2nd Quiz

2nd Quiz

University

40 Qs

quiz-placeholder

Similar activities

Quiz-Applied OS

Quiz-Applied OS

University

40 Qs

MODULE 2 - (FOR SALE!) luh monetized yarn

MODULE 2 - (FOR SALE!) luh monetized yarn

University

39 Qs

A+ Core II Days 7-9

A+ Core II Days 7-9

University

44 Qs

PENGANTAR KOMPUTER 2024

PENGANTAR KOMPUTER 2024

University

40 Qs

Week 7 - Part 1 | Operating Systems and UNIX MCQs

Week 7 - Part 1 | Operating Systems and UNIX MCQs

University

39 Qs

REMEDIAL PSAS  (TULIS NAMA LENGKAP DAN KELAS)

REMEDIAL PSAS (TULIS NAMA LENGKAP DAN KELAS)

10th Grade - University

40 Qs

SAS Informatika Kelas 7 Ganjil

SAS Informatika Kelas 7 Ganjil

7th Grade - University

35 Qs

Câu hỏi về Hệ điều hành

Câu hỏi về Hệ điều hành

University

45 Qs

2nd Quiz

2nd Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

syed bukhari

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During a system administration workshop, Anika needs to gather detailed information about the kernel and architecture of the server she is working on. Which command should she use to obtain this information?

hostname

uname -a

lscpu

lsblk

2.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During a system performance analysis, Maya needs to check the CPU core count and thread details of her server. To do this, she would use:

lsmem

lspci

lscpu

dmidecode

3.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During a system diagnostic, Oliver needs to identify all the PCI devices connected to his computer, such as the GPU and NIC. Which command should he use to list them?

lsusb

lspci

ip a

lsblk

4.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

During a system performance review, Zoe needs to troubleshoot memory issues and wants to view RAM block-level details. Which command should she use?

free -h

lsmem

vmstat

top

5.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Isla wants to share a sensitive document, but she needs to ensure that it is secure. Which command should she use to create a password-protected ZIP archive of her file?

zip -p secure.zip file.txt

zip -e secure.zip file.txt

zip --encrypt secure.zip file.txt

zip -c secure.zip file.txt

6.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Noah is trying to access the files he compressed into a .tar.xz archive for his project. To decompress the archive, he needs to use the correct command. What should he use?

tar -xvf archive.tar.xz

tar -xJvf archive.tar.xz

unxz archive.tar.xz

tar -zxvf archive.tar.xz

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Emma is working on a project that requires her to compress multiple directories into a single file for easier storage. She needs to use a tool that can compress directories into .7z format. Which tool should she use?

gzip

bzip2

7z a

rar

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)