Uro Pitanja Za Kol 2.

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Daniel
D
Daniel
Community Contributor
Quizzes Created: 1 | Total Attempts: 3,493
Questions: 56 | Attempts: 3,493

SettingsSettingsSettings
Uro Pitanja Za Kol 2. - Quiz


Questions and Answers
  • 1. 

    Protokol je skup pravila I konvencija koji definiše komunikacioni okvir između dva ili više ućesnika u komunukaciji.

    • A.

      Tačno  

    • B.

      Netačno

    Correct Answer
    A. Tačno  
    Explanation
    The given statement is true. A protocol is indeed a set of rules and conventions that define the communication framework between two or more participants in communication. These protocols ensure that the participants understand and follow a standardized format for exchanging information, allowing for effective and efficient communication.

    Rate this question:

  • 2. 

    Osnovne stavke koje se definišu unutar jednog komunikacionog protokola su:

    • A.

      Uspostava veze

    • B.

      Održavanje veze

    • C.

      Raskid veze

    • D.

      Oporavak u slučaju prekida veze

    • E.

      Učesnici u komunikaciji

    • F.

      Sigurnost veze

    • G.

      Broj učesnika u komunikaciji

    • H.

      Veličina paketa kod prenosa

    • I.

      Nijedno od ponuđenog

    Correct Answer(s)
    A. Uspostava veze
    B. Održavanje veze
    C. Raskid veze
    D. Oporavak u slučaju prekida veze
    E. Učesnici u komunikaciji
    Explanation
    The basic elements defined within a communication protocol include establishing a connection, maintaining the connection, terminating the connection, recovering from connection interruptions, participants in the communication, ensuring the security of the connection, the number of participants in the communication, and the packet size during transmission.

    Rate this question:

  • 3. 

    Kriptografski protokoli su protokoli koji se oslanjaju na kriptografske metode zaštite kako bi učesnicima u komunikaciji obezbedili usluge:

    • A.

      Poverljivosti, integriteta I nepodudarnosti

    • B.

      Pouzdanosti, integriteta I nepodudarnosti

    • C.

      Pouzdanosti, integriteta I neporecivosti

    • D.

      Pouzdanosti, interesa I neidentifikovanja

    • E.

      Poverljivosti, brzine I anonimnosti5

    • F.

      Poverljivosti, integriteta I neporecivostin 6

    • G.

      Nijedan od ponuđenih

    Correct Answer
    F. Poverljivosti, integriteta I neporecivostin 6
    Explanation
    The correct answer is "Poverljivosti, integriteta I neporecivostin". This answer is selected because it correctly identifies the services provided by cryptographic protocols, which are confidentiality, integrity, and non-repudiation. These services ensure that the communication between participants is secure, private, and trustworthy.

    Rate this question:

  • 4. 

    Naznačite prednosti kriptografskih protokola na mrežnom sloju.

    • A.

      Proširivanje aplikacije bez oslanjanja na sigurnosne usluge OS-a

    • B.

      Kompletan pristup podacima koje korisnik želi da zaštiti

    • C.

      Lako obezbeđivanje sigurnosnih usluga

    • D.

      Lak pristup akreditivima korisnika

    • E.

      Smanjeno premašenje izazvano razmenom ključeva

    • F.

      Transportni I aplikacioni protokoli dele infrastrukturu upravljanja ključem

    • G.

      Minimalne promene aplikacija

    • H.

      Mogućnost izgradnje VPN-a

    • I.

      Nijedno od ponuđenog

    Correct Answer(s)
    E. Smanjeno premašenje izazvano razmenom ključeva
    F. Transportni I aplikacioni protokoli dele infrastrukturu upravljanja ključem
    G. Minimalne promene aplikacija
    H. Mogućnost izgradnje VPN-a
    Explanation
    The advantages of cryptographic protocols at the network layer include reduced overhead caused by key exchange, the ability for transport and application protocols to share key management infrastructure, minimal changes required in applications, and the possibility of building a VPN (Virtual Private Network). These advantages contribute to improved security and efficiency in network communication.

    Rate this question:

  • 5. 

    Naznačite prednosti kriptografskih protokola na aplikacionom sloju.

