what is the application you are using in your company and what you are doing with that application.
IBM,
1 35391.Diff between Active and passive FTP? 2.What is anacron? 3.Diff between yum update and yum install while doing for kernel? 4.root_squash and no_root_squash does what? 5.What are the commands will you execute to find a new hardware? 6.How will you find out a lun allocated from SAN? 7.What is the main diff in CaT5 and CAT6 cable, except the 1/100 and 1/1000? 8.What is stale NFS and How will you fix it? 9.What is kernel panic error? 10.How will you recover password and shadow file, in case both got deleted. Explain the steps? 11.Explain boot process 12.What is network bonding. Explain the steps? 13.What are the exit codes returned by FSCK? 14.What is LDOM? 15.Diff between block and character device?
2 44781. Where the History file can be located? 2. How will you harden the server? 3. Diff between Raid 1 and Raid 5? 4. What is the largest disk size can be used in LVM? 5. How will you remove a PV from lvm without any data loss? 6. What is the diff between ext3 and ext2 File system? 7. How we can use resize2fs, what is the purpose? 8. What is the purpose of LVM? Why it is used? 9. If the FS is in read-only mode, so we cannot create any file. How will you fix it? 10. How to create swap partition after OS installation? 11. What is the diff between ssh and telnet? 12. How to find out the dependency required for a package?
IBM,
3 7540Hi, I need information regarding LDOMS.Like What is LDOMS ,Creation of LDOMS, errors on LDOMS, troubleshooting LDOMS...etc.... pls post the info. Regards, Naresh
2759Is this the command to connect oracle from unix? sqlplus -s username/password. Then what is the -S here...????
TCS,
1 4873Pipes support half duplex communication. But if we want full-duplex communications we should use two pipes between two processes. Is such situation can leads to deadlock? Write two scenarios that could leads to deadlock in such situations?
1 4127Why does the server parent need to close the connected socket returns from accept in a concurrent TCP server? What may happen if it does not do so?
1 2974Consider a TCP echo client which blocks on fgets which read input from standard input. If now the corresponding server process crashes, what will client TCP kernel receive? Can the client process receive that? Why or why not? How you solve the above problem?
1 3515
What is a data register and an address register in windows operating system?
What is the total number of primary partitions you can have on one drive in linux red hat?
What is a makefile in linux?
Can a laptop have 32gb of ram?
Does linux cp command overwrite?
How do I change the properties of a file?
How do I find the path to a file?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
How many types of ipc mechanism do you know?
Is unix is a programming language?
What is the default secondary dump device?
What was unix originally written for?
Is c++ multithreaded?
How do you insert a new item in a binary search tree?
Do ssd have shorter life?