This document contains an objective test on an open source operating system. It consists of 40 multiple choice questions testing knowledge of open standards principles, Linux installations methods, file systems, shells and commands. It also contains 2 structured questions testing understanding of open standards, Linux benefits and installations, file systems, and Linux permissions and commands. The objective is to test students' comprehension of key concepts in open source operating systems.
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
IBM z/OS Communications Server z/OS Encryption Readiness Technology (zERT)zOSCommserver
Back in 2017, we introduced you to a new capability called z/OS Encryption Readiness Technology (zERT). zERT provides z/OS network security administrators the data they need to understand and assess the quality of the cryptographic protection being applied to their z/OS network traffic. This session will cover new zERT features that have been added, including the zERT Network Analyzer (a z/OSMF plugin), a healthy list of IBM and ISV products that consume zERT SMF data, some new configuration options, and a few hints and tips.
Introduction to operating system
Types of operating system:
1.Unix
2.Linux
3.Windows
4.Android
In this:
1. Introduction of various type
2. History
3. Features
4. Versions
5. Advantages and disadvantages
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020I Putu Hariyadi
Pembahasan Solusi Soal Uji Kompetensi Keahlian (UKK) Sekolah Menengah Kejuruan (SMK) Teknik Komputer dan Jaringan (TKJ) Paket 4 Kurikulum 2013 Tahun 2020 tentang Troubleshooting Keamanan Jaringan Pada WAN
Introduction to operating system
Types of operating system:
1.Unix
2.Linux
3.Windows
4.Android
In this:
1. Introduction of various type
2. History
3. Features
4. Versions
5. Advantages and disadvantages
Cloud computing security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect information, data applications and infrastructure associated with cloud computing use
Pembahasan Solusi Soal UKK SMK TKJ Paket 4 Kurikulum 2013 Tahun 2020I Putu Hariyadi
Pembahasan Solusi Soal Uji Kompetensi Keahlian (UKK) Sekolah Menengah Kejuruan (SMK) Teknik Komputer dan Jaringan (TKJ) Paket 4 Kurikulum 2013 Tahun 2020 tentang Troubleshooting Keamanan Jaringan Pada WAN
Pembangunan E-learning Mengunakan Perisian i-Spring Bagi BC301 Visual Program...Rini Hafzah Abdul Rahim
Pengajaran dan pembelajaran menggunakan pendekatan e-learning semakin diterima oleh pelajar dengan memanfaatkan pengunaan komputer dan teknologi. E-learning mengunakan perisian i-Spring dipilih kerana ianya membolehkan penyediaan bahan e-learning dibangunkan dengan lebih mudah dan berkesan dan ianya boleh berinteraksi dengan modul e-Learning Learning Management System (LMS) di portal Curriculum Information Document Online System (CIDOS). E-learning menggunakan i-Spring ini digunakan bagi membolehkan pelajar mengakses semua bahan pengajaran dan pembelajaran kursus BC301 Visual Programming. Ini adalah kerana para pelajar ini tidak pernah mempelajari apa-apa kursus pengaturcaaan dan pengaturcaraan adalah sesuatu yang asing bagi mereka. Kursus BC301 Visual Programming ini, akan menggunakan bahasa pengaturcaraan Visual Basic. Tujuan utama e-learning i-Spring ini diwujudkan adalah bagi menarik minat pelajar bagi mempelajari Visual Programming dan seterusnya memanfaatkan teknik pengaturcaraan yang boleh diaplikasikan oleh mereka di masa hadapan. Kertas penulisan ini akan menilai penerimaan dan keberkesanan pengunaan i-Spring bagi kursus BC301 Visual Programming kepada kepada pelajar Diploma Kejuruteraan Mekanikal (Mekatronik) DEM semester 6 di Politeknik Kota Kinabalu. Pengumpulan data telah dilakukan dengan menggunakan soalan soal selidik YA dan TIDAK yang mengandungi elemen keberkesanan inovasi yang terdapat pada e-learning i-Spring ini kepada 30 pelajar kursus BC301. Hasil dapatan kajian keberkesanan e-learning i-Spring telah dianalisa dalam bentuk peratus dengan membandingkan dan menentukan e-learning i-Spring dengan kaedah pengajaran dan pembelajaran secara manual yang mana e-learning i-Spring lebih banyak mendapat jawapan YA. Kesimpulannya, e-learning i-Spring ini telah mencapai keberkesanan melebihi 97% berbanding dengan kaedah pengajaran secara manual hanya 2.7% keberkesanan. Daripada dapatan tersebut, e-learning i-Spring dapat membantu pelajar lebih memahami dan menarik minat pelajar untuk mempelajari Visual Programming dengan lebih menarik dan berkesan.