    • A.

      Proširivanje aplikacije bez oslanjanja na sigurnosne usluge OS-a

    • B.

      Kompletan pristup podacima koje korisnik želi da zaštiti

    • C.

      Lako obezbeđivanje sigurnosnih uslugaption 3

    • D.

      Lak pristup akreditivima korisnika

    • E.

      Smanjeno premašenje izazvano razmenom ključeva

    • F.

      Transportni I aplikacioni protokoli dele infrastrukturu upravljanja ključem

    • G.

      Minimalne promene aplikacija

    • H.

      Mogućnost projektovanja više različitih sistema

    • I.

      Posebno projektovanje sigurnosnih mehanizama svake aplikacije

    • J.

      Nijedno od ponuđenog

    Correct Answer(s)
    A. Proširivanje aplikacije bez oslanjanja na sigurnosne usluge OS-a
    B. Kompletan pristup podacima koje korisnik želi da zaštiti
    C. Lako obezbeđivanje sigurnosnih uslugaption 3
    D. Lak pristup akreditivima korisnika
    Explanation
    The advantages of cryptographic protocols at the application layer include the ability to expand the application without relying on the security services of the operating system, providing complete access to the data that the user wants to protect, easily ensuring security services, and providing easy access to user credentials. These protocols also reduce the overhead caused by key exchange, share key management infrastructure with transport and application protocols, require minimal changes to applications, allow for the design of multiple different systems, and enable the design of security mechanisms for each application individually.

    Rate this question:

  • 6. 

    Naznačite loše strane kriptografskih protokola na aplikacionom sloju.

    • A.

      Posebno projektovanje sigurnosnih mehanizama svake aplikacije

    • B.

      Projektovanje više različitih sistema što iziskuje greške I sigurnosne propuste

    • C.

      Kompletan pristup podacima koje korisnik želi da zaštiti

    • D.

      Teško obezbeđivanje usluge neporecivosti

    • E.

      Teško ostvarivanje kontrole na nivou korisnika na višekorisničkom računaru

    • F.

      Nijedno od ponuđenog

    Correct Answer(s)
    A. Posebno projektovanje sigurnosnih mehanizama svake aplikacije
    B. Projektovanje više različitih sistema što iziskuje greške I sigurnosne propuste
    Explanation
    The correct answer is "Posebno projektovanje sigurnosnih mehanizama svake aplikacije, Projektovanje više različitih sistema što iziskuje greške i sigurnosne propuste". This answer suggests that one of the main challenges of cryptographic protocols at the application layer is the need for designing specific security mechanisms for each application and dealing with multiple systems that may introduce errors and security vulnerabilities. This highlights the importance of tailoring security measures to the specific requirements and characteristics of each application, as well as the need for thorough testing and vulnerability management in a multi-system environment.

    Rate this question:

  • 7. 

    Naznačite loše strane kriptografskih protokola na mrežnom sloju.

    • A.

      Posebno projektovanje sigurnosnih mehanizama svake aplikacije

    • B.

      Projektovanje više različitih sistema što iziskuje greške I sigurnosne propuste

    • C.

      Kompletan pristup podacima koje korisnik želi da zaštiti

    • D.

      Teško obezbeđivanje usluge neporecivosti

    • E.

      Teško ostvarivanje kontrole na nivou korisnika na višekorisničkom računaru

    • F.

      Kompletan pristup podacima koje Korisnik želi da zaštiti

    • G.

      Nijedno od ponuđenog

    Correct Answer(s)
    D. Teško obezbeđivanje usluge neporecivosti
    E. Teško ostvarivanje kontrole na nivou korisnika na višekorisničkom računaru
    Explanation
    The correct answer is "Teško obezbeđivanje usluge neporecivosti" (Difficult to provide non-repudiation service) and "Teško ostvarivanje kontrole na nivou korisnika na višekorisničkom računaru" (Difficult to achieve user-level control on a multi-user computer). These options highlight the challenges and limitations of cryptographic protocols at the network layer. Cryptographic protocols primarily focus on ensuring the confidentiality, integrity, and authenticity of data, but they may face difficulties in providing non-repudiation services and user-level control in a multi-user environment.

    Rate this question:

  • 8. 

    Za razliku od aplikacionog sloja, mrežni sloj obezbeđuje usluge poverljivosti, integriteta I neporecivosti.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    The given statement is incorrect. Unlike the application layer, the network layer does not provide services such as confidentiality, integrity, and non-repudiation. The network layer is responsible for routing and forwarding data packets between different networks, while the application layer is responsible for providing services such as encryption, authentication, and data integrity.

    Rate this question:

  • 9. 

    Šta predstavlja zadatak SSL protokola?

    • A.

      Ostvarivanje zaštićenog prenosa podataka kroz mrežu

    • B.

      Identifikaciju server slanjem svog sertifikata klijentu

    • C.

      Šifrovanje komunikacionih kanala

    • D.

      Nijedno od ponuđenog

    Correct Answer
    A. Ostvarivanje zaštićenog prenosa podataka kroz mrežu
    Explanation
    The correct answer is "Ostvarivanje zaštićenog prenosa podataka kroz mrežu" (Achieving secure data transmission over the network). This is because SSL (Secure Sockets Layer) protocol is designed to ensure that data transmitted between a client and a server is encrypted and protected from unauthorized access or tampering. SSL protocol establishes a secure connection between the client and server, allowing for the secure transmission of sensitive information such as passwords, credit card details, etc.

    Rate this question:

  • 10. 

    Koji su kriterijumi projektovanja kod SSL-a?

    • A.

      Kriptografska zaštita

    • B.

      Nezavisnost samo od softvera

    • C.

      Nezavisnot od softvera I hardvera

    • D.

      Pouzdanost

    • E.

      Proširivost

    • F.

      Efikasnost

    • G.

      Brzina

    • H.

      Nijedno od ponuđenog

    Correct Answer(s)
    A. Kriptografska zaštita
    C. Nezavisnot od softvera I hardvera
    E. Proširivost
    F. Efikasnost
    Explanation
    The criteria for designing SSL include cryptographic protection, independence from software and hardware, scalability, and efficiency. These criteria ensure that SSL provides secure communication by using encryption algorithms, is compatible with different software and hardware configurations, can handle increasing amounts of data and users, and performs efficiently without causing significant delays.

    Rate this question:

  • 11. 

    Šta se podrazumeva pod kriterijum proširivosti kod SSL protokola

    • A.

      Dva različita programa koji koriste SSL mogu razmeniti parametre šifrovanja

    • B.

      Projektovanje podprotokola nije neophodno

    • C.

      Keširanje komunikacionih parametara

    • D.

      Nijedno od ponuđenog

    Correct Answer
    B. Projektovanje podprotokola nije neophodno
    Explanation
    The correct answer is "Projektovanje podprotokola nije neophodno." This means that designing subprotocols is not necessary for SSL protocol. This suggests that SSL protocol already includes all the necessary features and functionalities for secure communication between two different programs. Therefore, there is no need for additional subprotocols to be designed or implemented.

    Rate this question:

  • 12. 

    Šifrovanje podataka simetričnim algoritmima kod SSL-a predstavlja svojstvo pouzdanosti

    • A.

      Tačno

    • B.

      Netačno

    • C.

      Ne znam

    Correct Answer
    B. Netačno
    Explanation
    Data encryption using symmetric algorithms in SSL does not necessarily guarantee reliability. While SSL does provide secure encryption, reliability refers to the ability of a system or process to consistently perform its intended function without failure or errors. Reliability is not directly related to the encryption algorithm used, but rather to the overall design, implementation, and maintenance of the system. Therefore, the statement that data encryption with symmetric algorithms in SSL represents reliability is incorrect.

    Rate this question:

  • 13. 

    Koji slojevi OSI i TCP/IP protokola implementiraju SSL Handshake?

    • A.

      Aplikacioni sloj (OSI) I Aplikacioni sloj (TCP/IP)

    • B.

      Sloj sesije (OSI) I Transportni I Aplikacioni sloj (TCP/IP)

    • C.

      Transportni (TCP/IP) I Prezentacioni (OSI)

    • D.

