adds test

This commit is contained in:
waldek 2021-05-11 08:13:31 +02:00
parent 74f2cb5633
commit 2c1a3cbe1b
1 changed files with 21 additions and 6 deletions

View File

@ -1,5 +1,7 @@
# Chapter 1 # Chapter 1
*Selecting an Operating System.*
## Suggested Exercises ## Suggested Exercises
* Make a list of the programs you run as an ordinary user, including everything from a calculator applet to a major office suite. Look for equivalents at http://www.linuxrsp.ru/win-lin-soft/table-eng or http://www.linuxalt.com. Is there anything you can't find? If so, try a Web search to find an equivalent. * Make a list of the programs you run as an ordinary user, including everything from a calculator applet to a major office suite. Look for equivalents at http://www.linuxrsp.ru/win-lin-soft/table-eng or http://www.linuxalt.com. Is there anything you can't find? If so, try a Web search to find an equivalent.
@ -34,6 +36,8 @@
# Chapter 2 # Chapter 2
*Investigating Linuxs Principles and Philosophy*
## Suggested Exercises ## Suggested Exercises
* Read the Features Web page on FreeBSD, http://www.freebsd.org/features.html, a competitor to Linux. How would you say it differs from Linux? * Read the Features Web page on FreeBSD, http://www.freebsd.org/features.html, a competitor to Linux. How would you say it differs from Linux?
@ -68,6 +72,8 @@
# Chapter 3 # Chapter 3
*Understanding Software Licensing*
## Suggested Exercises ## Suggested Exercises
* Look up the GPLv2, GPLv3, and BSD 2-clause licenses. http://www.opensource.org/licenses/ is a good place to find them all.) Read them and compare them. Which would you use if you were to write an open source program? * Look up the GPLv2, GPLv3, and BSD 2-clause licenses. http://www.opensource.org/licenses/ is a good place to find them all.) Read them and compare them. Which would you use if you were to write an open source program?
@ -102,6 +108,8 @@
# Chapter 4 # Chapter 4
*Using Common Linux Programs*
## Suggested Exercises ## Suggested Exercises
* Try at least two different desktop environments. Use each desktop environment for your normal computing tasks for a day or two so that you can decide which you prefer. * Try at least two different desktop environments. Use each desktop environment for your normal computing tasks for a day or two so that you can decide which you prefer.
@ -136,6 +144,8 @@
# Chapter 5 # Chapter 5
*Managing Hardware*
## Suggested Exercises ## Suggested Exercises
* At a Linux shell prompt, type `uname -a`, `lscpu`, and `cat /proc/cpuinfo` [Compare the output and try to determine your CPU's capabilities. In particular, can it run 64-bit applications, and is your current distribution a 32-bit or 64-bit distribution? * At a Linux shell prompt, type `uname -a`, `lscpu`, and `cat /proc/cpuinfo` [Compare the output and try to determine your CPU's capabilities. In particular, can it run 64-bit applications, and is your current distribution a 32-bit or 64-bit distribution?
@ -170,6 +180,8 @@
# Chapter 6 # Chapter 6
*Getting to Know the Command Line*
## Suggested Exercises ## Suggested Exercises
* Read the `man` pages for the following commands: `man`, `less`, `cat`, `cd`, `ls`, `grep` and `su`. * Read the `man` pages for the following commands: `man`, `less`, `cat`, `cd`, `ls`, `grep` and `su`.
@ -206,6 +218,8 @@
# Chapter 7 # Chapter 7
*Managing Files*
## Suggested Exercises ## Suggested Exercises
* Create a file with `touch` (or some other program) and then practice copying it with `cp`, renaming it with `mv`, moving it to another directory with `mv` and deleting it with `rm`. * Create a file with `touch` (or some other program) and then practice copying it with `cp`, renaming it with `mv`, moving it to another directory with `mv` and deleting it with `rm`.
@ -251,6 +265,8 @@ total 276
# Chapter 8 # Chapter 8
*Getting Help*
## Suggested Exercises ## Suggested Exercises
* Fully read at least three `man` pages for common Linux commands, such as `ls`, `cp`, `cat`, or `less`. What have you learned about these commands that goes beyond the descriptions in this book? * Fully read at least three `man` pages for common Linux commands, such as `ls`, `cp`, `cat`, or `less`. What have you learned about these commands that goes beyond the descriptions in this book?
