Operating Systems Interview Questions
Questions Answers Views Company eMail

what is the application you are using in your company and what you are doing with that application.

IBM,

1 3539

1.Diff between Active and passive FTP? 2.What is anacron? 3.Diff between yum update and yum install while doing for kernel? 4.root_squash and no_root_squash does what? 5.What are the commands will you execute to find a new hardware? 6.How will you find out a lun allocated from SAN? 7.What is the main diff in CaT5 and CAT6 cable, except the 1/100 and 1/1000? 8.What is stale NFS and How will you fix it? 9.What is kernel panic error? 10.How will you recover password and shadow file, in case both got deleted. Explain the steps? 11.Explain boot process 12.What is network bonding. Explain the steps? 13.What are the exit codes returned by FSCK? 14.What is LDOM? 15.Diff between block and character device?

Wipro,

2 4478

1. Where the History file can be located? 2. How will you harden the server? 3. Diff between Raid 1 and Raid 5? 4. What is the largest disk size can be used in LVM? 5. How will you remove a PV from lvm without any data loss? 6. What is the diff between ext3 and ext2 File system? 7. How we can use resize2fs, what is the purpose? 8. What is the purpose of LVM? Why it is used? 9. If the FS is in read-only mode, so we cannot create any file. How will you fix it? 10. How to create swap partition after OS installation? 11. What is the diff between ssh and telnet? 12. How to find out the dependency required for a package?

IBM,

3 7540

Hi, I need information regarding LDOMS.Like What is LDOMS ,Creation of LDOMS, errors on LDOMS, troubleshooting LDOMS...etc.... pls post the info. Regards, Naresh

2759

How to get the last ten lines of a file using awk utility?

Infosys,

1 7652

Is this the command to connect oracle from unix? sqlplus -s username/password. Then what is the -S here...????

TCS,

1 4873

In this command sqlplus -s username/password what is -S and what's the use..???

TCS,

1 3341

In this command sqlplus -s username/password what is -S and what's the use..???

IIIP, TCS,

1 5132

what is lilo?How it is useful in linux?

HCL, SofTec,

3 11162

what version of wince supports dual core processor

1 4244

what's the latest ram lunch?

2259

What is output of the following?

ABC,

1 4123

Pipes support half duplex communication. But if we want full-duplex communications we should use two pipes between two processes. Is such situation can leads to deadlock? Write two scenarios that could leads to deadlock in such situations?

Vector India,

1 4127

Why does the server parent need to close the connected socket returns from accept in a concurrent TCP server? What may happen if it does not do so?

1 2974

Consider a TCP echo client which blocks on fgets which read input from standard input. If now the corresponding server process crashes, what will client TCP kernel receive? Can the client process receive that? Why or why not? How you solve the above problem?

1 3515


Un-Answered Questions { Operating Systems }

What is a data register and an address register in windows operating system?

457


What is the total number of primary partitions you can have on one drive in linux red hat?

336


What is a makefile in linux?

497


Can a laptop have 32gb of ram?

521


Does linux cp command overwrite?

589






How do I change the properties of a file?

490


How do I find the path to a file?

566


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

2392


How many types of ipc mechanism do you know?

488


Is unix is a programming language?

519


What is the default secondary dump device?

5


What was unix originally written for?

536


Is c++ multithreaded?

423


How do you insert a new item in a binary search tree?

565


Do ssd have shorter life?

489