      Prezentacioni I Sloj sesije (TCP/IP) I Aplikacioni sloj (OSI)

    • E.

      Nijedno od ponuđenog

    Correct Answer
    E. Nijedno od ponuđenog
    Explanation
    None of the layers mentioned in the options - OSI Application layer, OSI Session layer, TCP/IP Transport layer, TCP/IP Presentation layer, and TCP/IP Application layer - implement SSL Handshake. SSL Handshake is implemented in the SSL/TLS layer, which is not mentioned in any of the options. Therefore, the correct answer is "None of the above".

    Rate this question:

  • 14. 

    SSL Handshake protocol između ostalog, definiše komunikaciju server I klijenta sa CA dok je SSL Record protocol zadužen za šifrovanje I prenos poruka.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    The given answer is incorrect. The statement accurately describes the roles of the SSL Handshake protocol and the SSL Record protocol. The SSL Handshake protocol is responsible for establishing communication between the server and the client, including verifying the server's identity with a Certificate Authority (CA). On the other hand, the SSL Record protocol is responsible for encrypting and transmitting the messages. Therefore, the correct answer should be "Tačno" (True).

    Rate this question:

  • 15. 

    Označite attribute kojima je opisana sesija kod SSL Handshake-a:

    • A.

      Slučajne vrednosti klijenta I server

    • B.

      Serverova I klijentova MAC tajna

    • C.

      Serverov I klijentov simetrični ključ

    • D.

      Redni brojevi poruka

    • E.

      Način šifrovanja zahteva

    • F.

      Komunikacioni kanal

    • G.

      Nijedno od ponuđenog

    Correct Answer
    G. Nijedno od ponuđenog
    Explanation
    The given answer states that none of the attributes listed describe the session during an SSL handshake. This suggests that the attributes mentioned in the options (random values of the client and server, server and client MAC secret, server and client symmetric key, message sequence numbers, encryption mode of the request, and communication channel) are not relevant or do not accurately describe the session during an SSL handshake.

    Rate this question:

  • 16. 

    Secure Shell(SSH) je protocol za šifrovanje komunikacionih kanala, koji se najčešće koristi za obezbeđivanje sigurnih sesija udaljenog prijavljivanja na sistem.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    A. Tačno
    Explanation
    SSH (Secure Shell) is a protocol used for encrypting communication channels. It is commonly used for securing remote login sessions to a system. This means that when using SSH, the communication between the client and the server is encrypted, providing a secure way to access and manage remote systems.

    Rate this question:

  • 17. 

    Mana OpenSSH protokola je što pristup nije moguć ukoliko se slučajno obriše ključ sa računara kom je dozvoljen pristup.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    A. Tačno
    Explanation
    The explanation for the given correct answer is that the statement is true. The mana of the OpenSSH protocol is that access is not possible if the key is accidentally deleted from the computer with authorized access. This means that without the key, the user will not be able to authenticate and access the system.

    Rate this question:

  • 18. 

    Dobra praksa je da se sistem na koji se pristupa preko SSH servisa omogući svima koji žele da koriste sistem.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    The statement suggests that it is good practice to allow everyone who wants to use the system to access it through the SSH service. However, the correct answer is "Netačno" (False). This means that the statement is incorrect and it is not considered good practice to enable access to the system via SSH to anyone who wants to use it. It is important to restrict access to authorized users only in order to maintain security and prevent unauthorized access or malicious activities.

    Rate this question:

  • 19. 

    Protokoli koji obezbeđuju Neporecivost su:

    • A.

      Kriptografski protokoli aplikacionog sloja

    • B.

      Kriptografski protokoli mrežnog sloja

    • C.

      SSH

    • D.

      SSL

    • E.

      IPSec

    • F.

      Nijedan od ponuđenog

    Correct Answer
    A. Kriptografski protokoli aplikacionog sloja
    Explanation
    The correct answer is "Kriptografski protokoli aplikacionog sloja". Cryptographic protocols at the application layer ensure non-repudiation, which means that the sender of a message cannot deny sending it. These protocols use techniques like digital signatures to provide proof of authenticity and integrity of the message. Examples of such protocols include S/MIME (Secure/Multipurpose Internet Mail Extensions) for email security and PGP (Pretty Good Privacy) for secure communication.

    Rate this question:

  • 20. 

    Komandni interpreter je:

    • A.

      Proces koji obezbeđuje interfejs između korisnika i operativnog sistema

    • B.

      Proces koji obezbeđuje izvršavanje naredbi korisnika

    • C.

      Proces koji prevodi shell naredbe na niži jezički sloj 3

    Correct Answer
    B. Proces koji obezbeđuje izvršavanje naredbi korisnika
    Explanation
    The given correct answer states that the command interpreter is a process that provides the execution of user commands. This means that the command interpreter is responsible for taking the commands inputted by the user and executing them accordingly. It acts as an interface between the user and the operating system, allowing the user to interact with the system by giving commands and receiving output.

    Rate this question:

  • 21. 

    U komandnoj liniji naredba može biti interna ili eksterna

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    A. Tačno
    Explanation
    The statement is correct. In the command line, a command can be either internal or external. An internal command is a command that is built into the operating system and can be executed directly from the command prompt. Examples of internal commands are dir, cd, and echo. On the other hand, an external command is a command that is stored in an external file or program and needs to be accessed by specifying its location or adding it to the system's PATH variable.

    Rate this question:

  • 22. 

    Ime komande, opcije i argumenti nisu osetljivi na velika i mala slova

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    The statement is incorrect. In the given question, it is stated that the command name, options, and arguments are not case-sensitive. However, in most programming languages and systems, the command line is case-sensitive, meaning that uppercase and lowercase letters are treated as distinct characters. Therefore, the correct answer is "Netačno" (False).

    Rate this question:

  • 23. 

    Kompletiranje imena datoteka u Bourne-again shell-u postiže se pritiskom tastera:

    • A.

      Enter

    • B.

      Up Arrow

    • C.

      Down Arrow

    • D.

      Space

    • E.

      Tab

    Correct Answer
    E. Tab
    Explanation
    In the Bourne-again shell, pressing the Tab key completes the file names. This means that when you start typing a file name and press Tab, the shell will automatically complete the name for you, based on the available files in the current directory. This can save time and effort, especially when dealing with long or complex file names.

    Rate this question:

  • 24. 

    Ako kompletiranje imena datoteke ne radi to znači da ta datoteka ne postoji.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    A. Tačno
    Explanation
    If completing the file name does not work, it means that the file does not exist.

    Rate this question:

  • 25. 

    Naredba „cd ..“ je:

    • A.

      Prelazak u roditeljski direktorijum

    • B.

      Prelazak na početak aktivnog stabla (root)

    • C.

      Prelazak u home direktorijum

    • D.

      Nijedan od ponuđenih

    Correct Answer
    A. Prelazak u roditeljski direktorijum
    Explanation
    The correct answer is "Prelazak u roditeljski direktorijum". This is because the command "cd .." is used in command line interfaces to navigate to the parent directory of the current directory. By typing "cd ..", the user can move up one level in the directory hierarchy.

    Rate this question:

  • 26. 

    Naredba „cd /“ je:

    • A.

      Prelazak u roditeljski direktorijum

    • B.

      Prelazak na početak aktivnog stabla (root)

    • C.

      Prelazak u home direktorijum

    • D.

      Nijedan od ponuđenih

    Correct Answer
    B. Prelazak na početak aktivnog stabla (root)
    Explanation
    The command "cd /" is used to navigate to the root directory of the file system. The root directory is the top-level directory in a file system hierarchy and is represented by the forward slash (/) symbol. By using this command, the user can change their current working directory to the root directory, allowing them to access and navigate through all other directories and files in the file system.

    Rate this question:

  • 27. 

    Šta prikazuje izvršavanje naredbe „ls -l /etc“?

    • A.

      Sadržaj direktorijuma „etc“ i prava pristupa korisnika

    • B.

      Sadržaj direktorijuma „etc“ uključujući i skrivene datoteke

    • C.

