caite.info Lifestyle BASIC LINUX INTERVIEW QUESTIONS AND ANSWERS PDF

Basic linux interview questions and answers pdf

Monday, February 25, 2019 admin Comments(0)

Here we will bring to you Linux Interview Questions and all other aspects of Linux Interview, which is must for a professional in this cut-throat. For someone new (and even not so new) to Linux®, there are hundreds of questions, This paper addresses a number of miscellaneous questions, both. 11 Basic Linux Interview Questions and Answers - Download as PDF File .pdf), Text File .txt) or read online.


Author: WAVA MOUSTAFA
Language: English, Spanish, Portuguese
Country: Nepal
Genre: Environment
Pages: 363
Published (Last): 03.10.2015
ISBN: 332-7-42294-577-4
ePub File Size: 17.72 MB
PDF File Size: 8.72 MB
Distribution: Free* [*Regsitration Required]
Downloads: 39507
Uploaded by: KASI

8) What are the basic components of Linux? Just like any other typical operating system, Linux has all of these components: kernel, shells and. New 54 Linux Admin Interview Questions And Answers Pdf, You can crack the What is the basic difference between UNIX and Linux Operating System?. Frequently asked Linux Interview Questions with detailed answers and examples . So you should reinstall the core operating system, and then restore system.

Network administrator maintains system network which includes network configuration and troubleshooting. Question 6. Linux has tougher program permissions before installing anything on your machine. It is the default account every time you install Linux. A good preparation and a smart approach may help you get through this interview.

To list all the files beginning with A command: Mv Fileo. A shortcut method would be: Copy a file to make a new file. Use the output operator e. The tar program is an immensely useful archiving utility. It can combine an entire directory tree into one large file suitable for transferring or compression. Files come in eight flavors: Use tar command The GNU version of the tar archiving utility: What Does Grep Stand For?

Top provides an ongoing look at processor activity in real time. Three modes - Command mode: Insert mode: Text is inserted. Command line mode: Use command: ZZ that is save changes and quit. Use command line: Current line and two lines below it.

I think at this point that 1 million is a low number. I am in contact with other set-top box vendors that are talking about numbers in the lOs of millions for their products. These numbers actually make the OLPC numbers seem small, which is in it amazing. Most importantly, why it all matters — and it really matters a lot.

That effort will not be without some sacrifice, but if we are to maintain our ability to use and program our machines, and have fun with them, we have to act now. What Are Mysql Transactions? Each row has two additional columns associated with it - creation time and deletion time, but instead of storing timestamps, MySQL stores version numbers. Explain Mysql Locks.

Table-level locks allow the user to lock the entire table, page-level locks allow locking of certain portions of the tables those portions are referred to as tables , row-level locks are the most granular and allow locking of specific rows.

11 Basic Linux Interview Questions and Answers

Explain Mysql Architecture. The front layer takes care of network connections and security authentications, the middle layer does the SQL query parsing, and then the query is handled off to the storage engine. Nonvolatile Read Write Memory, also called Flash memory.

It is also know as shadow RAM. Stack is a portion of RAM used for saving the content of Program Counter and general purpose registers.

Flag is a flip-flop used to store the information about the status of a processor and the status of the instruction executed most recently. Which Processor Structure Is Pipelined? All x86 processors have pipelined structure.

What Is A Compiler? Compiler is used to translate the high-level language program into machine code at a time. The Execution time is less compared to Interpreter. Differentiate Between Ram And Rom? What Is Called.

What Is Cache Memory? Cache memory is a small high-speed memory. The cache memory is only in RAM. What Is Interrupt? Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular work. Static RAM: No refreshing, 6 to 8 MOS transistors are required to form one memory cell, Information stored as voltage level in a flip flop. Dynamic RAM: Refreshed periodically, 3 to 4 transistors are required to form one memory cell, Information is stored as a charge in the gate to substrate capacitance.

In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: Secondary devices are: Floppy disc I Hard disk. Microprocessor contain ROM chip because it contain instructions to execute data. What Is Meant By Latch? Latch is a D- type flip-flop used as a temporary storage device controlled by a timing signal, which can store 0 or 1.

Linux Interview Questions

The primary function of a Latch is data storage. It is used in output devices such as LED, to hold the data for display.

Interview answers and pdf questions basic linux

In Microprocessor more op-codes, few bit handling instructions. But in Microcontroller: It has limitations on the size of data. Most Microprocessor does not support floating-point operations. Is The Address Bus Unidirectional? The address bus is unidirectional because the address information is always given by the Micro Processor to address a memory location of an input I output devices. High-density n- type Complimentary Metal Oxide Silicon field effect transistor.

Similarly processor has 16 bit ALU. What Is A Microprocessor? Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and executes the instructions. Most Micro Processor is single- chip devices. You use the touch command to create an empty file without needing to open it.

Top Linux Interview Questions And Answers

Answers a and e point to invalid commands, though either of these might actually be aliased to point to a real command. Answers b and c utilize editors, and so do not satisfy the requirements of the question. The kill command by itself tries to allow a process to exit cleanly. You type kill -9 PID, on the other hand, to abruptly stop a process that will not quit by any other means.

Answers b and d are only valid in some contexts, and even in those contexts will not work on a hung process. You can use rmdir or rm -rf to delete a directory.

Answer a is incorrect, because the rm command without any specific flags will not delete a directory, it will only delete files. Answers d and e point to a non-existent command.

It can also be used to create a new file. The -r option tells the cp command to recurs the directories. The -P option retains the original permissions. The dd command is a special copy command often used for floppy disks and tapes. What Could Be The Problem? In order to delete a file, you must have write rights to the directory containing the file.