PEMBANGUNAN SISTEM e-PB UNTUK PENGIRAAN MARKAH DAN GRED BAGI KURSUS BC301 DA...Rini Hafzah Abdul Rahim
Pembentangan ini adalah bagi berkongsi dapatan pembangunan Sistem ePB di Politeknik Kota Kinabalu. Fokus pembangunan Sistem ePB ini adalah untuk pelajar kursus BC301 dan DBC2012 Computer Application. Pada permulaan pembangunan hanya dua kursus yang terlibat iaitu BC301 dan DBC2012 dan akan diperluaskan penggunaanya kepada kursus-kursus lain di Jabatan Matematik, Sains dan Komputer.
Sistem ePB ini dibangunkan bagi menanggani masalah yang dihadapi oleh pelajar iaitu mereka yang sukar untuk membuat pengiraan markah dan gred dengan betul kerana pelajar tidak mengetahui bilangan agihan penilaian serta peratus pemberat bagi kursus tersebut.
Pembentangan ini melalui beberapa proses iaitu proses perbincangan, proses pembangunan, proses pengujian, proses pelaksanaan, proses penambahbaikkan, proses penulisan kertas kajian, proses pembentangan. dan proses pengiktirafan.
Impak daripada pembentangan kertas kajian ini ialah pengetahuan, idea dan rujukan bagi mewujudkan Bahan Bantuan Mengajar (BBM) mengunakan mobile application di kalangan pensyarah. Selain daripada itu, pelajar juga akan lebih teruja untuk belajar kerana lebih motivasi dan lebih berkeyakinan dalam memperlajari kursus menggunakan telefon pintar masing-masing.
Bagi menguji penerimaan pelajar terhadap mobile application yang telah dibangunkan borang soal selidik telah diberikan kepada 40 pelajar kursus BC301 dan DBC2012. Hasil dapatan mendapati peratus penerimaan kaedah P&P secara konvesional mendapat 13% manakala dan P&P secara mobile learning mendapati 87%. Dapatan tersebut membuktikan, mobile application dapat membantu pelajar dan memudahkan pelajar untuk membuat pengiraan markah dan gred bagi kursus BC301 dan DBC2012 di Politeknik Kota Kinabalu.
Slide pembentangan Roadmap Sistem iDBMS, perlaksanaan, masalah, cadangan tambah baik bagi proses-proses dan cadangan-cadangan yang dilakukan sebelum proses pengambilalihan dilakukan.
Semoga cadangan ini dapat diteruskan bagi kesinambungan kemudahaan pengguna warga Kolej Komuniti khususnya dan pihak Kementerian Pengajian Tinggi umumnya.
This is the first term Continuous Assessment Test for JS2. It is arranged in a way that economizes for the school. Where you have one print out for four students and all you have to do is cut it off. They are accurately measured.
COM Hijacking Techniques - Derbycon 2019David Tulis
The COM interface lies at the core of Windows, and subtle registry changes can interfere with this the OS in unexpected ways. COM hijacking allows an attacker to load a library into a calling COM-enabled process. It’s a feature, not a bug. While it is commonly used for persistence, some famous COM hijacks have led to more severe exploits. COM hijacking is already used by several families of malware, and it’s time that pentesters caught up on how to abuse this feature. This presentation will cover COM hijacking from start to finish; showing how to discover hijackable COM objects, how to use them offensively, and how to make the calling process remain stable. The blue team will not be forgotten; the talk will cover detection strategies for identifying and defending against COM hijacks.
