Question 1. What Is Linux Shell?
Linux shell is a user interface used for executing the instructions. Shell is a application the user makes use of for executing the instructions. In UNIX, any program can be the users shell. Shell categories in Linux are:
Bourne shell like minded, C shell well suited, nontraditional, and historical.
Question 2. What Is Shell Script?
A shell script, as the call shows, is a script written for the shell. Script right here way a programming language used to manipulate the software. The shell script lets in distinctive instructions entered inside the shell to be accomplished. Shell script is straightforward to debug, faster in comparison to writing huge programs. However the execution pace is gradual because it launches a brand new process for every shell command done. Examples of commands are cp, cn, cd.
Linux Embedded systems Interview Questions
Question three. What Is Kernel? Explain The Task It Performs.
Kernel is utilized in UNIX like structures and is taken into consideration to be the coronary heart of the running device. It is answerable for communication between hardware and software program additives. It is mostly used for managing the systems assets as well.
The Kernel undertaking supervisor permits tasks to run concurrently.
Managing the computer resources: Kernel permits the other programs to run and use the sources.
Resources include i/o gadgets, CPU, memory.
Kernel is accountable for Process control. It allows more than one techniques to run concurrently permitting consumer to multitask.
Kernel has an get admission to to the structures memory and lets in the tactics to get admission to the memory whilst required.
Processes may additionally need to get admission to the devices connected to the system. Kernel assists the processes in doing so.
For the procedures to get entry to and make use of those offerings, system calls are used.
Question 4. What Are Pipes?
A pipe is a series of processes in order that output of 1 process (stdout) is fed an enter (stdin) to some other. UNIX shell has a unique syntax for creation of pipelines. The instructions are written in sequence separated with the aid of sort document lpr ( kind the document and ship it to printer)
Linux Embedded systems Tutorial
Question five. Explain Trap Command; Shift Command, Getopts Command Of Linux
Trap command: controls the motion to be taken by way of the shell whilst a signal is acquired.
Trap [OPTIONS] [ [arg] signspec..]
Arg is the action to be taken or accomplished on receiving a sign laid out in signspec.
E.G. Lure “rm $FILE; go out” // go out (signal) and eliminate document (movement).
Shift Command: Using shift command, command line arguments can be accessed. The command reasons the positional parameters shift to the left. Shift [n] wherein n defaults to at least one. It is beneficial whilst numerous parameters want to be tested.
Getopts command: this command is used to parse arguments surpassed. It examines the following command line argument and determines whether or not it is a valid option.
Getopts optstring variable1. Here, optsring carries letters to be identified if a letter is accompanied by using a colon, a controversy need to be distinct. E.G (whether or not the argument starts with a minus sign and is accompanied via any unmarried letter contained inside alternatives ) If no longer, diagnostic messages are proven. It is commonly accomplished internal a loop.
Red Hat Linux Essentials Interview Questions
Question 6. What Stateless Linux Server? What Feature It Offers?
A stateless Linux server is a centralized server wherein no nation exists at the single workstations. There may be eventualities when a nation of a partilcuar system is meaningful (A snap shot is taken then) and the consumer wishes all the other machines to be in that nation. This is where the stateless Linux server comes into picture.
It shops the prototypes of every system.
It stores snapshots taken for those structures.
It stores domestic directories for those device.
Uses LDAP containing facts of all structures to assist in locating out which snapshot (of kingdom) should be running on which machine.
Question 7. What Does Nslookup Do? Explain Its Two Modes.
Nslookup is used to find details related to a Domain name server. Details like IP addresses of a device, MX facts, servers and so on. It sends a site call query packet to the corresponding DNS.
Nslookup has modes. Interactive and non interactive. Interactive mode allows the person to engage by using querying statistics approximately unique hosts and domains.
Non interactive mode is used to fetch facts about the specified host or area.
Nslookup [options] [server]
Unix/Linux Tutorial Red Hat Linux System Administration Interview Questions
Question 8. What Is Bash Shell?
Bash is a loose shell for UNIX. It is the default shell for maximum UNIX systems. It has a combination of the C and Korn shell features. Bash shell isn't always portable. Any Bash-particular characteristic will no longer function on a gadget the use of the Bourne shell or one among its replacements, unless bash is hooked up as a secondary shell and the script begins with #!/bin/bash. It supports ordinary and expressions. When bash script begins, it executes commands of different scripts.
Question 9. What Are The Process States In Linux?
Process states in Linux:
Running: Process is either strolling or equipped to run.
Interruptible: a Blocked country of a method and waiting for an occasion or signal from another manner.
Uninterruptible:- a blocked state. Process waits for a hardware condition and can't take care of any sign.
Stopped: Process is stopped or halted and can be restarted by a few different system.
Zombie: technique terminated, however facts is still there within the process table.