@ -286,6 +302,8 @@ total 276
# Chapter 9 # Chapter 9
*Using Programs and Processes*
## Suggested Exercises ## Suggested Exercises
* Is your distribution's software up to date? Locate the option in your desktop environment's menus to run a package manager and check that the system is up to date. A computer running out-of-date software can be vulnerable to bugs and security threats, so keeping your software updated is important! * Is your distribution's software up to date? Locate the option in your desktop environment's menus to run a package manager and check that the system is up to date. A computer running out-of-date software can be vulnerable to bugs and security threats, so keeping your software updated is important!
@ -332,9 +350,9 @@ total 276
1. Which of the following commands will print lines from the file `world.txt` that contain matches to `changes`and `changed`? 1. Which of the following commands will print lines from the file `world.txt` that contain matches to `changes`and `changed`?
* A) `grep change[ds] world.txt` * A) `grep change[ds] world.txt`
* B) `tar change[d-s] world.txt` * B) `tar change[d-s] world.txt`
* C) `find "[change\'d\|s]\'" world.txt` * C) `find "change'd|s'" world.txt`
* D) `cat world.txt changes changed` * D) `cat world.txt changes changed`
* E) `find change[\^ds] world.txt` * E) `find change[^ds] world.txt`
2. Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents? 2. Which of the following redirection operators appends a program's standard output to an existing file, without overwriting that file's original contents?
* A) `|` * A) `|`
* B) `2>` * B) `2>`
@ -389,8 +407,6 @@ total 276
7. ASCII supports `____________` unique characters. 7. ASCII supports `____________` unique characters.
8. Three keystrokes that can initiate a search-and-replace operation in `nano` are F14, `____________` and `____________`. 8. Three keystrokes that can initiate a search-and-replace operation in `nano` are F14, `____________` and `____________`.
9. While in Vi's command mode, you can type `____________` to undo a change. 9. While in Vi's command mode, you can type `____________` to undo a change.
* Ctrl+F
* Ctrl+W
# Chapter 12 # Chapter 12
@ -543,7 +559,7 @@ terminal
* B) `chmod` * B) `chmod`
* C) `ls` * C) `ls`
* D) `chown` * D) `chown`
4. TruE) e or false: A file with permissions of 755 can be read by any user on the computer, assuming all users can read the directory in which it resides. 4. True or false: A file with permissions of 755 can be read by any user on the computer, assuming all users can read the directory in which it resides.
5. True or false: Only `root` may use the `chmod` command. 5. True or false: Only `root` may use the `chmod` command.
6. True or false: Only `root` may change a file's ownership with `chown`. 6. True or false: Only `root` may change a file's ownership with `chown`.
7. What option causes `chown` to change ownership on an entire directory tree? 7. What option causes `chown` to change ownership on an entire directory tree?
@ -622,4 +638,3 @@ terminal
7. The `____________` program serves as a multi-purpose network tool; it can do many of the same things as `ifconfig`, `route`, and several others. 7. The `____________` program serves as a multi-purpose network tool; it can do many of the same things as `ifconfig`, `route`, and several others.
8. The traditional name for the first Ethernet interface in Linux (but not in recent versions of Fedora) is `____________`. 8. The traditional name for the first Ethernet interface in Linux (but not in recent versions of Fedora) is `____________`.
9. A `____________` is a program or system configuration that blocks or enables network access to, from, or through a computer based on criteria you specify. 9. A `____________` is a program or system configuration that blocks or enables network access to, from, or through a computer based on criteria you specify.