- Apr 25, 2015
- 1,845
- 2
- 2,199
- 327
The Linux kernel was developed and released in 1991 by:
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.
The mutt software is an example of what type of mail service software on Linux?
What service provides a method for the efficient transfer of files over the Internet?
The GNU General Public License (GPL) was developed by which organization?
What software type is software that is distributed free of charge, but the source code is not available?
In Linux, the core component of the GUI is known as:
The overall cost of using a particular operating system is known as?
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers
Which of the following is the greatest expense for companies using Linux?
On closed-source operating systems, hot fixes for software bugs are deployed very quickly.
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
Proxy servers keep track of the information passed to each client by maintaining what type of table?
The iptables software on Linux is an example of what kind of software?
What Linux distribution is the most commonly used distribution within organizations today?
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
What computer system was the first to run the UNIX operating system?
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
The QT toolkit is utilized by which GUI environment?
What piece of software tells the operating system how to use a specific hardware device?
In what year was the source code for the Linux kernel released?
Linus Torvalds
Many programming function libraries and UNIX-like commands appeared in the 1980s as a result of the work on the GNU project.
True
The mutt software is an example of what type of mail service software on Linux?
Mail User Agent
What service provides a method for the efficient transfer of files over the Internet?
GNU Public License
The GNU General Public License (GPL) was developed by which organization?
Free Software Foundation (FSF)
What software type is software that is distributed free of charge, but the source code is not available?
Freeware
In Linux, the core component of the GUI is known as:
X Windows
The overall cost of using a particular operating system is known as?
Total cost of ownership (TCO)
Open Source Software (OSS) is freely developed and continuously improved by a large community of software developers
True
Which of the following is the greatest expense for companies using Linux?
Hiring people to maintain the Linux system
On closed-source operating systems, hot fixes for software bugs are deployed very quickly.
False
Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes made to it?
Artistic
Dennis Ritchie invented what programming language, which was then used to rewrite the UNIX operating system?
C
When viewing the version number for a Linux kernel, what number indicates the stability of the kernel?
minor number
Proxy servers keep track of the information passed to each client by maintaining what type of table?
Network Address Translation (NAT)
The iptables software on Linux is an example of what kind of software?
Firewall
What Linux distribution is the most commonly used distribution within organizations today?
Red Hat
The term hacker refers to someone who illegally uses computers for personal benefit or to cause damage.
False
What computer system was the first to run the UNIX operating system?
DEC PDP-7
Each computer on a network requires a unique way to identify itself and to refer to other computers. This is accomplished by using IP addresses.
True
An archive of files that usually contain scripts that install the software contents to the correct location on the system is referred to as a:
tarball
The QT toolkit is utilized by which GUI environment?
KDE
What piece of software tells the operating system how to use a specific hardware device?
device driver
In what year was the source code for the Linux kernel released?
1991