📜 ⬆️ ⬇️

Program and questions. Linux teacher training

The author of the following text is “Aichi Academy”
This is an excerpt from the document.
WORK PROGRAM number 3

The use of free software in the professional activities of computer science teachers

Category students: teachers of computer science

Published at the request of readers of this topic about strange questions .
')
Personally, I was most surprised by the questions on the topic “Creating and Editing Internet Applications”. It seems to be referring to something like Quanta Plus.

Linux OS for users

1. Indicate for what purposes a particular image of bootable diskettes is needed:
1 This boot image provides support for less common drivers such as NET and SCSI. They should use if the other options are not passed. A cdrom.img
2 For installation from repositories accessible via NFS, FTP, HTTP. Network configuration for the machine can be manual or automatic. B hd.img
3 Used when the installation source is accessible via a PCMCIA card (network, CD-ROM). C network.img
4 For installation from a local IDE or SCSI device CD-ROM. It is used when it is impossible to directly boot from CD-ROM. D other.img
5 This image is used if you are unable to install from a CD-ROM. You just need to copy the contents of the CD to your hard disk (in the FAT, ext2fs or ReiserFS partition) and boot from the floppy with this image. E pcmcia.img

2. Specify how long file and directory names can be in Linux.

3. If you log in as a regular user and try to access files outside your home directory, you will often receive the following error message: Access is denied. Specify what needs to be done to access all files (select all the correct answer options):
a. need to log in as administrator
b. this happens when the file system is locked - you need to reboot
c. need to log in as root
d. need to relogin
e. it is necessary to log in under another user with similar rights

4. Tick what the question mark “?” Means when defining search criteria for files and folders:
a. exactly one character is missing
b. missing any number of characters

5. Note which printing system is used in Linux Master:
a. Cups
b. Lpr
c. Netprint
d. Printer

6. Specify which of the listed utilities searches for files and folders in KDE.
a. Kdefind
b. Ksearch
c. Ksch
d. Kfind

7. Indicate which file systems can be created during formatting (select all the correct answer options).
a. MS-DOS
b. Linux
c. Ext2
d. Ext3
e. Minix
f. Swap

8. Which of the services can be used to configure network access to shared directories (select all the correct response options).
a. Autofs
b. Samba
c. Standard system settings
d. Nfs
e. None of the above

9. Specify the keyboard control module.

10. Specify the login user who is allowed to execute any commands in the system.

OpenOffice.org for users

OpenOffice.org Writer text editor
11. Match the formatting elements with their functions.
1 Used for typing A Style
2 Used to emphasize attention in the text. B Outline.
3 Used to position text at specific positions. C Alignment.
4 Used to save time when formatting and maintain consistency in the design of the document D Font

12. To remove a table from the text, apply:
a. delete key
b. backspace key
c. menu command Table / Delete / Table
d. Delete button on the Table toolbar

13. Specify the default extension for files saved in the OpenOffice.org Writer program.
a. .doc
b. .rtf
c. .odt
d. .txt

14. With the help of the wizard you can create (select all the correct answer options):
a. letter
b. Fax
c. address data source
d. New text document

Spreadsheets OpenOffice.org Calc

15. Match the numeric formats and their descriptions.
1 Displays the number + text "rub" A Dates
2 Number and percent sign are displayed. B Numeric
3 The year, month, day is displayed. C Money
4 A number with three decimal places is displayed. D Percentage

16. Criteria in the advanced filter from different lines are linked by the condition:
a. AND
b. OR
c. TRUE
d. LYING

17. The cell may contain (select all the correct answer options):
a. number
b. text
c. formula
d. note

18. There are filters (select all the correct answer options):
a. standard
b. extended
c. truncated
d. AutoFilter

OpenOffice.org Impress Presentations

19. Specify which mode is most convenient for moving slides.
a. note mode
b. slide sorter
c. drawing mode
d. structure mode

20. Specify how to set text alignment.
a. Format> Characters
b. Format> Position and Size
c. Format> Paragraph
d. Format> Bullets and Numbering

21. Specify which toolbar can be used to create graphic objects.
a. Drawing
b. Picture
c. Standard
d. Circles and ovals

22. Tick what the Hide slide operation is for.
a. Hide slide operation is equivalent to deleting a slide
b. so that this slide is not displayed on the screen while working with the presentation
c. so that this could not print
d. to prevent this slide from being displayed during the presentation