      Sadržaj direktorijuma „etc“ samo sa imenima datoteka

    Correct Answer
    A. Sadržaj direktorijuma „etc“ i prava pristupa korisnika
    Explanation
    The correct answer explains that the command "ls -l /etc" displays the content of the "etc" directory and the access rights of the users. The "-l" option is used to display the long format of the output, which includes information such as file permissions, ownership, size, and modification date. By running this command, the user can see the detailed listing of the files and directories in the "etc" directory along with the permissions assigned to them.

    Rate this question:

  • 28. 

    U objekte Linux sistema datoteka spadaju:

    • A.

      Regularne datoteke

    • B.

      Direktorijumi

    • C.

      Registri

    • D.

      Hard linkovi

    • E.

      Resursi

    • F.

      Nijedno od ponuđenih

    Correct Answer(s)
    A. Regularne datoteke
    B. Direktorijumi
    D. Hard linkovi
    Explanation
    The given answer is correct. In a Linux system, regular files, directories, and hard links are all types of objects that can exist within the file system. Regular files refer to the typical files that contain data, such as text files or binary files. Directories are used to organize and store other files and directories. Hard links are additional names given to a file, allowing multiple paths to access the same file content. Therefore, the correct answer includes regular files, directories, and hard links as objects in a Linux system.

    Rate this question:

  • 29. 

    Izlaz naredbe file „/dev/hda: block special (3/0)“ predstavlja:

    • A.

      Regularnu datoteku

    • B.

      Direktorijum

    • C.

      Specijalnu datoteku

    • D.

      Blok uređaj

    • E.

      Simbolički link

    • F.

      Nijedno od ponuđenog

    Correct Answer
    D. Blok uređaj
    Explanation
    The correct answer is "Blok uređaj" (Block device). This is because the given output "file „/dev/hda: block special (3/0)“" indicates that the file is a block device. Block devices are a type of special file that provide buffered access to hardware devices, such as hard drives or SSDs, in fixed-size blocks. They are used for reading and writing data in larger chunks, rather than individual bytes or characters.

    Rate this question:

  • 30. 

    Kod imenovanja datoteka dozvoljeni su sledeći karakteri i grupe karaktera:

    • A.

      Mala slova

    • B.

      Velika slova

    • C.

      Cifre

    • D.

      Zagrade

    • E.

      Znakovi poređenja

    • F.

      Underscore

    • G.

      Dolar

    • H.

      Tačka

    • I.

      Tačka-zarez

    Correct Answer(s)
    A. Mala slova
    B. Velika slova
    C. Cifre
    F. Underscore
    H. Tačka
    Explanation
    The allowed characters and character groups for file naming are lowercase letters, uppercase letters, numbers, underscore, dot, and semicolon.

    Rate this question:

  • 31. 

    Komanda „less ~/myfile.txt“ kao rezultat prikazuje:

    • A.

      Putanju ka svim datotekama koje se zovu „myfile.txt“

    • B.

      Sadržaj tekstualne datoteke „myfile.txt“ koja se nalazi u root direktorijumu

    • C.

      Sadržaj tektualne datoteke „myfile.txt“ koja se nalazi na montiranom uređaju

    • D.

      Sadržaj tekstualne datoteke „myfile.txt“ koja se nalazi na Desktop-u

    • E.

      Nijedno od ponuđenih

    Correct Answer
    E. Nijedno od ponuđenih
    Explanation
    The command "less ~/myfile.txt" will display the content of the text file "myfile.txt" located in the user's home directory. None of the other options mentioned in the question are correct.

    Rate this question:

  • 32. 

    Koji karakter(i) menja bilo koji niz znakova proizvoljne dužine?

    • A.

      *

    • B.

      .

    • C.

      ?

    • D.

      !

    • E.

      []

    • F.

      Nijedan od ponuđenih

    Correct Answer
    A. *
    Explanation
    The correct answer is "*". The asterisk character (*) is a wildcard that can represent any number of characters, including zero characters. Therefore, it can be used to replace any string of any length.

    Rate this question:

  • 33. 

    Na ekranu su ispisani sledeći direktorijumi: Alestorm Anathema Andromeda Architects Korisnik je uneo naredbu:

    • A.

      Ls -l /home/dusan/muzika/A*

    • B.

