX
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
The two different implementations of X Windows are called:
A) KDE
B) XFree86
C) Gnome
D) X.org
A) KDE
B) XFree86
C) Gnome
D) X.org
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Because Linux has the ability to manage thousands of tasks at the same time, including allowing multiple users to access the system simultaneously, it is referred to as an operating system that is:
A) multiaccess
B) multilevel
C) multiuser
D) multitasking
A) multiaccess
B) multilevel
C) multiuser
D) multitasking
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A popular and widespread method of clustering computers together to perform useful tasks using Linux.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
A popular and widespread method of clustering computers together to perform useful tasks using Linux.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
What two Linux distributions below utilize the Debian package manager by default?
A) Red Hat Linux
B) SUSE Linux
C) Linux Mint
D) Ubuntu Linux
A) Red Hat Linux
B) SUSE Linux
C) Linux Mint
D) Ubuntu Linux
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match each correct item with the statement below.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
An Internet protocol service accessed via an application program called a newsreader.
a.Beowulf clustering
b.Closed source software
c.cracker
d.distribution
e.flavor
f.GNU General Public License (GPL)
g.hacker
h.kernel
i.newsgroup
j.process
An Internet protocol service accessed via an application program called a newsreader.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck