The …………… command customizes the kernel configuration and generates the files needed
to compile and link the kernel.
A. ping
B. ifconfig
C. make config
D. finger

1 Answer

Answer :

C. make config

Related questions

Description : The …………………... command can set or display the configuration values for a network interface. A. ping B. traceroute C. ifconfig D. finger

Last Answer : C. ifconfig

Description : The……………………command can determine which interface is used on a system from the messages displayed on the console during a boot. A. dmesg B. traceroute C. ifconfig D. finger

Last Answer : A. dmesg

Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address

Last Answer : D. IP address

Description : What would be the proper command to set a DCE clock rate of 56k for a serial interface? A. Router (config) # clockrate 56000 B. Router# clockrate 56000. C. Router (config-if) #clock rate 56000 D. Router (config-if) # clockrate 56k

Last Answer : Router (config-if) #clock rate 56000

Description : At the time Linux 2.0 kernel configuration the option…………………... adds TCP/IP networking to the kernel. A. CONFIG_IP_ACCT B. CONFIG_INET C. CONFIG_INET_PCTCP D. CONFIG_IP_FORWARD

Last Answer : B. CONFIG_INET

Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"

Last Answer : A. "m"

Description : The kernel configuration file is normally changed only when you wish to: A. Produce a smaller, more efficient kernel by removing unneeded items. B. Add a new device C. Modify a system parameter D. all of the above.

Last Answer : D. all of the above.

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : The limited capability of this routing table is easily verified with the ………………………... command. A. ping B. traceroute C. route D. netstat

Last Answer : A. ping

Description : Routes are built automatically by………………….., manually by the system administrator, or dynamically by routing protocols. A. route B. traceroute C. ifconfig D. netstat

Last Answer : C. ifconfig

Description : What is a good website/blog I could refer to for learning how to manipulate the Firefox configuration (about:config)?

Last Answer : The Mozilla fora have a lot of discussions on this issue.

Description : Which of the following statement is not correct with reference to cron daemon in UNIX O.S? (A) The cron daemon is the standard tool for running commands on a predetermined schedule. (B) It starts ... command lines and the times at which they invoked. (D) Crontab for individual users are not stored.

Last Answer : (D) Crontab for individual users are not stored.

Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1) IO.SYS 2) MSDOS.SYS 3) COMMAND.COM 4) CONFIG.SYS

Last Answer : 4) CONFIG.SYS

Description : After booting process which file executes automatically 1) config.sys 2) command.com 3) autoexec.bat 4) io.sys

Last Answer : 3) autoexec.bat

Description : Which file in MS-DOS contains internal commands that are loaded during Booting process? 1 IO.SYS 2 MSDOS.SYS 3 COMMAND.COM 4 CONFIG.SYS

Last Answer : 4 CONFIG.SYS

Description : After booting process which file executes automatically 1 config.sys 2 command.com 3 autoexec.bat 4 io.sys

Last Answer : 3 autoexec.bat

Description : Which operational mode/s of HDLC support/s the balanced configuration by governing point to point link connectivity in addition to the primary as well as secondary functions performed by the station? a. NRM b. ABM c. Both a & b d. None of the above

Last Answer : b. ABM

Description : The command javac is used to A) debug a java program B) compile a java program C) interpret a java program D) execute a java program

Last Answer : B) compile a java program

Description : Which command is used to test network connectivity and provide a response to each packet received by the remote host? a.test b.tracer c.ping d.connect

Last Answer : c.ping

Description : The computer abbreviation KB usually means– (A) Key Block (B) Kernel Boot (C) Key Byte (D) Kit Bit (E) Kilo Byte

Last Answer : Kilo Byte

Description : When you ping theloopback address,a packet is sent where? A. On the network B. Down through thelayers of the IP architecture and then up thelayers again C. Across the wire D. through the loopback dongle E. None of the above

Last Answer : Down through thelayers of the IP architecture and then up thelayers again