      Ls -l /home/dusan/muzika/A???????

    • C.

      Ls -d /home/dusan/muzika/A???????

    • D.

      Ls -R /home/dusan/muzika/A*

    • E.

      Nijedan od ponuđenih

    Correct Answer
    E. Nijedan od ponuđenih
    Explanation
    None of the provided options is the correct answer because none of them match the given command. The given command is "ls -l /home/dusan/muzika/A*", which lists all files and directories in the "/home/dusan/muzika" directory that start with "A" and have any number of characters after it. The provided options do not match this command, so none of them is the correct answer.

    Rate this question:

  • 34. 

    Znak „<“ preusmerava izlaz komande

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    The symbol "<“" does not redirect the output of a command. It is an incorrect statement.

    Rate this question:

  • 35. 

    Shell programiranje obuhvata sledeće elemente:

    • A.

      Tipove podataka

    • B.

      Naredbeon 2

    • C.

      Datoteke

    • D.

      Registre

    • E.

      Programske strukture

    • F.

      Programske paradigme

    • G.

      Nijedan od ponuđenih

    Correct Answer(s)
    A. Tipove podataka
    B. Naredbeon 2
    E. Programske strukture
    Explanation
    Shell programiranje obuhvata tipove podataka, naredbe i programske strukture. Tipovi podataka se koriste za definisanje vrsta podataka koje se mogu koristiti u programu. Naredbe se koriste za izvršavanje određenih operacija ili akcija. Programske strukture se koriste za organizaciju koda i kontrolisanje toka izvršavanja programa.

    Rate this question:

  • 36. 

    Da bi se script fajl pokrenuo dovoljno je u terminalnu uneti samo njegov naziv.

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    B. Netačno
    Explanation
    To run a script file, it is not enough to just enter its name in the terminal. The correct way to run a script file is by entering the command "python" followed by the name of the script file in the terminal.

    Rate this question:

  • 37. 

    Script datoteke jedino se mogu pokretati korišćenjem naredbe „sh ili „bash“

    • A.

      Tačno

    • B.

      Netačno

    Correct Answer
    A. Tačno
    Explanation
    The correct answer is "Tačno" (True). The explanation is that script files can only be executed using the "sh" or "bash" command. This means that in order to run a script file, you need to use either the "sh" or "bash" command followed by the name of the script file.

    Rate this question:

  • 38. 

    Koje od naredbi služe za pronalaženje nekog fajla:

    • A.

      Find

    • B.

      Search

    • C.

      Which

    • D.

      Where

    • E.

      Whereis

    • F.

      Locate

    • G.

      Grep

    • H.

      Nijedan od ponuđenih

    Correct Answer
    F. Locate
    Explanation
    The correct answer is "locate". The locate command is used to find a file by searching a pre-built database of files on the system. It quickly locates files based on their names or patterns in their names, making it a useful tool for finding files on a computer.

    Rate this question:

  • 39. 

    Poziv naredbe „expr 25.4+11“ na terminalu ispisuje vrednost:

    • A.

      25.4+11

    • B.

      36.4

    • C.

      Ne ispisuje ništa na ekranu

    • D.

      Prijavljuje sintaksnu grešku

    • E.

      Nijedan od ponuđenih

    Correct Answer
    A. 25.4+11
    Explanation
    The correct answer is 36.4. This is because the command "expr 25.4+11" in the terminal calculates the sum of 25.4 and 11, which equals 36.4.

    Rate this question:

  • 40. 

    Tekst pod obrnutim navodnicima `Back quote` izvršavanjem u terminalu se tretira kao:

    • A.

      Tekst koji gubi originalno značenje

    • B.

      Tekst koji ostaje nepromenjen

    • C.

      Tekst koji se tretira kao naredba

    • D.

      Nijedan od ponuđenih

    Correct Answer
    C. Tekst koji se tretira kao naredba
    Explanation
    The correct answer is "Tekst koji se tretira kao naredba" because when the text is enclosed in back quotes and executed in the terminal, it is treated as a command or code that will be executed by the system. Back quotes are commonly used in command substitution in Unix-like operating systems.

    Rate this question:

  • 41. 

