1. What is the find command used for and define four conditions that may be used within its format?
    1) name - Used to look for a specific name. 2) print - Displays the result of the find command to standard output. 3) user - Used to search for files belonging to a particular user. 4) group - Used to search for files belonging to a particular group.
  2. What does the grep command stand for and what does it look at?
    Globally find the Regular Expression and Print. It looks at an individual file and finds a specified pattern (string).
  3. Define the use of the following commands: a) who - b) finger - c) whodo - d) id
    -Displays users logged on, port, date, and time. -Displays users logged on, users complete name, port, day, login time, and remote system name. -Displays the date, time , and OS. For users logged on, the device, UID, and time. -Displays the UID and GI
  4. What are the four types of permissions in UNIX?
    Read (r), write (w), execute (x) and none (-).
  5. Why should you set up a separate account for personal use and not use the root user account on a day to day basis?
    One mistake by the root user can affect every user and the entire system.
  6. What would you use the lpstat command for?
    To check to see what printers are available, and to see what is in the print queues.
  7. How would you set the default printer for a system?
    Use the PRINTER= command, and follow that up with the export command.
  8. What are the three elements that each group in UNIX must have?
    A name, unique group identification (GID) number that internally identifies the group to the system, and a list of user names that belong to the group.
  9. How many primary and secondary groups can a user belong to?
    One, specific primary group by the operating system; the user may have up to a maximum of 15 other secondary groups.
  10. What are the four main elements of a users account?
    A userid, a password, a home directory, and a userid number.
  11. Why should access to the root user account be restricted to only those individuals that are required to have complete control over the system?
    An individual with limited knowledge can easily destroy a complete system if given root privileges.
  12. Who has access to the file that contains a users encrypted password?
    The superuser of the system.
  13. What are the two uses of the useradd command?
    It can either create a new user account or be used to display and change the default values for specific fields in the /etc/passwd file.
  14. What do ACLs allow a system administrator to do?
    To limit access to files and resources to specific users, specific groups, file owners, file groups from multiple groups.
  15. Of the three ways to display, create, set, add, modify, and delete an ACL for a file, which one is the easiest?
    The File Manager.
  16. Name the three uses of the vi Editor.
    To create files, modify regular files, and create shell scripts.
  17. Define the two different modes possible for vi, and state when they are used.
    a) The command mode is used to enter vi commands. b) The text input mode is used to type new text directly into the buffer.
  18. What is the most common UNIX window system in use?
    The X windows system.
  19. In UNIX, what does a windows manager do?
    It controls the appearance of windows, the way menus work, and other features.
  20. What does mwm stand for?
    Motif Windows Manager.
  21. With a standard UNIX login session running, what command do you type to start an X windows session?
    xinit and press return.
  22. What is the terminology for highlighting an Xterm window prior to using it and what does it mean?
    You are setting the input focus to the desired window and it means the window or session is ready for input.
  23. Can you start new xterm windows from within existing xterm window sessions?
    Yes. Simply type xterm&.
  24. What has commands for controlling windows?
    The root menu.
  25. What are two reasons to Iconify a window?
    1) It puts unneeded windows out of the way without quitting the program inside them. 2) It also keeps you from accidentally typing into a window.
  26. What are two ways of getting an xterm pull down menu?
    1) Click on the menu button at the top left corner of a frame. 2) Click on an icon.
  27. On the Xterm windows pull down menu, what does the command minimize do?
    The command minimize iconifies a window.
  28. What follows each command on the pull down menu?
    A keyboard shortcut for the same command.
  29. What does it mean if a pull down menu selection is in lighter print?
    It means that you cannot select that menu item in the current situation.
  30. How can you get the usage message for many commands?
    By using the option -?.
  31. What UNIX command is a powerful tool that gives you complete online access to the UNIX manuals?
    man (arg).
  32. What is meant when an argument for a command is enclosed in square brackets ([ ]) in the synopsis of a man page?
    The argument is optional.
  33. What is meant if syntax of a command argument on a man page is separated by a vertical bar |?
    Either one or the other (but not both) of the items is allowed.
  34. What are a three of the most common sections you may see on a man page?
    A few of the most common are Description, Files, and See Also.
  35. What section of a UNIX man page gives information about the library calls that interface with the UNIX operating system, such as open for opening a file, and exec for executing a program file?
    UNIX System Calls section.
Card Set