Deck 12: Compression, System Backup, and Software Installation
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 12: Compression, System Backup, and Software Installation
1
When used with the uncompress command, the ____ option displays the contents of the compress file to Standard Output.
A)-c
B)-v
C)-f
D)-r
A)-c
B)-v
C)-f
D)-r
A
2
The tar utility cannot back up device files or files with filenames longer than 255 characters.
True
3
The ____ option can be used with the tar command to extract a specified archive.
A)-s
B)-e
C)-x
D)-a
A)-s
B)-e
C)-x
D)-a
C
4
When creating a system backup, temporary files in the /tmp and /var/tmp directories should be included.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
It is good form to read the Makefile after you run the configure script.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
The average compression ratio for gzip is ____%.
A)40-50
B)50-60
C)60-70
D)70-80
A)40-50
B)50-60
C)60-70
D)70-80
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
When used with the compress command, the ____ option can be used to compress symbolic links.
A)-f
B)-c
C)-v
D)-r
A)-f
B)-c
C)-v
D)-r
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
You can perform up to ____ different incremental backups using the dump / restore utility.
A)7
B)8
C)9
D)10
A)7
B)8
C)9
D)10
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
The compression algorithm used by the compress utility has an average compression ratio of ____%.
A)30-40
B)40-50
C)50-60
D)60-70
A)30-40
B)40-50
C)50-60
D)60-70
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
The ____ option, when used with the gzip command, causes the compression ratio for files that have been compressed to be listed.
A)-c
B)-f
C)-r
D)-l
A)-c
B)-f
C)-r
D)-l
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ command can be used to display the contents of a compressed file.
A)acat
B)zcat
C)cat
D)ccat
A)acat
B)zcat
C)cat
D)ccat
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
If no level of compression is specified, the gzip command assumes the number ____.
A)4
B)5
C)6
D)7
A)4
B)5
C)6
D)7
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
The make command looks for a Makefile and uses the information within to compile the source code into binary programs using the ____ for the local hardware architecture.
A)cc
B)gc
C)c++
D)gcc
A)cc
B)gc
C)c++
D)gcc
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
When using the compress utility, each file is renamed with a(n)____ filename extension to indicate that it is compressed.
A).c
B).cmp
C).cpz
D).Z
A).c
B).cmp
C).cpz
D).Z
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
When using the cpio utility, the ____ option causes a new archive to be created.
A)-n
B)-c
C)-o
D)-a
A)-n
B)-c
C)-o
D)-a
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
The filename extension given to files compressed with bzip2 is ____.
A).bz
B).bz2
C).gz
D).Z
A).bz
B).bz2
C).gz
D).Z
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
The most common package manager used by Linux systems today is the ____.
A)RPM
B)PRM
C)MPR
D)RMP
A)RPM
B)PRM
C)MPR
D)RMP
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
The compress utility preserves the original ownership, modification, and access time for each file that it compresses.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
When using the gzip utility, the -1 option is also known as best compression and results in a higher compression ratio.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
When used with the tar utility, the ____ option causes filenames to be stored in an archive using absolute pathnames.
A)-a
B)-b
C)-p
D)-n
A)-a
B)-b
C)-p
D)-n
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
The ____________________ utility uses the Burrows-Wheeler Block Sorting Huffman Coding algorithm when compressing files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
What types of media are commonly used for archives? What type of media is most commonly used for archiving on Linux systems?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
A(n)____________________ backup backs up only the data that has been changed since the last backup.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
Describe the difference between full and incremental backups. Explain how both might be used to implement a back-up strategy, mentioning how the dump/restore utility can assist in this implementation. Provide an example.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
____________________ is used to reduce the size of a file or set of files.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
To remove a package from the system, you can use the ____ option to the rpm command.
A)-d
B)-e
C)-r
D)-x
A)-d
B)-e
C)-r
D)-x
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
Packages in the Red Hat Package Manager format have filenames that indicate the hardware architecture for which the software was compiled, and end with the ____________________ extension.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
When backing up a system, what type of files should be archived, and what types should not?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
To view the contents of a file that was compressed with the bzip2 utility, you must used the ____________________ command.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Describe the basic steps involved in compiling source code into a program.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Give a short description of the gzip utility. What compression algorithm does it use, and what degree of compression is it typically able to achieve? What are some similarities and differences from the compress utility?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck