Placement Test: Unix and Bitcoin
JWRD Computing, February 2020
This exercise is to asses your knowledge in several general areas as well as specific tools of interest, in order to establish a basis for learning at the appropriate level. Fill in the blanks to the best of your ability, taking no more than 30 minutes.
- The _______________ is the program that runs on login, interprets commands, and executes other programs.
- Absolute paths are distinguished from relative paths by a leading _______________ character.
- Relative paths are interpreted relative to the _______________ directory of a process.
- The privileged or "superuser" account in Unix is named _______________.
- The _______________ command removes empty directories.
- Manual pages can be viewed using the _______________ command.
- To show a detailed listing including hidden files, issue the _______________ command.
- A plain text file consists of a sequence of _______________ conforming to a given encoding.
- There are _______________ bits in a byte.
- Two types of filesystem links are _______________ and _______________.
- Trees and DAGs are examples of graphs which contain no _______________.
- Two primary modes in the "vi" editor are _______________ and _______________.
- The "vi" command to save the file and quit is _______________.
- An abbreviation for the current user's home directory is the _______________ character.
- A double dot (..) as a path component represents the _______________ directory.
- An example of a pager program is _______________.
- To redirect output of a program into a file, use the _______________ operator.
- To use the output of a program as input for another, use the _______________ operator.
- The character to direct the "tar" program to extract an archive is _______________.
- To mark a script as executable, use the _______________ command.
- To check free space in a filesystem, use the _______________ command.
- To search the contents of a file or stream by regular expression, use the _______________ command.
- To search in "vi" or "less", use the _______________ key.
- An example of a "sed" command is _______________ which performs _______________.
- _______________ is a Unix command and programming language oriented toward processing tabular text files.
- An example of a shell wildcard character is _______________.
- To substitute the value of a shell variable, use the _______________ character.
- To prevent the shell from processing metacharacters, a string can be _______________.
- Unlike local shell variables, _______________ variables are inherited by child processes (exported).
- To list running processes, use the _______________ command.
- The _______________ command displays the kernel log buffer.
- The _______________ command checks the structural integrity of a filesystem.
- To connect a new filesystem at a given path in the virtual filesystem, use the _______________ command.
- _______________ linking combines all necessary code into a single binary with no library dependencies.
- Differential or incremental backup strategies achieve greater efficiency at the cost of _______________.
- The _______________ command displays or modifies network interface configuration.
- An example of a network troubleshooting command is _______________.
- Many Unix software packages are compiled according to Makefiles using the _______________ command.
- A common program providing secure connection to a remote shell is _______________.
- A program for multiplexing or detaching terminal sessions is _______________.
- A command for computing a cryptographic checksum (hash) of one or more files is _______________.
- To configure terminal driver settings, such as for a serial port, use the _______________ command.
- An example of a program to connect to a remote system over a serial port is _______________.
- The command to control a "daemontools" service is _______________.
- In "daemontools", the "supervise" program will _______________ a service if it aborts.
- To create a new Linux ext4 filesystem, use the _______________ command.
- The stream compression program associated with the ".gz" extension is _______________.
- The _______________ route is used for packet destinations lacking a more specific route.
- Filtering based on established network connections requires a _______________ firewall.
- A program to create a patch file describing the differences between two text files is _______________.
- Three fundamental operations provided by the GPG toolset are _______________, _______________, and _______________.
- Reputation is established around a cryptographic identity in a Web of _______________.
- To list available commands (RPCs) for a running Bitcoin node, use the _______________ command.
- The "bitcoind" command to check basic status such as balance and block count is _______________.
- The "bitcoind" configuration file is _______________.
- In the Bitcoin data directory, the full blockchain is kept in "blk####.dat" files while the index database is kept in _______________.
- The approximate size of the Bitcoin blockchain as of 2020 is _______________ (to an order of magnitude).
- There are _______________ satoshi in one bitcoin.
- Lacking a central authority, the transaction history of Bitcoin is defended by proof of _______________ ("mining"), measured in _______________ per second.
- Many cryptographic operations require a source of strong _______________ ("randomness").
- In the IBM PC architecture, the _______________ is loaded from ROM and executed to perform system initialization prior to the operating system bootloader.
- Overwriting the contents of a ROM chip is known as _______________.