Description : The program used to determine the round trip delay between a workstation and a destination address is a. Tracert b. Traceroute c. Ping d. Pop

Last Answer : b. Traceroute

Description : What is the minimum number of wires needed to send data over a serial communication link layer? a. 1 b. 2 c. 4 d. 6 e. none of above

Last Answer : 2

Description : One of the major disadvantages of the Matrix form of organization structure is that– (A) it does not pinpoint product profit responsibility (B) it is not oriented towards results (C) there is possibility of disunity of command (D) it generates rivalry between line and staff members

Last Answer : Answer: there is possibility of disunity of command

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : Flooding is also a……... algorithm, usually generates ………... of duplicate packets. A. Static, vast number B. dynamic , vast number C. Static, less number D. dynamic , less number

Last Answer : A. Static, vast number

Description : ______ is a static algorithm in which every incoming packet is sent out on every outgoing line except the one it arrives on. This method usually generates vast number of duplicate packets.. A. Flooding B. Wait and watch C. congestion D. both a and c

Last Answer : A. Flooding

Description : What organ system generates the heat needed by warm- blooded animals such as human?

Last Answer : EndocrineAnswer:In acupuncture you have a mystery organ called the "triple-warmer" that is part of this function. In the real world heat is generated by the energy creation processes in every living cell. ... heat out some by transporting heat away from the inner organs to the exterior of the body.

Description : Consider the following statements: (a) Revised simplex method requires lesser computations than the simplex method. (b) Revised simplex method automatically generates the inverse of the current basis matrix. (c) Less number of entries are needed ... c) only (C) (b) and (c) only (D) (a), (b) and (c)

Last Answer : (D) (a), (b) and (c)

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Which of the following is a transport layer protocol? a. stream control transmission protocol b. internet control message protocol c. neighbor discovery protocol d. dynamic host configuration protocol

Last Answer : a. stream control transmission protocol

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : Which of the following is a transport layer protocol? A. stream control transmission protocol B. internet control message protocol C. neighbor discovery protocol D. dynamic host configuration protocol

Last Answer : A. stream control transmission protocol

Description : Define line configuration and give its types

Last Answer : It refers the way two or more communication devices attach to a link. A network consists of 2 or more computers directly connected by a physical medium. Types: i. Point to point – physical links are limited to a pair of nodes. ii. Multipoint – more than two nodes share a single physical link.

Description : MOSPF is a _______ protocol. A) data-driven B) command-driven C) both a and b D) none of the above

Last Answer : data-driven

Description : A command that lets youchange one or more fields in a record is A. Insert B. Modify C. Look-up D. All of theabove E. None of the above

Last Answer : Modify

Description : In SQL, which command(s) is(are) used to issue multiple CREATE TABLE, CREATE VIEW, and GRANT statements in a single transaction? A. CREATE PACKAGE B. CREATE SCHEMA C. CREATE CLUSTER D. All of theabove E. None of the above;

Last Answer : CREATE SCHEMA

Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov

Last Answer : ALTER TABLE

Description : . In SQL, which command(s) is(are) usedto recompilea storedfunction? A. SET FUNCTION B. SET STORED FUNCTION C. ALTER FUNCTION D. All of theabove E. None of the above

Last Answer : ALTER FUNCTION

Description : In SQL, the command(s) is (are)used tocreate an index for atable or cluster A. CREATE INDEX B. MODIFY INDEX C. SET INDEX TO FILE D. All of theabove E. None of the above

Last Answer : CREATE INDEX

Description : . A ………………………... is constructed manually by the system administrator using the route command. A. static routing table B. dynamic routing table C. both a and b D. neither a nor b

Last Answer : A. static routing table

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : What is first step to Handle Retrieving Data from an Encrypted Hard Drive? A. Formatting disk B. Storing data C. Finding configuration files. D. Deleting files.

Last Answer : C. Finding configuration files. 

Description : Nginx config for django apps?

Last Answer : You want to research virtual hosts.