Using the -c option with the grep command will show the total number of lines containing the specified pattern rather than displaying the lines containing the pattern. The -n option when used with sed prints only the lines containing the pattern. Z extension indicates that this is a file that has been compressed using the compress utility.

The zcat utility provides the ability to display the contents of a compressed file. If you do not unmount the floppy before removing it, the files on the floppy may become corrupted. Quotas are set on a partition by partition basis. If your users have home directories on different partitions, you will need to configure quotas for each partition. The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

Also, any changes that are made are seen by all the users with access. When the sticky bit is set on a world writable directory, only the owner can delete any file contained in that directory. Your Default Umask Is What Does This Mean? The digits of your umask represent owner, group and others in that order. The 0 gives read and write for files and the 2 gives read only for files.

When using sed to do a search and replace, its default action is to only replace the first occurrence in each line. By default, expand converts tabs to eight spaces. Use the -t option to change this behavior. If the number of lines to display is not specified, the first ten lines of the specified file are displayed. The asterick tells head to display the content of each file in the present working directory.

The od text filter will dumpt the contents of a file and display it in 2-byte octal numbers. The paste text filter usually joins two files separating the corresponding lines with a tab. The -s option, however, will cause paste to display the first file, dog, then a new line character, and then the file cat.

The default page length when using pr is 66 lines. The -l option is used to specify a different length. The tac text filter is a reverse cat. It displays a file starting with the last line and ending with the first line. What Command Should You Use? The tail utility displays the end of a file. The tells tail to display the last fifteen lines of each specified file. That means new computer can be added to the network without any risk of manually assigning unique IP address. What Is Nfs? What Is Its Job?

NFS enables filesystems physically residing on one computer system to be used by other computers in the network, appearing to users on the remote host as just another local disk. The file server is a machine that shares its disk storage and files with other machines on the network. We can use two major techniques to handle the collisions.

They are open addressing and separate chaining. In open addressing, data items that hash to a full array cell are placed in another cell in the array. In separate chaining, each array element consists of a linked list. All data items hashing to a given array index are inserted in that list. The major advantage of a hash table is its speed.

The Best Linux Interview Questions & Answers [UPDATED]

Because the hash function is to take a range of key values and transform them into index values in such a way that the key values are distributed randomly across all the indices of a hash table. What Is Write Command? The write command enables you to write an actual message on the other terminal online.

You have to issue the write command with the login ID of the user with whom you want to communicate. The write command informs the user at the other end that there is a message from another user. Even if they are in the middle of an edit session, write overwrites whatever is on the screen. The edit session contents are not corrupted; you can restore the original screen on most editors with Ctrl-L. The root login does not restrict you in any way.

When you log in as root, you become the system. The root login is also sometimes called the super user login. With one simple command, issued either on purpose or by accident, you can destroy your entire Linux installation. For this reason, use the root login only when necessary. Avoid experimenting with commands when you do log in as root. You can then either specify its size or the ending cylinder. To specify the number of commands to list, use -n.

This is the super user account also known as root. Syslogd-The syslogd daemon is responsible for tracking system information and saving it to specified log flies. To the screen or display-By default, your shell directs standard output to your screen or display. Top-The top utility shows a listing of all running processes that is dynamically updated. Who Owns The Data Dictionary? The SYS user owns the data dictionary.

By using this command immediately after booting your computer, you will see the boot messages. Use the -r option to remove the password from the group. The split text filter will divide files into equally sized pieces.

The default length of each piece is 1, lines. What Utility Should You Use? You can use the z modifier with tar to compress your archive at the same time as creating it. What Command Should You Type? This command uses the x switch to extract a file. Here the file memo. By default, your shell directs standard output to your screen or display. Linux Tutorial.

Linux Practice Tests. October 23, Theories apart, we are proud to announce a new section on Tecmint , dedicated to Linux Interview. Here we will bring to you Linux Interview Questions and all other aspects of Linux, which is must for a professional in this cut-throat competition world. A new article in this section Linux Interview will be posted on every weekend.

Linux questions answers interview pdf and basic

We will start with Basic Linux Interview Question and will go advance article by article, for which your response is highly appreciated, which put us on a higher note. The Number of Lines of codes varies on daily basis and an average of more than 3, lines are being added to Kernel. How much you learned for the above questions? How it helped you in your Interview?

We would like to hear all these from you in our comment section. Wait till the next weekend, for new set of questions.

Till then stay healthy, tuned and connected to Tecmint. We are thankful for your never ending support. I think it should be pointed out, regarding 3, that the number of lines of code in Linux changes — generally upward — with each kernel release, and no-doubt the numbers shown in the answer are now outdated, but no-doubt were true at the time this article was written.

Your email address will not be published. Save my name, email, and website in this browser for the next time I comment. Notify me of followup comments via e-mail. You can also subscribe without commenting. This site uses Akismet to reduce spam. Learn how your comment data is processed. How to Install Nagios 4. How to Install Ubuntu Ending In: Interview Questions Basic Linux Interview Questions. Kernel is the core of Linux Operating System.

Shell is a command Line Interpreter, Command is user Instruction to Computer, Script is collection of commands stored in a file and Terminal is a command Line Interface. Linux Kernel contains 12,, Lines of codes out of which 2,, Lines are comments. So remaining 9,, lines are codes and out of 9,, Lines of codes 7,, are written in C Programming Language. Yes, I do agree.

Linux was written for x86 machine, and has been ported to all kind of platform. Linux made a very promising future in mobile phone, Tablets. In-fact we are surrounded by Linux in remote controls, space science, Research, Web, Desktop Computing.

The list is endless.

Slackware is the odd in the above list. Slackware is a Linux Operating System. Linux has had about viruses listed till date. None of them actively spreading nowadays.