Deck 1: Introduction to Linux

ملء الشاشة (f)
exit full mode
سؤال
The GNU General Public License (GPL) was developed by which organization?​

A) ​Free Software Foundation (FSF)
B) ​Electronic Frontier Foundation (EFF)
C) ​Microsoft
D) ​Sun Microsystems
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
On closed-source operating systems, hot fixes for software bugs are deployed very quickly.​
سؤال
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
سؤال
In Linux, the core component of the GUI is known as:

A) GNOME
B) KDE
C) X Windows
D) Red Hat
سؤال
The iptables software on Linux is an example of what kind of software?​

A) ​Routing
B) ​Anti-virus
C) Firewall​
D) ​Proxy
سؤال
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers
سؤال
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​
سؤال
What Linux distribution is the most commonly used distribution within organizations today?

A) Mandrake
B) SuSE
C) Debian
D) Red Hat
سؤال
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

A) router
B) package manager
C) DBMS
D) tarball
سؤال
What computer system was the first to run the UNIX operating system?​

A) ​Apple II
B) ​DEC PDP-7
C) Sun ​SPARC
D) ​IBM 5150
سؤال
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

A) major number
B) revision number
C) minor number
D) production kernel number
سؤال
What software type is software that is distributed free of charge, but the source code is not available?

A) Open source software
B) Shareware
C) Close source software
D) Freeware
سؤال
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

A) ​Freeware
B) ​Shareware
C) ​GPL
D) ​Artistic
سؤال
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
سؤال
What stipulates that the source code of any software published under its license must be freely available.

A) GNU Public License
B) Free Software Foundation
C) Freeware
D) Artistic License
سؤال
In what year was the source code for the Linux kernel released?

A) 1987
B) 1990
C) 1991
D) 1993
سؤال
The Linux kernel was developed and released in 1991 by:​

A) ​Richard Stallman
B) ​Linus Torvalds
C) ​Andrew Tannenbaum
D) ​Dennis Ritchie
سؤال
Which of the following is the greatest expense for companies using Linux?

A) Additional software
B) Operating system cost
C) Hiring people to maintain the Linux system
D) Software upgrades
سؤال
What service provides a method for the efficient transfer of files over the Internet?

A) FTP
B) HTML
C) SMTP
D) Telnet
سؤال
What piece of software tells the operating system how to use a specific hardware device?

A) graphical user interface
B) system service
C) device driver
D) user interface
سؤال
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?​

A) ​PERL
B) ​Python
C) Pascal
D) ​C
سؤال
A(n) _________________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.
سؤال
Proxy servers keep track of the information passed to each client by maintaining what type of table?​

A) firewall
B) ​routing
C) ​Network Address Translation (NAT)
D) ​caching
سؤال
The __________ implementation of X Windows is the latest implementation, and is based on the original MIT X Windows project that was released as OSS in 2004.​​
سؤال
The _________________________ is the core component of the Linux operating system.
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A person who explores computer science to gain knowledge.
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A term that refers to the specific type of UNIX operating system.
سؤال
​The overall cost of using a particular operating system is known as?

A) ​Total cost of ownership (TCO)
B) ​Owner Related Expense (ORE)
C) ​Cost to Own (CTO)
D) ​Return on Investment (ROI)
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A program loaded into memory and running on the processor performing a specific task.
سؤال
​The QT toolkit is utilized by which GUI environment?

A) ​GNOME
B) ​Enlightenment
C) ​KDE
D) ​Xfce
سؤال
List and describe the different types of programs that are executed on a computer.
سؤال
​Discuss the difference between developmental kernels and production kernels, and explain how the minor number is used to distinguish between the two.
سؤال
Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs).​ Provide examples of each.
سؤال
The ability for a computer to increase workload as the number of processors increases is known as _________________________.
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​The central, core program of the operating system.
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A complete set of operating system software, including the Linux Kernel, supporting function libraries, and a variety of OSS packages that can be downloaded from the Internet free of charge.
سؤال
Describe what a fully qualified domain name (FQDN) is, and how it is used, then detail how IP addresses are related to FQDNs.​
سؤال
________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.​
سؤال
The mutt software is an example of what type of mail service software on Linux?​

A) ​Mail Transfer Agent
B) ​Mail Delivery Agent
C) ​Mail User Agent
D) ​Mail Transport Agent
سؤال
What is scalability? How does it relate to clustering?
سؤال
The two main competing GUI environments available in Linux are:​

A) ​XFree86
B) ​X.org
C) ​GNU Network Object Model Environment (GNOME)
D) ​K Desktop Environment (KDE)
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
A person who uses computer software maliciously for personal profit.​
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​The software whose source code is not freely available from the original author; Windows 98 is an example.
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A software license, ensuring that the source code for any OSS will remain freely available to anyone who wants to examine, build on, or improve upon it.
سؤال
What two options below are examples of common UNIX flavors?​

A) ​Macintosh OS X
B) ​Red Hat Linux
C) ​OpenSuSE
D) ​HP-UX
سؤال
The two different implementations of X Windows are called:​

A) ​KDE
B) ​XFree86
C) ​Gnome
D) ​X.org
سؤال
​Because Linux has the ability to manage thousands of tasks at the same time, including allowing multiple users to access the system simultaneously, it is referred to as an operating system that is:

A) ​multiaccess
B) ​multilevel
C) ​multiuser
D) ​multitasking
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A popular and widespread method of clustering computers together to perform useful tasks using Linux.
سؤال
​What two Linux distributions below utilize the Debian package manager by default?

