Operating Systems Interview Questions
Questions Answers Views Company eMail

How to Kill a Particular Process in windows?

Tomax,

5 6320

How to change the IP Address of the system in windows 95/98 and windows 2000 server system?

Tomax,

3 5302

What is Difference between thread and process?

Samsung, HCL, Goldman Sachs, Encora, Microsoft, HP, AirTies, Azingo, Bloomberg, MES,

28 237747




How to communicate between difference process?

HP, IBM,

2 5273

What is the best way of communication in multi process environment? ex: getting log from different applications from multi servers?

HP,

1 1964

What is scheduling and How it effects the processor efficiency?

HP,

1 2116

What is virtual memory, if OS didt have that concept What are the problems can arise?

HP,

6 11117

What is the best suited algorithm to avoid internal fragmentation?

HP,

1 5694

How to escape from external fragmentation?

HP,

1 2435

What is difference in managing processes in windows, unix, RTOS?

HP,

1416

What is the difference between mutex and semaphore?

Microsoft, HP,

14 47016

What are counting semaphores?

IBM, HP,

4 9445

which is best among semaphores and mutexes?

HP,

2 4318

which is best among pipes, queues, shared memory and why?

HP,

2 3771

What are named pipes?

HP,

3 3126







Un-Answered Questions { Operating Systems }

absolute path gives the location a file or directory in reference to a rile directory while relative path is a path given file starting from another file. explain?

416


how can u give space garentee for volume in netapp storage

2036


hw will u use awk in replacing cahrs and files

1725


What is the key advantage of Windows NT Challenge/Response security?

1088


do records fall under linear or non linear data structures?

470


Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?

1605


How to catagories tickets in RHEL, which tickets are belong to PROBLEM, INCIDENT and CHANGE management? please given to me with examples

454


What are System Calls?

471


I want software development lifecycle of windows XP software?

1343


How difference windows from dos? Explain the ways of organizing windows. what is the use network neighborhood? what is the use control panel in windows xp?

693


What is cachefs?

1023


When would you choose bottom-up methodology?

1274


Benefits of SMF compared LRC(legacy run control)?

1758


Some operating system have a tree structured file system but limits the depth of the tree to some small number of levels. what effect does this limit have on users? How does this simplify file system (if it does)?

3205


What is the setservent(3) Function?

432