Program and questions. Linux teacher training

    The author of the following text is Aichi Academy.
    These are excerpts from the document.
    WORKING PROGRAM №3

    Use of free software in the professional work of computer science teachers List of

    students: computer science teachers

    It is published at the request of readers of this topic about strange questions .

    Personally, I was most surprised by the questions on the topic "Creating and editing Internet applications." It seems to mean something like Quanta Plus.

    OC Linux for users

    1. Indicate for what purpose a particular boot disk image is needed:
    1 This boot image provides support for less common drivers such as NET and SCSI. It should be used if the other options have not passed. A cdrom.img
    2 For installation from repositories accessible via NFS, FTP, HTTP. Network settings for the machine can be manual or automatic. B hd.img
    3 Used if the installation source is accessible through a PCMCIA card (network, CD-ROM). C network.img
    4 For installation from a local IDE or SCSI CD-ROM device. Used when it is not possible to directly boot from the CD-ROM. D other.img
    5 This image is used if the installation from the CD-ROM failed. You just need to copy the contents of the CD to the hard drive (to the FAT, ext2fs or ReiserFS partition) and boot from the diskette with this image. E pcmcia.img

    2. Specify how long Linux and file names can be.

    3. If you logged in as a regular user and try to access files outside your home directory, you will often receive this error message: Access denied. Indicate what you need to do to get access to all files (select all correct answer options):
    a. you must log in as administrator
    b. this happens when locking the file system - you need to reboot
    c. You must be logged in as root
    d. need to log in
    e. you must log in as another user with the same rights

    4. Check what the question mark “?” means When specifying search criteria for files and folders:
    a. exactly one
    b character is missing . any number of characters is missing

    5. Note which printing system is used in the Linux Wizard:
    a. CUPS
    b. Lpr
    c. NetPrint
    d. Printer

    6. Indicate which of the following utilities searches for files and folders in KDE.
    a. Kdefind
    b. Ksearch
    c. Ksch
    d. Kfind

    7. Indicate which file systems can be created during formatting (select all valid answer options).
    a. MS-DOS
    b. Linux
    c. Ext2
    d. Ext3
    e. Minix
    f. Swap

    8. Which of the services can be used to configure network access to shared directories (select all the correct answer options).
    a. AutoFS
    b. Samba
    c. Standard system settings
    d. NFS
    e. None of the above

    9. Indicate the keyboard control module.

    10. Specify the username of the user who is allowed to execute any commands in the system.

    OpenOffice.org for users

    Text editor OpenOffice.org Writer
    11. Relate the formatting elements to their functions.
    1 It is used for typing A Style
    2 It is used to emphasize the text B Inscription
    3 It is used to arrange the text in certain positions C Alignment
    4 It is used to save time when formatting and to maintain uniformity in the design of the document D Font

    12. To remove the table from the text, use:
    a. Delete key
    b. Backspace key
    c. menu command Table / Delete / Table
    d. Delete button on the toolbar Table

    13. Specify the default extension for files saved in OpenOffice.org Writer.
    a. .doc
    b. .rtf
    c. .odt
    d. .txt

    14. Using the wizard, you can create (select all valid answer options):
    a. letter
    b. fax
    c. Address data source
    d. new text document

    Spreadsheets OpenOffice.org Calc

    15. Relate the number formats and their descriptions.
    1 The number + the text “rub” is
    displayed A Dates 2 The number and the percent sign are displayed B Numeric
    3 The year, month, day is
    displayed C Money 4 The number with three decimal places is displayed D Percent

    16. The criteria in the advanced filter from different lines are interconnected by condition:
    a. And
    b. OR
    c. TRUE
    d. FALSE

    17. A cell may contain (select all valid answer options):
    a. number
    b. text
    c. formula
    d. Note

    18. Filters come in (select all valid answer options):
    a. standard
    b. advanced
    c. truncated
    d. Autofilter

    Presentations OpenOffice.org Impress

    19. Specify which mode is most convenient for moving slides.
    a. note mode
    b. slide sorter
    c. drawing mode
    d. outline mode

    20. Specify how to set text alignment.
    a. Format> Symbols
    b. Format> Position and Size
    c. Format> Paragraph
    d. Format> Markers and numbering

    21. Specify with which toolbar you can create graphic objects.
    a. Painting
    b. Image
    c. Standard
    d. Circles and ovals

    22. Mark what the Hide slide operation is for.
    a. operation Hide slide is equivalent to deleting a slide
    b. so that this slide does not appear on the screen while working with the presentation
    c. so that you can avoid printing
    d. so that this slide does not appear during the presentation presentation.