Graphic Editor OpenOffice.org Draw
23. Note what applies to objects:
a. rectangle
b. gradient
c. scale
d. fill

24. Tick with which the fill can be implemented (select all the correct answer options):
a. hatching
b. texture
c. gradient
d. material

25. Indicate which functions can be applied to the figures (select all the correct answer options):
a. addition
b. difference
c. intersection
d. multiplication

26. Indicate which operations are used to merge the figures into one (select all the correct answer options):
a. grouping
b. Union
c. morph
d. duplication

Manage email and personal contacts. Work on the Internet

27. Tick what network protocols are for.
a. fix connection errors
b. blocking the spread of viruses
c. determine the rules of the network
d. filter incoming email messages

28. Tick what needs to be done to follow up with Mozilla Thunderbird.
a. enter mailing recipients manually in the Message Composing window
b. group cards in your address book
c. create a mailing list in your address book
d. This option is not available in the program.

29. Check whether you can assign a web page that will open when the browser starts.
a. not
b. Yes

30. Indicate whether you can create multiple accounts in Mozilla Thunderbird.
a. Yes
b. not

Compress and archive files

31. Specify what actions will be performed when running the bzip2 note2 command:
a. the note2 file will be compressed as note2.bz2
b. note2 archive will be checked for errors
c. note2 file will be decompressed into the current folder

32. Specify which option allows you to extract files from the archive using tar.
a. -c
b. -f
c. -t
d. -x
e. -z

Installation and administration of Linux Master

33. Specify what keyboard shortcut you can call the graphical console.

34. Specify which command creates a new file.

35. Write what team you can add a user to the system.

36. You set up logs. The severity level is encoded with a number from 0 to 7. Determine the incorrect matches (select all the correct answers).
a. 0 - EMERG (the system is not operational, the old name is PANIC)
b. 7 - DEBUG (debug print)
c. 6 - ALERT (immediate intervention required)
d. 2 - CRIT (critical condition)
e. 3 - ERR (error, old name ERROR)
f. 1 - WARNING (warning, old name WARN)

37. Specify which utilities can be used to configure the kernel.
a. Make config
b. Make install
c. Make menuconfig
d. Make xconfig
e. Make reconfigure

38. Check the ways in which printers connected to Linux Master can be controlled (select all the correct answers).
a. via web interface
b. changing configuration files
c. via ftp

39. Write what command is used to mount file systems.

40. Check with which utilities you can copy the file to a remote computer (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin

41. Write, with the help of which command you can display full information about the processes running in the system.

42. Check with which utility you can backup.
a. tar
b. dump
c. rar
d. tcpdump

43. Tick what the main danger is when using NFS.
a. The server does not work correctly with the NFS protocol on other OS
b. the client cannot always mount the resource, and sometimes a reboot of the machine is required
c. trust relationship established between client and server

44. Specify which of the records for DNS points to DNS servers for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS

45. Write to which team displays a list of users who are currently registered in the system (logged in).

46. ​​Write what team creates a new directory.

47. Write what team can add a group to the system.

48. Choose the correct order of configuration and package installation from source.
a. make; make install; ./configure
b. ./configure; install make; make
c. ./configure; make; make install
d. make install; make; ./ configure

49. Specify the main file that is responsible for the server configuration.
a. /etc/syslogd.conf
b. /etc/syslog.conf
c. / etc / default / syslog
d. / etc / syslog

50. A description of each installed printer (corresponding PPD file) is located in the directory:
a. / etc / cups / conf / ppd /
b. / etc / cups / ppd /
c. / var / spool / lp / ppd /

51. Match the device names with their descriptions:
1 / dev / console A Files supporting pseudo-terminals. Used for remote work sessions using telnet
2 / dev / pty B Special devices for working with modems
3 / dev / cua C SCSI Hard Drives
4 / dev / sd D IDE Hard Drives
5 / dev / hd E The system console, i.e. monitor and keyboard physically connected to computer

52. Check with which utilities you can access the remote machine in order to execute various commands on it (select all the correct answer options).
a. ssh
b. centersh
c. rcp
d. scp
e. telnet
f. rlogin

53. Match the names of the protocols with their descriptions:
1 nfs A Used to prevent different clients from changing data simultaneously.
2 mountd B Used to create, read / write, search files. Also manages authentication and statistics.
3 nsm C Monitors the current state of the computer (server or client) to inform
4 nlm D Responsible for connecting external systems to access via NFS

