Unix Interview Questions
Questions Answers Views Company eMail

what is the functionality of kernel in unix architecture?

12 16839

Sorry to all Technical person for mistake of Question. Now i am post currect question Why copied file permission is changed in destination. When i give all permission i.e 777 to file and copy that to other location in destination the permission is 755. But if give permission 555 in destination that file permission is 555 and if give permission 444 to file after copy in destination the file permission is 444. These all are happening in normal user. How the umask value is calculate here really i am not understand. Please write the proper answer. Thanks in Advance


3 4707

What is RC (return code)? What is useful for? Which are the common values?


1 4380

What does "bulk loading of a table" mean? Can you describe advantages or disadvantages of using these features?


2 6528

What is a "parameter card" and what is useful for?


1 5880

Suppose you have a scheduling chain where the process 1 is a predecessor of the process 2 and both of them are scheduled every Monday at 8.00pm. Will I find execution log of process 1 every Tuesday morning? And what about the other one? Why?

IBM, Accenture,

1 2092

How i'll delete a particular line from the file? Please give answer as soon as possible. Thanks in advance.


12 13088

What is the number of the masked code ee@?

Amazon, Accenture, Amdocs,

2 24375

What is difference between SSH V1 and SSH V2? What are drawbacks of SSH V2?


1 7394

How to display a file name which has zero bytes in size.


11 10776

what is the difference between KILL and KILL -9?

Informatica, Nutanix,

5 19866

What are the general Commands in using Unix OS for a beginner? how many commands you know in that?

2 3821

what is the difference between SED and GREP ? Which one is more better and why?


4 24281

how to find the 51th record of a file containing 100 records in unix.


12 12559

how to use grep command to list find the records of a file containg 10 different strings


5 7750

Un-Answered Questions { Unix }

What are the main differences between Apache 1.x and 2.x?


what is the advaantage of each user having its own copy of the shell?


Why do I get EPROTO from read()?


Explain how and when a DNS request is solved when a user tries to surf to the site www.abcdeg.in .Assume the user machine uses a local name server and sits on another network other than www.abcdef.in.


What are the pros/cons of select(), non-blocking I/O and SIGIO?


Is there any advantage to handling the signal, rather than just ignoring it and checking for the EPIPE error? Are there any useful parameters passed to the signal catching function?


How can I tell when a socket is closed on the other end?


system choose one for me on the connect() call? Should I bind() a port number in my client program, or let the?


hw will u use awk in replacing cahrs and files


What is ant_build.sh? Have u seen that file?


What are the events done by the Kernel after a process is being swapped out from the main memory?


I have one flat file,in this file how many columns are there i don't know,but one ename column is there , just i want to cut the surname, so how to cut the surname, any one know the answer please guide me ? ename ----- tapan kumar nayak bala murugan kutal chkrobarthy biswo My output is like that OUTPUT ------ nayak murugan chakrobarthy biswo


i m putting 2.6yrs fake exp in oracle/unix production support i want to know some real time issues,like tell me the challenging issue u ever faced? my project is credit card application plz help me!


I am new to Unix and Unix Shell scripting could you guide me on how to go about these subjects and where to start from with concern to Oracle?. I also would like to know where does UNIX shell Scripting help in terms of development of a application in Oracle? I have no clue in the subject so do help me. Thank You Neelima


how to kernel protected memory?