Exam 1: Introduction to Linux

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs).​ Provide examples of each.

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

E-mail is distributed via a network of e-mail servers, also known as Mail Transfer Agents (MTAs).Many MTAs are freely available for Linux, including sendmail, postfix, smail,and exim. Before the user can access his e-mail, it must be downloaded from a MTA; the service that provides this is known as a Mail Delivery Agent (MDA). Linux also provides several of these services; procmail and fetchmail are two of the most common. Finally, the user views her e-mail using a program known as a Mail User Agent (MUA). Common MUAs available for Linux include mutt, pine, printmail, elm, mail, Netscape, and Eudora.

Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​

Free
(True/False)
4.9/5
(39)
Correct Answer:
Verified

True

What is scalability? How does it relate to clustering?

(Essay)
4.7/5
(31)

________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.​

(Essay)
4.7/5
(38)

What two options below are examples of common UNIX flavors?​

(Multiple Choice)
5.0/5
(36)

Match each correct item with the statement below.​ a.​Beowulf clustering b.Closed source software​ c.​cracker d.​distribution e.flavor f.​GNU General Public License (GPL) g.​hacker h.​kernel i.​newsgroup j.process -A person who uses computer software maliciously for personal profit.​

(Short Answer)
4.7/5
(38)

Which of the following is the greatest expense for companies using Linux?

(Multiple Choice)
4.9/5
(24)

In what year was the source code for the Linux kernel released?

(Multiple Choice)
4.9/5
(27)

Match each correct item with the statement below.​ a.​Beowulf clustering b.Closed source software​ c.​cracker d.​distribution e.flavor f.​GNU General Public License (GPL) g.​hacker h.​kernel i.​newsgroup j.process -​A popular and widespread method of clustering computers together to perform useful tasks using Linux.

(Short Answer)
4.7/5
(31)

When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

(Multiple Choice)
4.8/5
(22)

Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.

(True/False)
4.9/5
(43)

The Linux kernel was developed and released in 1991 by:​

(Multiple Choice)
4.9/5
(29)

An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

(Multiple Choice)
4.8/5
(28)

​The QT toolkit is utilized by which GUI environment?

(Multiple Choice)
4.9/5
(36)

The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.

(True/False)
4.9/5
(40)

What Linux distribution is the most commonly used distribution within organizations today?

(Multiple Choice)
4.7/5
(39)

The iptables software on Linux is an example of what kind of software?​

(Multiple Choice)
4.8/5
(42)

What software type is software that is distributed free of charge, but the source code is not available?

(Multiple Choice)
4.9/5
(28)

The ability for a computer to increase workload as the number of processors increases is known as _________________________.

(Short Answer)
4.8/5
(33)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)