A) ​Red Hat Linux
B) ​SUSE Linux
C) ​Linux Mint
D) ​Ubuntu Linux
سؤال
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​An Internet protocol service accessed via an application program called a newsreader.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Introduction to Linux
1
The GNU General Public License (GPL) was developed by which organization?​

A) ​Free Software Foundation (FSF)
B) ​Electronic Frontier Foundation (EFF)
C) ​Microsoft
D) ​Sun Microsystems
A
2
On closed-source operating systems, hot fixes for software bugs are deployed very quickly.​
False
3
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
False
4
In Linux, the core component of the GUI is known as:

A) GNOME
B) KDE
C) X Windows
D) Red Hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
The iptables software on Linux is an example of what kind of software?​

A) ​Routing
B) ​Anti-virus
C) Firewall​
D) ​Proxy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
What Linux distribution is the most commonly used distribution within organizations today?

A) Mandrake
B) SuSE
C) Debian
D) Red Hat
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:

A) router
B) package manager
C) DBMS
D) tarball
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
What computer system was the first to run the UNIX operating system?​

A) ​Apple II
B) ​DEC PDP-7
C) Sun ​SPARC
D) ​IBM 5150
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?

A) major number
B) revision number
C) minor number
D) production kernel number
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What software type is software that is distributed free of charge, but the source code is not available?

A) Open source software
B) Shareware
C) Close source software
D) Freeware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?​

A) ​Freeware
B) ​Shareware
C) ​GPL
D) ​Artistic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
What stipulates that the source code of any software published under its license must be freely available.

A) GNU Public License
B) Free Software Foundation
C) Freeware
D) Artistic License
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
In what year was the source code for the Linux kernel released?

A) 1987
B) 1990
C) 1991
D) 1993
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
The Linux kernel was developed and released in 1991 by:​

A) ​Richard Stallman
B) ​Linus Torvalds
C) ​Andrew Tannenbaum
D) ​Dennis Ritchie
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is the greatest expense for companies using Linux?

A) Additional software
B) Operating system cost
C) Hiring people to maintain the Linux system
D) Software upgrades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What service provides a method for the efficient transfer of files over the Internet?

A) FTP
B) HTML
C) SMTP
D) Telnet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
What piece of software tells the operating system how to use a specific hardware device?

A) graphical user interface
B) system service
C) device driver
D) user interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?​

A) ​PERL
B) ​Python
C) Pascal
D) ​C
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
A(n) _________________________ is a computer or special hardware device that provides interconnection between company networks, home networks, and institutional networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Proxy servers keep track of the information passed to each client by maintaining what type of table?​

A) firewall
B) ​routing
C) ​Network Address Translation (NAT)
D) ​caching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
The __________ implementation of X Windows is the latest implementation, and is based on the original MIT X Windows project that was released as OSS in 2004.​​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
The _________________________ is the core component of the Linux operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A person who explores computer science to gain knowledge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A term that refers to the specific type of UNIX operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
​The overall cost of using a particular operating system is known as?

A) ​Total cost of ownership (TCO)
B) ​Owner Related Expense (ORE)
C) ​Cost to Own (CTO)
D) ​Return on Investment (ROI)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A program loaded into memory and running on the processor performing a specific task.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
​The QT toolkit is utilized by which GUI environment?

A) ​GNOME
B) ​Enlightenment
C) ​KDE
D) ​Xfce
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
List and describe the different types of programs that are executed on a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
​Discuss the difference between developmental kernels and production kernels, and explain how the minor number is used to distinguish between the two.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Describe the differences between Mail Transfer Agents (MTAs), Mail Delivery Agents (MDAs), and Mail User Agents (MUAs).​ Provide examples of each.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
The ability for a computer to increase workload as the number of processors increases is known as _________________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​The central, core program of the operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A complete set of operating system software, including the Linux Kernel, supporting function libraries, and a variety of OSS packages that can be downloaded from the Internet free of charge.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe what a fully qualified domain name (FQDN) is, and how it is used, then detail how IP addresses are related to FQDNs.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
________________ are a collection of programs and tools designed to allow for the creation, modification, manipulation, maintenance, and access of information from databases.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
The mutt software is an example of what type of mail service software on Linux?​

A) ​Mail Transfer Agent
B) ​Mail Delivery Agent
C) ​Mail User Agent
D) ​Mail Transport Agent
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is scalability? How does it relate to clustering?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
The two main competing GUI environments available in Linux are:​

A) ​XFree86
B) ​X.org
C) ​GNU Network Object Model Environment (GNOME)
D) ​K Desktop Environment (KDE)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
A person who uses computer software maliciously for personal profit.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​The software whose source code is not freely available from the original author; Windows 98 is an example.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A software license, ensuring that the source code for any OSS will remain freely available to anyone who wants to examine, build on, or improve upon it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
What two options below are examples of common UNIX flavors?​

A) ​Macintosh OS X
B) ​Red Hat Linux
C) ​OpenSuSE
D) ​HP-UX
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
The two different implementations of X Windows are called:​

A) ​KDE
B) ​XFree86
C) ​Gnome
D) ​X.org
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
​Because Linux has the ability to manage thousands of tasks at the same time, including allowing multiple users to access the system simultaneously, it is referred to as an operating system that is:

A) ​multiaccess
B) ​multilevel
C) ​multiuser
D) ​multitasking
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​A popular and widespread method of clustering computers together to perform useful tasks using Linux.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
​What two Linux distributions below utilize the Debian package manager by default?

A) ​Red Hat Linux
B) ​SUSE Linux
C) ​Linux Mint
D) ​Ubuntu Linux
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match each correct item with the statement below.​
a.​Beowulf clustering
b.Closed source software​
c.​cracker
d.​distribution
e.flavor
f.​GNU General Public License (GPL)
g.​hacker
h.​kernel
i.​newsgroup
j.process
​An Internet protocol service accessed via an application program called a newsreader.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.