Quiz of computer and operating system.. this test experiences the student ability to solve the questions efficiently in terms of software engineering and advanced topics like operating system, introduction to computer system, computer networks , computer organization and architecture
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
1. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
SECTION A
OBJECTIVE (50 marks)
INSTRUCTION:
This section consists of FORTY (40) objective questions. Answer ALL questions.
1. “Open Standards and the organizations that administer them do not favor one
implementer over another for any reason other than the technical standards
compliance of a vendor's implementation.” This statement best describes which
Open Standard main principle? [CLO1]
A. No royalty
B. Availability
C. No discrimination
D. Maximize end-user choice
2. In which
category of license does Berkeley Software Distribution (BSD) fall into?
[CLO1]
A. Academic
B. Community
C. Business
D. Enterprise
Page 2 of 23
2. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
3. Which Open Source Software (OSS) principle is being referred to in the
statement below: [CLO1]
Create a fair, competitive market for implementations of the standard
without locking the customer into a particular vendor or group.
A. Availability
B. Predatory practices
C. Maximize end-user choice
D. No discrimination
4. _______________________ is the creator of Linux architecture. [CLO1]
A. Richard Stallman
B. Andrew Tanenbaum
C. Linus Torvalds
D. Novell
5. GNU Network Object Model Environment is based on______ [CLO1]
A. Qt2 graphical toolkit
B. Qt3 graphical toolkit
C. GTK+2
D. GTK+3
Page 3 of 23
3. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
6. The statement below refers to which benefit of Linux? [CLO 1]
The majority of Linux variant and versions can often run for months and
years without needing to reboot.
A. Reliability
B. Scalability
C. Open Source Licensing Model (ROI).
D. Security.
7. What are the methods used to install a Linux Operating System in a machine?
[CLO 1]
i. using hard disks
ii. via HTTP Web Server
iii. via Virtual Network Computing (VNC) server across the network
iv. using CD installer
A. i and ii
B. i, ii and iii
C. ii, iii and iv
D. i, ii, iii and iv
8. __________is an example of a graphical partitioning tool. [CLO1]
A. Disk Druid
B. Nautilus
Page 4 of 23
4. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
C. Metacity
D. Fdisk
9. Select the correct Linux file system that is the default location for user home
directory. [CLO1]
A. /boot
B. /usr
C. /home
D. /opt
10. ______________ is an example of Linux boot loader. [CLO1]
A. GRUB
B. FEDORA
C. GNOME
D. KDE
11. Adam has done dual-booting in his computer which consists of Windows and
Linux Ubuntu operating system. He is currently logged into Windows operating
system. He wants to log in to Ubuntu directly from Windows. Which option is the
best method to allow this? [CLO 1]
A. Master Boot Record method
B. LOADLIN
C. insist on using LILO
D. SYSLINUX
Page 5 of 23
5. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
12. What are the disadvantages of X Window System compared to modern desktop?
[CLO3]
i. Application interoperability is too difficult
ii. Lack of features in usability
iii. User interface is inconsistent and of unequal quality
iv. Need more memory to run the interface
A. i and iii
B. i and iv
C. ii and iii
D. ii and iv
13. Kool Desktop Environment is developed by…………… [CLO2]
A. Marc Ewing
B. Ian Murdock
C. Mathias Ettrich
D. Richard Stallman
14. ______________ command is used to print (display) the working directory.
[CLO2]
A. cd
B. ls
C. ls/l
Page 6 of 23
6. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
D. pwd
15. You would like to create FIVE empty files named as fruit1, fruit2, fruit3, fruit4 and
fruit5 with a single command. Which command will accomplish this?
[CLO2]
A. vi fruit{1..5}
B. touch fruit1, fruit2, fruit3, fruit4, fruit5
C. vi fruit1 fruit2 fruit3 fruit4 fruit5
D. touch fruit{1..5}
16. _____________ command is used to display which users are currently logged in
to the Linux system.
[CLO2]
A. man
B. echo
C. who
D. ls
Page 7 of 23
7. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
Question 17 is based on Figure 1 and Figure 2
Figure 1: abc.txt Figure 2: def.txt
17. What is the output of a new file named ‘MyAnimal.txt’ if the command below is
applied?
[CLO2]
cat def abc > MyAnimal.txt
A.