54. Indicate what is needed to determine the security policy on the network.
a. identify used services
b. determine in which file passwords are stored
c. determine which font is installed on the computer
d. determine which services which groups should have access to
e. deny access to all users except those registered in the system

55. Check which of the records for DNS points to the mail server for this domain.
a. MX
b. PTR
c. CNAME
d. SOA
e. NS

56. Write what command you can use to check the file system for errors.

The use of antiviruses. Protection against hacker attacks and spam

57. Your student is very pleased with the new friend, whom he met in one of the chats. Choose a sign by which you can determine that this new buddy is an adult:
a. he uses as a pseudonym the name of a famous literary hero
b. his messages contain almost no spelling errors
c. he asks your student to send his photo
d. he invites your student to arrange a personal meeting

58. Select the function that ClamAV does not perform without additional modules:
a. on-demand file checking
b. anti-virus database update
c. checking email attachments
d. automatic file access checking

59. Choose the most effective method to protect students from the targeted actions of cybercriminals on the Internet:
a. keep students away from computers
b. prohibit the use of the Internet at school
c. conduct explanatory work with students with specific examples
d. use filtering software on the internet gateway

60. Specify which program is updating the ClamAV antivirus anti-virus database:
a. clamdscan
b. freshclam
c. sigtool
d. clamav-milter

Exclusion of student access to Internet resources incompatible with the tasks of their education

61. Specify which of the Squid proxy logs (logs) contains information about user requests:
a. /var/log/squid/store.log
b. /var/log/squid/cache.log
c. /var/log/access.log
d. /var/log/squid/access.log

62. Note the name of the ICF configuration file containing the correspondence of users to roles.
a. c-icap.conf;
b. custom_roles;
c. users;
d. generic_roles;

63. Select the option that indicates the correct path to the Squid proxy configuration file:
a. /etc/squid/squid.conf;
b. /etc/squid.conf;
c. /usr/etc/squid/squid.conf;
d. /etc/squid/cachemgr.conf.

64. Note which role will be assigned to the teacher user, working on the computer with the IP address 192.168.1.100, if the users file has the following contents:
user @ Pupils
@ 192.168.0.0 / 24 Class_25
teacher @ 192.168.1.100 / 32 Informatika
a. none of the roles
b. Class_25
c. Informatika
d. Pupils

Database Management with OpenOffice.org Base

65. Specify the metacharacter, when using which in the query designer all columns of this table will be displayed.
a. %
b. ^
c. #
d. *
e. @
f.!

66. Indicate whether a query can be executed that retrieves data not from a physical table, but from another query.
a. no, he can not
b. maybe if this other (basic) query itself retrieves data from the table
c. may in any case
d. maybe if this other (basic) query retrieves no more than 5000 rows of data

67. Specify the name of the element that allows you to distinguish one row of the table from another.
a. primary recording
b. primary line
c. primary key
d. key record
e. key value

68. Check whether we can indicate at the time of creating a new table that when inserting a new row into it, filling in the field of this column is a prerequisite.
a. we can, but only for the primary key column
b. we can, but only for a column of numeric types
c. cannot, input is always optional
d. we can for any column

Creating and editing Internet applications

69. Check what needs to be done to upload the site to the server.
a. click on the “Transfer project file” button in the “Main” panel
b. in the “Service” menu, select the command “Download site”
c. in the "File" menu, select the "Transfer website to server" command
d. in the "Project" menu, select the "Transfer project to server" command

70. Specify how you can display both the web page and its html-code simultaneously (select all the correct answer options).
a. it's impossible
b. in the "Tools" menu, select the command "Display html-code and page"
c. on the toolbar "Navigation" click "Visual and code editor"
d. in the "View" menu, select the "Visual and code editor" command

71. Specify how to view the web page whose html code is presented on the screen.
a. Click the View button on the Navigation toolbar.
b. click the "Convert html-code" button on the "View" toolbar
c. in the "Edit" menu, select the command "View Web-page"

72. Specify how to save the current document as a template.
a. in the “Tools” menu, select the “Convert to template” command
b. in the menu "File" choose the command "Save as template"
c. on the "Basic" toolbar, click "Save Template"
d. in the "Project" menu, select the "Convert to a project template" command

Source: https://habr.com/ru/post/46137/


All Articles