    OpenOffice.org Draw
    23 graphic editor . Note that the objects are:
    a. rectangle
    b. gradient
    c. scale
    d. fill

    24. Check the box by which fill can be implemented (select all correct answer options):
    a. hatching
    b. texture
    c. gradient
    d. Material

    25. Indicate what functions can be applied to the figures (select all the correct answer options):
    a. addition
    b. difference
    c. intersection
    d. multiplication

    26. Indicate what operations are used to combine the figures into one (select all the correct answer options):
    a. grouping
    b. association
    c. morphing
    d. Duplication

    Email and personal contact management. Work on the Internet

    27. Mark what network protocols are for.
    a. record connection errors
    b. block the spread of viruses
    c. Define network rules
    d. filter incoming e-sweat messages

    28. Note what needs to be done for subsequent distribution in the Mozilla Thunderbird program.
    a. enter the addresses of the mailing recipients manually in the Compose Message window
    b. Group cards in the address book
    c. create a mailing list in the address book
    d. this option is not available in the program

    29. Check if you can designate a web page that will open when the browser starts.
    a. no
    b. yes

    30. Indicate whether multiple accounts can be created in Mozilla Thunderbird.
    a. yes
    b. no

    Compressing and archiving files

    31. Specify what actions will be performed when the bzip2 note2 command is run:
    a. the note2 file called note2.bz2 will be compressed
    b. note2 archive will be checked for errors
    c. the note2 file will be decompressed to the current folder

    32. Specify which option allows you to extract files from the archive when using tar.
    a. -c
    b. -f
    c. -t
    d. -x
    e. -z

    Installing and administering Linux Wizard

    33. Specify which keyboard shortcut you can call up the graphical console.

    34. Indicate which command creates the new file.

    35. Write which command you can add the user to the system.

    36. You configure the logs. The severity level is encoded with a number from 0 to 7. Identify incorrect matches (select all valid answer options).
    a. 0 - EMERG (system is down, the old name is PANIC)
    b. 7 - DEBUG (debug printing)
    c. 6 - ALERT (immediate intervention required)
    d. 2 - CRIT (critical condition)
    e. 3 - ERR (error, old name ERROR)
    f. 1 - WARNING (warning, old name WARN)

    37. Indicate with what utilities you can configure the kernel.
    a. Make config
    b. Make install
    c. Make menuconfig
    d. Make xconfig
    e. Make reconfigure

    38. Notice how you can manage printers connected to Linux Master (select all the correct answer options).
    a. via the web interface
    b. modifying configuration files
    c. via ftp

    39. Write which command is used to mount the file systems.

    40. Note with which utilities you can copy the file to a remote computer (select all correct answer options).
    a. ssh
    b. centersh
    c. rcp
    d. scp
    e. telnet
    f. rlogin

    41. Write with which command you can display complete information about the processes running in the system.

    42. Note with which utility you can make a backup copy.
    a. tar
    b. dump
    c. rar
    d. tcpdump

    43. Note what the main dangers are when using NFS.
    a. the server does not work correctly with the NFS protocol on other OS
    b. the client cannot always mount the resource, and sometimes a reboot is required
    c. a trust relationship is established between the client and the server

    44. Indicate which of the records for DNS points to the DNS servers for this domain.
    a. MX
    b. PTR
    c. CNAME
    d. SOA
    e. NS

    45. Write which command displays the list of users who are currently registered in the system (logged in).

    46. ​​Write which command creates the new directory.

    47. Write which command you can add a group to the system.

    48. Choose the correct order of configuration and installation of packages from the source code.
    a. make; make install; ./configure
    b. ./configure; install make; make
    c. ./configure; make; make install
    d. make install; make; ./ configure

    49. Specify the main file responsible for the server configuration.
    a. /etc/syslogd.conf
    b. /etc/syslog.conf
    c. / etc / default / syslog
    d. / etc / syslog

    50. The description of each installed printer (corresponding PPD file) is located in the directory:
    a. / etc / cups / conf / ppd /
    b. / etc / cups / ppd /
    c. / var / spool / lp / ppd /

    51. Match the device names with their description:
    1 / dev / console A Pseudo-terminal support files. Used for remote working sessions using telnet
    2 / dev / pty B Special devices for working with modems
    3 / dev / cua C Hard drives with SCSI interface
    4 / dev / sd D Hard drives with IDE interface
    5 / dev / hd E System console, i.e. a monitor and keyboard physically connected to the computer

    52. Note which utilities can be used to access the remote machine in order to execute various commands on it (select all the correct answer options).
    a. ssh
    b. centersh
    c. rcp
    d. scp
    e. telnet
    f. rlogin