    Naredba „echo $((10/3))“ vratiće nazad na terminalu ispisuje vrednost:

    Correct Answer
    3
    Explanation
    The command "echo $((10/3))" will return the value 3 on the terminal because it performs integer division between 10 and 3, resulting in a quotient of 3.

    Rate this question:

  • 42. 

    Nareba sa kojom se menjaju privilegije nad nekim dokumentom je:

    Correct Answer
    chmod
    Explanation
    The correct answer is "chmod." Chmod is a command in Unix-like operating systems that is used to change the permissions of a file or directory. It allows the user to modify the access permissions for the owner, group, and others. By using chmod, the user can grant or revoke various privileges such as read, write, and execute on a particular file or directory.

    Rate this question:

  • 43. 

    Koje privilegije ima datoteka da bi kreator mogao da je čita i u nju da upisuje vrednost, a ostale grupe korisnika samo da je čitaju. Rešenje izraziti kao broj u decimalnom sistemu:

    Correct Answer
    644
    Explanation
    The answer 644 represents the file permissions in the Unix/Linux system. In this case, the file has the privilege to be read and written by the owner (6), while other groups of users can only read the file (4). The numbers in the file permissions represent the level of access for the owner, group, and other users respectively. The first digit represents the owner's permissions, the second digit represents the group's permissions, and the third digit represents the permissions for other users.

    Rate this question:

  • 44. 

    Poziv naredbe „echo 6+3“ na terminalu ispisuje vrednost:

    Correct Answer
    6+3
    Explanation
    The answer is "6+3" because the command "echo" in the terminal is used to display text or variables. In this case, it is displaying the exact string "6+3" as it is, without evaluating the arithmetic expression.

    Rate this question:

  • 45. 

    Sledeći program #!/bin/bashS1="Pop Music" S2="Progressive Music" if [ "$S1" \> "$S2" ]; then echo "Yes" else echo "No" fi kao odgovor vraća reč:

    Correct Answer
    No
    Explanation
    The given program is a bash script that compares two strings, S1 and S2. It uses the "if" statement and the ">" operator to check if S1 is greater than S2. In this case, "Pop Music" is not greater than "Progressive Music", so the condition is false. Therefore, the program will execute the "else" block and print "No" as the output.

    Rate this question:

  • 46. 

    Za „ime=Johny“ poziv naredbe „echo ime“ na terminalu ispisuje vrednost:

    Correct Answer
    ime
    Explanation
    The command "echo" is used to display a message or a variable value on the terminal. In this case, the variable "ime" is not defined, so when the command "echo ime" is executed, it will simply display the string "ime" as it is.

    Rate this question:

  • 47. 

    Karakter koji se koristi za komentar u shell script-u je:

    Correct Answer
    #
    Explanation
    The character "#" is used as a comment symbol in shell scripting. Comments are used to add explanatory notes or to disable certain lines of code that are not required to be executed. When a line starts with "#", the shell ignores it and treats it as a comment. This helps in improving code readability and understanding for both the programmer and other people who may read the script.

    Rate this question:

  • 48. 

    Za prebrojavanje reči u datoteci koristimo naredbu

    Correct Answer
    wc
    Explanation
    The correct answer is "wc" because it is the command used to count the number of words in a file.

    Rate this question:

  • 49. 

    Tip datoteke određuje se korišćenjem komande:

    Correct Answer
    file
    Explanation
    The given correct answer is "file". This command is used to determine the type of a file. It provides information about the file's format, such as whether it is a text file, image file, or executable file. By using the "file" command, users can easily identify the type of a file without relying on its extension or content.

    Rate this question:

  • 50. 

    Naredba za prikazati sadržaj bilo kog direktorijuma aktivnog UNIX stabla je:

    Correct Answer
    ls
    Explanation
    The given answer "ls" is the correct command to display the contents of any directory in the active UNIX tree. The "ls" command is short for "list" and it is used to list the files and directories in the current directory by default. However, it can also be used to list the contents of a specific directory by specifying the path to that directory as an argument. Therefore, running the command "ls" without any arguments will display the contents of the current directory.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 16, 2020
    Quiz Created by
    Daniel
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.