Page 8 of 23
8. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
B.
C.
D.
Question 18 is based on Figure 3
Figure 3
18. Choose the correct output for the above command.
[CLO 2]
Page 9 of 23
9. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
A. New directories named Folder1 and Folder2
B. New files named Folder1 and Folder2
C. Folder2 as a subdirectory for Folder1
D. Folder1 as a subdirectory for Folder2
19. Select the correct statement regarding the command below.
[CLO2]
#chmod 771 FILE1
A. Owner is allowed to read and execute
B. Owner is allowed to read only
C. Group is allowed to read, write and execute
D. Group is allowed to read only
20. Which of the following file system has a journaling feature?
[CLO2]
A. ext
B. ext2
C. Vfat
D. ReiserFS
21. Which command needs to be applied, if the root user wants to view five lines at
the end of file /etc/passwd?
[CLO3]
A. tail -5 /etc/passwd
B. head 5 /etc/passwd
C. less 5- /etc/passwd
D. more /etc/passwd
Page 10 of 23
10. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
22. Which command can be used to find files in CLI based on name, type, group and
date of modification?
[CLO3]
A. grep
B. find
C. locate
D. whereis
23. What type of Linux shell is mostly used in Linux distributions?
[CLO2]
A. Ash shell
B. Korn shell
C. Csh shell
D. Bash shell
24. Ariana want to edit jobs.txt using VI editor. What command should she type to
save and exit the editor at the same time?
[CLO3]
A. Esc + w
B. Esc + : + wq
C. : + wq
D. :+w
Page 11 of 23
11. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
25. In the Linux system, the program used to interpret and manage commands is
known as_________________
[CLO2]
A. Package
B. Manager
C. Shell
D. Distro
26. Select the correct statement regarding the advantages of shell.
[CLO2]
I. Create executable script files
II. Run programs
III. Work with file systems
IV. Compile computer code
A. I & II
B. I & III
C. I, III & IV
D. All of the above
Page 12 of 23
12. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
27. What is the function of xvf for tar command?
[CLO3]
i. To create a new archive
ii. To list the files and directories for archiving
iii. To write into a file
iv. To extract the content of a tar file
A. i, ii, and iii
B. ii, iii and iv
C. i, ii and iv
D. i, iii, and iv
28. The ping command is used to ______________________________.
[CLO 2]
A. to test network connection
B. to identify existing network packets in the connection
C. to manually configure network connection
D. to set the host and domain name
29. The _____________ command works by attaching the file system found on some
devices to the big file tree.
[CLO 2]
A. boot
B. mount
C. unmount
D. load
Page 13 of 23
13. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
30. What is the content of /etc?
[CLO 3]
A. Directories in this set contain files that define how the crond utility runs
applications on a daily, hourly, monthly, or weekly schedule.
B. A variety of files used to configure the behaviour of your Apache Web
server (specifically, the httpd daemon process).
C. Most of the basic Linux system-configuration files.
D. Files used to configure the CUPS printing service.
31. _____________ provides a secure, stable and fast file and print services for all
clients using versions of DOS and Windows, OS/2, Linux and many others.
[CLO 3]
A. Apache
B. MySQL
C. Samba
D. PHP
32. Most of the files in the /var/log directory are maintained by the syslog daemon
service. What is its benefit?
[CLO 3]
A. Enables user to centrally manage how log files are handled.
B. Every program automatically updates directly to its own log file.
C. It can intercept and logs Linux kernel messages.
D. User can use it to receive messages when the kernel becomes unstable.
Page 14 of 23
14. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
33. If a user wants to do anything that requires a high privilege level (e.g.
administering your system) in Linux, they will have to…………………….
[CLO3]
A. become the administrator
B. become the root
C. become the super user
D. become the user
34. Regardless of which Linux you are using, you can use your Web browser to
configure the following open source projects, EXCEPT
[CLO3]
A. Samba
B. CUPS
C. Squirrelmail
D. yahoomail
35. Below are examples of configuration files, EXCEPT
[CLO3]
A. $HOME.
B. /et
C. /etc/cron
D. /etc/cups
Page 15 of 23
15. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
36. Below are the procedures of troubleshooting a hardware related problem.
- Unmount filesystem
- Run fsck command with –f(full) option
- If fsck command cannot repair filesystem, use mkfs command to re-
create the filesystem.
- Restore filesystem original data.
Choose the problem that requires the above troubleshooting method. [CLO3]
A. Filesystem on partition mounted on noncritical directory becomes
corrupted
B. Filesystem is corrupted
C. Loss of root password
D. Hard disk is corrupted
37. One can troubleshoot any system faults by using __________________
configuration tool.
[CLO 3]
A. Kudzu
B. Kiosk
C. Kiddies
D. KDE
Page 16 of 23
16. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
38. Repository Package Management (RPM) software packaging format is used to
store and maintain software. Which of the following Linux distributions use RPM
manager?
[CLO 2]
i. Red Hat
ii. Fedora
iii. SUSE
A. i and ii
B. i and iii
C. ii and iii
D. i, ii and iii
39. ldconfig determines the runtime links required by shared libraries. Running
ldconfig with no arguments simply update the ________ file.
[CLO 2]
A. cache
B. libraries
C. configuration
D. preload
Page 17 of 23
17. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
40. __________ command is used to print the names of shared libraries required by a
certain file.
[CLO 2]
A. rpm –V
B. ldd
C. mkdir
D. ulimit
Page 18 of 23
18. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
SECTION B
STRUCTURED (50 marks)
INSTRUCTION:
This section consists of TWO (2) structured questions. Answer ALL the questions.
QUESTION 1
a) Give THREE (3) examples of Open Standards in Open Source Software
Technology. [CLO 1]
(3 marks)
b) There are many benefits of using Linux Operating System. Explain the given
benefits in your own words.
[CLO 1]
i. Scalability
ii. Security
iii. Open Source licensing model (ROI)
(3 marks)
c) There are many methods to install Linux OS in a computer. Amy’s netbook does
not have a DVD slot. Suggest THREE (3) methods for her to install Linux OS in
her netbook.
[CLO 1]
(3 marks)
Page 19 of 23
19. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
d) Explain TWO (2) differences between Linux Loader (LILO) and Grand Unified
Boot loader (GRUB).
[CLO 1]
(5 marks)
e) State THREE (3) common file systems in Linux. Explain each of them in your
own words.
[CLO 2]
(6 marks)
f) In Linux, command line is a powerful tool for users to manage files in their
machine. Explain the function for each of the Linux commands below.
[CLO 2]
i. find
ii. locate
iii. grep
iv. whereis
v. which
(5 marks)
Page 20 of 23
20. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
QUESTION 2
a) Based on the Figure 1 below, apply the correct command for the given question.
-rw-rw-rw- 1 Jason student 40 2012-04-27 15:03 pass.txt
Figure 1
i. Change the ownership of the file to Michael.
[CLO3]
(1 mark)
ii. Change the group that can access the file to staff.
[CLO3]
(1 mark)
iii. Change the permission of the file so the owner can execute and other cannot
write.
[CLO3]
(1 mark)
Page 21 of 23
21. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
b) Given a list of users and their primary and secondary groups, define what is the
permission for notes.txt for aiman
[CLO3]
User Primary Group Secondary Group
aiman admin staff
siva staff admin
boon clerk staff
File’s permission:-
-rwxrw-r-- 1 aiman staff 354 2012-05-01 10:00 notes.txt
(3 marks)
c) Explain THREE (3) steps to install software in Linux.
[CLO3]
(6 marks)
d) A user of Linux distribution needs to understand the difference in action taken by
normal user and root user to configure services.
[CLO3]
i. Differentiate between root user and normal user.
(5 marks)
ii. Describe TWO (2) types of web-based administration tools normally used in
Linux environment.
(4 marks)
Page 22 of 23
22. CONFIDENTIAL FP501: OPEN SOURCE OPERATING SYSTEM
e) Assume that you are trying to install Open Office software in Linux. While you
are waiting for the installation process to complete, you received an error
message. The error message stated that something is missing in the software and
the libraries used by the program. Explain TWO (2) commands that can be used
to identify the missing file and libraries in the program.
[CLO3]
(4 marks)
Page 23 of 23