• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
The program development cycle begins with creating specifications for a program.
True
After creating a flowchart, the next step in designing a program is to write the program code.
False
Pseudocode is a design tool only, and is never processed by the computer.
True
In UNIX/Linux, all shells support the same commands and programming statements.
False
A .bash_logout file in each Bash user's home directory executes commands when the user logs out.
True
The second step in the program development cycle is _____________.

a. creating program specifications
b. coding the program
c. debugging
d. the design process
d. the design process
A ____________ is a logical diagram that uses a set of standard symbols to visually explain the sequence of events from the start of a process to its end point.

a. pseudocode
b. flowchart
c. block chart
d. map
b. flowchart
Each step in the program is represented by a(n) __________ in the flowchart.

a. arrow
b. symbol
c. block
d. label
b. symbol
In a flowchart, a(n) ________ is used to represent a process.

a. rectangle
b. diamond
c. circle
d. arrow
a. rectangle
In a flowchart, a(n) ___________ is used to indicate process flow.

a. diamond
b. arrow
c. circle
d. rectangle
b. arrow
In a flowchart, a(n) ________ is an on-page connector to continue process flow.

a. diamond
b. arrow
c. rectangle
d. circle
d. circle
In a flowchart, a(n) ______________ is used to represent a decision.

a. circle
b. arrow
c. rectangle
d. diamond
d. diamond
When you create a script, you should include the command that sets the particular shell to use on __________.

a. your login script
b. the configuration line
c. the last line of the script
d. the first line of the script
d. the first line of the script
The line in the script for setting the Bash sell is: _________.

a. !#/bin/bash
b. !/bin/bash
c. #/bin/bash
d. #!/bin/bash
d. #!/bin/bash
For your own account, the shell that is set up by default is established by the system administrator in the _______ file.

a. /etc/shadow
b. /etc/default
c. /etc/passwd
d. /etc/shell
c. /etc/passwd
Each record in the /etc/passwd file is simply a record with variable-length fields separated by ________.

a. dahses (-)
b. commas (,)
c. semicolons (;)
d. colons (:)
d. colons (:)
__________ is a multifunction tool that enables you to manage openSUSE from one location.

a. User Manager
b. MC
c. YaST
d. Control Panel
c. YaST
The .bashrc file is a hidden file contained in _________ directory.

a. the /home
b. your home
c. the /usr
d. the root
b. your home
To view a list of the files in a directory, including the hidden files, you should enter ________.

a. ls -l
b. ls -r
c. la -a
d. ls -h
c. ls -a
The _______ file is run each time you log in or give command to set Bash as your current shell, but not when you run a subshell.

a. .bash_login
b. .bash_profile
c. .bash
d. .bashrc
b. .bash_profile
The ________ file typically contains settings, such as environment variable settings, aliases, and other settings that you always want in effect when you are in the Bash shell.

a. .bash_profile
b. .bash
c. .bashrc
d. .bash_login
a. .bash_profile
The __________ file runs when you log in using the Bash shell as the default, and each time you start a Bash shell within a Bash shell.

a. .bash
b. .bash_profile
c. .bashrc
d. .bash_login
c. .bashrc
The __________ operator of the test command, combines two expressions and tests a logical OR relationship between them.

a. -O
b. ||
c. -o
d. |
c. -o
To format record output you can use the translate utility, ________.

a. tr
b. trns
c. trans
d. translate
a. tr
A simple way to delete a record using _____ is with the -d (delete) option.

a. tr
b. test
c. sed
d. awk
c. sed
A function name differs from a variable name because a function name is followed by a set of ________.

a. parentheses
b. curly brackets
c. square brackets
d. angle brackets
a. parentheses
Most computers store text in EBCDIC codes.
False
One of the most effective utilities for auditing system performance is the top command.
True
The top utility continues to produce output until you press x to terminate the execution of the program.
False
Unlike top, the free utility runs and then automatically exits.
True
When you use restore, by default it copies back to your current working directory.
True
An IP address uses a dotted decimal notation that consists of 16-bit binary numbers (octets) seperated by periods used to identify a computer or network device and the network it is on.
False
The ______ utility manages a firewall and packet filtering.

a. netstat
b. passwd
c. iptables
d. wall
c. iptables
The _____ utility maintains program source code.

a. configure
b. gcc
c. make
d. patch
c. make
The ____ utility manages concurrent access to files in a hierarchy.

a. tree
b. rcs
c. cvs
d. rlog
c. cvs
The ______ utility shcedules a command to run at a preset time.

a. call
b. at
c. crontab
d. batch
c. crontab
Possessing a rich set of options that allow it to handle copies when other methods are inappropriate, the ____ command can handle conversions to and from legacy EBCDIC to ASCII.

a. convert
b. dd
c. tee
d. df
b. dd
The df utility reports the number of ____-byte blocks that are allocated, used, and available; the percentage used; and the mount point - for mounted file systems.

a. 4096
b. 2048
c. 1024
d. 512
c. 1024
When you use the du utility, file usage is expressed in the number of ____-byte blocks (default) or by the number of bytes (the -b option).

a. 4096
b. 1024
c. 2048
d. 512
d. 512
_____ is the default file name for the output of program compilation procedures.

a. a.out
b. out.a
c. a.obj
d. obj.a
a. a.out
The ____ command displays a listing of the most CPU-intensive tasks, such as the processor state, in real time (the display is updated every five seconds by default).

a. netstat
b. ds
c. top
d. stat
c. top
The ____ command displays the amount of free and used memory in the system.

a. mem
b. memstat
c. stat
d. free
d. free
To run a program in the background, append the ____ character to the end of the command used to start the program.

a. @
b. &
c. $
d. *
b. &
The ___ option of the ispell utility is used to ignore concatenated words.

a. -c
b. -C
c. -I
d. -i
b. -C
You can use the ____ utility to compare the contents of two files, and if there is a difference, the command reports the location at which the files first start to differ.

a. diff
b. cmp
c. difference
d. compare
b. cmp
Dump level ___ is used to back up all files.

a. 9
b. 1
c. 10
d. 0
d. 0
The ___ utility offers a simple way to test connections.

a. ipconfig
b. ping
c. netstat
d. test
b. ping
The ____ option of the ping command displays only a summary of the results.

a. -s
b. -q
c. -c
d. -r
b. -q
One use of ____ is to get a general idea of how efficiently your network is designed.

a. traceroute
b. ipconfig
c. netstat
d. ping
a. traceroute
The ____ utility gathers statistics and information about IP communications on a computer.

a. netstat
b. ipconfig
c. traceroute
d. ping
a. netstat
A(n) _____ enables services and software on one computer to use services and software on a different computer.

a. Smaba
b. RPC
c. NFS
d. SMB
b. RPC
To start a service, you can use the ___ command from the root account.

a. service
b. start
c. exec
d. stat
a. service
UNIX/Linux computers can access shared Windows system drives through the use of ____.

a. NFS
b. Samba
c. RPC
d. IP
b. Samba
Samba is a utility that uses the ____ protocol, which is also used by Windows systems for sharing folders and printers.

a. IP
b. SMB
c. RPC
d. NFS
b. SMB
The .pe extension is typically used to indicate that the file is a Perl script.
False
The value of a variable can change while a program runs.
True
In Perl, double-quoted strings are not subject to interpolation.
False
The Awk program does not require the programmer to explicitly set up looping structures as does Perl.
True
Awk is popular as a CGI tool for Web-based applications.
False
Perl is a(n) ____ language, which means that statements are read and immediately executed.

a. compiled
b. fourth generation
c. interpreted
d. object-oriented
c. interpreted
All complete statements in Perl end with a(n) _____.

a. commac
b. colon
c. semicolon
d. asterick
c. semicolon
A(n) ____ is a simple variable that holds a number or a string.

a. constant
b. label
c. identifier
d. scalar
d. scalar
Scalar variable names begin with a(n) _____.

a. dollar sign ($)
b. asterick (*)
c. pound sign (#)
d. exclamtation sign (!)
a. dollar sign ($)
______ are sequences of any types of characters (including numbers that are treated as characters rather than digits).

a. Constants
b. Variables
c. Scalars
d. Strings
d. strings
The character sequence ____ forces the next character to uppercase.

a. \Q
b. \u
c. \U
d. \"
b. \u
The character sequence ____ quotes all following nonalphanumeric characters until \E is encountered.

a. \U
b. \*
c. \Q
d. \u
c. \Q
______ are variables that store an ordered list of scalar values that are accessed with numberic sunscripts, starting at zero.

a. Lists
b. Strings
c. Hashes
d. Arrays
d. Arrays
When processing the individual elements of an array, use the ____ character.

a. $
b. *
c. #
d. @
a. $
A(n) _____ is a variable that represents a set of key/value pairs.

a. hash
b. string
c. array
d. tuple
a. hash
To refer to a single element of a hash, you use the $ character before the variable name, followed by the key associated with the value in ______.

a. parentheses
b. angle brackets
c. square brackets
d. curly brackets
c. curly brackets
The following example shows a(n) ______ variable:
%animals = ('Tigers', 10, 'Lions', 20, 'Bears', 30);

a. array
b. string
c. scalar
d. hash
d. hash
If the ____ option is not included, the Awk program uses the first command-line argument as its program.

a. -i
b. -I
c. -F
d. -f
d. -f
The convention is to use all uppercase letters for _____.

a. variables
b. strings
c. filehandles
d. constants
c. filehandles
In Perl, print; is equivalent to _____.

a. print "$_";
b. print "_";
c. print "_$";
d. print "$";
a. print "$_";
In Perl, the logical OR operator is _____.

a. <>
b. <=>
c. ||
d. |
c. ||
After you create a web page, you can publish the page on a web _____.

a. client
b. database
c. program
d. server
d. server
The ____ feature allows your UNIX or Linux system to access its own internal netowrk configuration instead of an external netowrk.

a. ipconfig
b. loopback
c. spaceship
d. netstat
b. loopback
The IP address _____ is the standard designation for loopback communication.

a. 127.0.0.1
b. 255.255.255.255
c. 192.168.0.1
d. 10.0.0.0
a. 127.0.0.1
The name of the computer at the loopback address is _______.

a. root
b. default
c. host
d. localhost
d. localhost
In HTML, all special codes contained inside angled brackets <> are _____.

a. tags
b. constants
c. variables
d. commands
a. tags
The C language was partly developed to resolve the more lengthy requirements of assembly language.
True
Dennis Ritchie and Brian Kernigham rewrote most of UNIX using C++ in the early 1960s.
False
C can be described as a language that uses relatively short, isolated functions to break down large, complex tasks into small and easily resolved subtasks.
True
A variable's data type determines the upper and lower limits of its range of values.
True
The word "null" is used to indicate that a function returns no data.
False
fgetch() reads a single character from the file and points to it.
False
Unlike many other library input functions, readf() can be used to input values of a variety of data types.
False
C++ uses // to denote a comment line.
True
________ is the language in which UNIX was developed and refined.

a. Perl
b. Awk
c. C++
d. C
d. C
The original UNIX was written in _________.

a. Assembly language
b. C
b. C++
d. Awk
a. Assembly language
_________ is a low-level language that provides maximum access to all the computer's devices, both internal and external.

a. Assembly language
b. C
c. C++
d. Awk
a. Assembly language
The source code of a C program file is stored in a file with the _______ extension.

a. .gc
b. .src
c. .c
d. .C
c. .c
A compiler is a program that translates the source code into _______ code, which consists of binary instructions.

a. compiled
b. binary
c. object
d. binary
c. object
The output of a linker is a(n) ________ file.

a. binary
b. executable
c. object
d. source code
b. executable
________ have special meanings, so you cannot use them as names for variables or functions.

a. Keywords
b. Labels
c. Constants
d. Tags
a. Keywords
The ______ data type occupies a single byte.

a. int
b. char
c. double
d. float
b. char
You can use three modifiers with int data types: short, long, and __________.

a. scalar
b. double
c. array
d. unsigned
d. unsigned
When you represent character data in a program as a character constant, you enclose the character in _______.

a. double quotation marks
b. curly braces
c. angle braces
d. single quotation marks
d. single quotation marks
A(n) ________ is a group of characters, such as a name.

a. scalar
b. array
c. string
d. hash
c. string
When you use string constants in your C program, they must be enclosed in _________.

a. curly braces
b. angle braces
c. double quotation marks
d. single quotation marks
c. double quotation marks
__________ is an example of how you can declare a string in C.

a. sting name;
b. char name[20];
c. String name;
d. string name[20];
b. char name[20];
The ______ of a variable is the part of the program in which the variable is defined and, therefore, accessible.

a. scope
b. reach
c. aim
d. length
a. scope
Variables that are declared inside a function are called ________ variables.

a. global
b. automatic
c. scalar
d. independent
b. automatic
Automatic variables are _______ to the function in which they are declared.

a. unique
b. global
c. assigned
d. local
d. local
C's increment operator is:

a. ++
b. +=
c. =+
d. +
a. ++
The decrement operator is a(n) _______ operator.

a. unary
b. binary
c. arbitrary
d. primary
a. unary
The _______ format specifier is used to denote a signed decimal integer.

a. %c
b. %f
c. %d
d. %s
c. %d
The _______ format specifier is used to denote a floating point number in decimal notation.

a. %c
b. %f
c. %d
d. %s
b. %f
C provides three looping mechanisms: the for loop, the while loop, and the ________ loop.

a. while-do
b. repeat-until
c. do-while
d. switch
c. do-while
_________ are continuous streams of data.

a. Files
b. Strings
c. Arrays
d. Pointers
a. Files
The ________ utility tracks what needs to be recompiled by using the time stamp field for each source file.

a. configure
b. gcc
c. compile
d. make
d. make
The _______ scanf() format specifier is used to indicate that scanf() should interpret the input value as a pointer.

a. %p
b. %r
c. %R
d. %P
d. %P