    53. Match the names of the protocols with their description:
    1 nfs A Serves to prevent different clients from simultaneously changing data
    2 mountd B Serves to create, read / write, search files. Also manages authentication and statistics
    3 nsm C Monitors the current state of the computer (server or client) to inform
    4 nlm D Responsible for connecting external systems for access through NFS

    54. Specify what is necessary to determine the security policy on the network.
    a. identify the services used
    b. determine in which file passwords are stored
    c. Determine which font is installed on the computer
    d. Determine which services which groups should have access
    e. deny access to all users except those registered in the system

    55. Check which of the entries for DNS points to the mail server for this domain.
    a. MX
    b. PTR
    c. CNAME
    d. SOA
    e. NS

    56. Write with which command you can check the file system for errors.

    Using antivirus software. Protection against hacker attacks and spam

    57. Your student is very pleased with a new friend whom he met in one of the chats. Choose a sign by which you can determine that this new buddy is an adult:
    a. he uses as a pseudonym the name of a famous literary hero
    b. his messages contain almost no spelling errors
    c. he asks your student to send his photo
    d. he invites your student to arrange a personal meeting

    58. Choose a function that ClamAV antivirus does not perform without additional modules:
    a. On-demand file scanning
    b. updating anti-virus databases
    c. verification of mail attachments
    d. automatic scanning of files on access

    59. Choose the most effective method of protecting students from targeted actions by cybercriminals on the Internet:
    a. Keep students away from computers
    b. prohibit the use of the Internet at school
    c. conduct outreach to students with specific examples
    d. use filtering programs on the Internet gateway

    60. Indicate which program updates ClamAV antivirus databases:
    a. clamdscan
    b. freshclam
    c. sigtool
    d. clamav-milter

    Exclusion of student access to online resources incompatible with the tasks of their education

    61. Indicate which of the Squid proxy logs (logs) contains information about user requests:
    a. /var/log/squid/store.log
    b. /var/log/squid/cache.log
    c. /var/log/access.log
    d. /var/log/squid/access.log

    62. Check out the name of the ICF configuration file, which contains user roles.
    a. c-icap.conf;
    b. custom_roles
    c. users;
    d. generic_roles

    63. Select the option that indicates the correct path to the Squid proxy server configuration file:
    a. /etc/squid/squid.conf;
    b. /etc/squid.conf;
    c. /usr/etc/squid/squid.conf;
    d. /etc/squid/cachemgr.conf.

    64. Note what role will be assigned to the teacher user working on the computer with the IP address 192.168.1.100 if the users file has the following contents:
    user @ Pupils
    @ 192.168.0.0 / 24 Class_25
    teacher @ 192.168.1.100 / 32 Informatika
    a. none of the roles
    b. Class_25
    c. Informatika
    d. Pupils

    Database Management Using OpenOffice.org Base

    65. Specify a metacharacter when using which all columns of this table will be displayed in the query designer.
    a. %
    b. ^
    c. #
    d. *
    e. @
    f.!

    66. Indicate whether a query can be executed that retrieves data not from a physical table, but from another query.
    a. no can't
    b. maybe if this other (basic) query itself extracts data from table
    c. maybe in any case
    d. maybe if this other (basic) query retrieves no more than 5,000 rows of data

    67. Indicate the name of the element, which is guaranteed to distinguish one row of the table from another.
    a. primary record
    b. primary row
    c. primary key
    d. key entry
    e. the key value is

    68. Note whether we can indicate at the time of creating a new table that when inserting a new row into it, filling in the field of this column is a prerequisite.
    a. can, but only for the primary key column
    b. can, but only for a column of numeric types
    c. we cannot, information input is always optional
    d. we can for any column

    Create and edit Internet applications

    69. Note what needs to be done to upload the site to the server.
    a. click on the “Transfer project file” button in the “Basic” panel
    b. in the Tools menu, select the Download Site command
    c. in the File menu, select the command “Transfer Site to Server”
    d. in the "Project" menu, select the "Transfer Project to Server" command

    70. Specify how you can display both the web page and its html code (select all the correct answer options).
    a. this is not possible
    b. in the menu "Tools" select the command "Display html-code and page"
    c. on the “Navigation” toolbar, click the “Visual and Code Editor” button
    d. in the “View” menu, select the “Visual and Code Editor” command

    71. Specify how to view the web page whose html code is displayed on the screen.
    a. Click the View button on the Navigation toolbar
    b. click the "Convert html code" button on the "View" toolbar
    c. in the "Edit" menu, select the "View Web Page"

    72 command . Specify how to save the current document as a template.
    a. in the Tools menu, select the Convert to Template command
    b. in the File menu, select the Save As Template command
    c. on the "Basic" toolbar, click the "Save Template" button
    d. in the menu "Project" select the command "Convert to project template"

    Also popular now: