ALLInterview.com :: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Google
   
 
Categories >> Software >> Operating Systems >> Operating Systems AllOther
 
 


 

 
 Windows interview questions  Windows Interview Questions (340)
 Linux interview questions  Linux Interview Questions (451)
 Unix interview questions  Unix Interview Questions (458)
 Solaris interview questions  Solaris Interview Questions (781)
 RTOS interview questions  RTOS Interview Questions (43)
 Bulnex interview questions  Bulnex Interview Questions (4)
 Operating Systems General Concepts interview questions  Operating Systems General Concepts Interview Questions (261)
 Data Structures interview questions  Data Structures Interview Questions (67)
 Operating Systems AllOther interview questions  Operating Systems AllOther Interview Questions (48)
Question
Which of following is used for back-up files?
    (a) compress (b) Tar (c) make (d) all the above  
 Question Submitted By :: Operating-Systems-AllOther
I also faced this Question!!     Answer Posted By  
 
Answer
# 1
Tar 
Is This Answer Correct ?    6 Yes 1 No
Guest
 

 
 
 
Other Operating Systems AllOther Interview Questions
 
  Question Asked @ Answers
 
what is the difference between a soft real time operating system and hard real time operating system? TATA 1
MY system is showing "BOOT FAILURE:SYSTEM HALTED" after restarting the system please give me the solution for this problem thanking you........... ITC-Infotech 3
Assume that passwords are selected from four-character combinations of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a) Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to discover the correct password? FCI 2
What is a semaphore? Motorola 20
Method used for Disk searching.. a.linked list b.AVL c.B-tree d. binary tree Hughes 3
In the process table entry for the kernel process, the process id value is a) 0 b) 1 c) 2 d) 255 e) it does not have a process table entry IBM 4
What operating systems provide threads?   5
Hi, This question may sound stupid. But I want to know that if the secondary storage device is used to store data on computer, then what is the use of the primary storage in the first place? Why cant we use only one?   2
what are Prerequisites to Install Active Directory in windows 2000 server? ISL 3
what is live lock,race condition,starvation?how it work and explain brifly?   3
How does the scheduler know the time how it should be scheduled. Motorola 1
What is TSY? Samsung 4
 
For more Operating Systems AllOther Interview Questions Click Here 
 
 
 
 
 


   
Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
   
Copyright 2013  ALLInterview.com.  All Rights Reserved.

ALLInterview.com   ::  KalAajKal.com