Ubuntu Certified Professional Interview Questions
Question 10. What Is A Zombie?
Zombie is a procedure country when the child dies before the parent process. In this example the structural statistics of the procedure continues to be inside the process desk. Since this system isn't always alive, it can't react to signals. Zombie state can finish whilst the discern dies. All sources of the zombie country process are cleared with the aid of the kernel.
Question eleven. Explain Each System Calls Used For Process Management In Linux.
System calls used for Process control:
Fork () :- Used to create a brand new process
Exec() :- Execute a new software
Wait():- wait until the manner finishes execution
Exit():- Exit from the technique
Getpid():- get the unique manner identification of the system
Getppid():- get the parent method specific id
Nice():- to bias the present property of procedure
IBM AIX Interview Questions
Question 12. How Do You List Files In A Directory?
ls - list listing contents
ls -l (-l use a protracted listing layout)
Linux Embedded structures Interview Questions
Question thirteen. How Do You List All Files In A Directory, Including The Hidden Files?
ls -a (-a, do now not cover entries starting with .)
Question 14. How Do You Find Out All Processes That Are Currently Running?
playstation -f (-f does full-format list.)
Question 15. How Do You Find Out The Processes That Are Currently Running Or A Particular User?
ps -au Myname (-u by effective user ID (helps names)) (a - all users)
Solaris Interview Questions
Question 16. How Do You Kill A Process?
kill -9 eight (process_id 8) or kill -nine %7 (task quantity 7)
kill -nine -1 (Kill all methods you can kill.)
killall - kill strategies by name maximum (beneficial - killall java)
Question 17. What Would You Use To Edit Contents Of The File?
vi display editor or jedit, nedit or ex line editor
HP-ux 11iv3 machine management Interview Questions
Question 18. What Would You Use To View Contents Of A Large Error Log File?
tail -10 file_name ( final 10 rows)
Red Hat Linux Essentials Interview Questions
Question 19. How Do You Log In To A Remote Unix Box?
Using telnet server_name or ssh -l ( ssh - OpenSSH SSH purchaser (remote login software))
Question 20. How Do You Get Help On A Unix Terminal?
info command_name (greater statistics)
Red Hat cluster Interview Questions
Question 21. How Do You List Contents Of A Directory Including All Of Its Subdirectories, Providing Full Details And Sorted By Modification Time?
-a all entries
-c by means of time
Question 22. What Is A Filesystem?
Sum of all directories known as document system.
A record gadget is the primary means of report storage in UNIX. File systems are made from inodes and superblocks.
Question 23. How Do You Get Its Usage (a Filesystem)?
By storing and manage files.
Unix/Linux Interview Questions
Question 24. How Do You Check For Processes Started By User 'pat'?
ps -fu pat (-f -full_format u -user_name )
Red Hat Linux System Administration Interview Questions
Question 25. How Do You Start A Job On Background?
bg %four (process 4)
Question 26. What Utility Would You Use To Replace A String '2001' For '2002' In A Text File?
Grep, Kde( works on Linux and Unix)
Unix Shell Scripting Interview Questions
Question 27. What Utility Would You Use To Cut Off The First Column In A Text File?
Ubuntu Certified Professional Interview Questions
Question 28. How To Copy File Into Directory?
cp /tmp/file_name . (dot mean in the modern-day directory)
Question 29. How To Remove Directory With Files?
rm -rf directory_name
Solaris Administrator Interview Questions
Question 30. What Is The Difference Between Internal And External Commands?
Internal instructions are stored inside the; same stage as the running system even as outside instructions are saved at the difficult disk a few of the other software programs.
Question 31. List The Three Main Parts Of An Operating System Command:
The 3 most important elements are the command, alternatives and arguments.
Question 32. What Is The Difference Between An Argument And An Option (or Switch)?
An argument is what the command have to act on: it could be a filename, directory or name. An option is particular while you need to request extra facts over and above the fundamental facts every command elements.
Question 33. What Is The Purpose Of Online Help?
Online assist provides data on every running system command, the syntax, the alternatives, the arguments with descriptive statistics.
IBM AIX Interview Questions
Question 34. Name Two Forms Of Security.
Two forms of protection are Passwords and File Security with permissions exact.
Question 35. What Command Do You Type To Find Help About The Command Who?
$ guy who
Question 36. What Is The Difference Between Home Directory And Working Directory?
Home listing is the listing you start at when you log into the device. Working directory can be anywhere at the gadget and it's miles in which you are currently running.
Solaris Interview Questions
Question 37. Which Directory Is Closer To The Top Of The File System Tree, Parent Directory Or Current Directory?
The discern directory is above the contemporary listing, so it's miles closer to the foundation or top of the record machine.
Question 38. What Are Two Subtle Differences In Using The More And The Pg Commands?
With the greater command you show any other screenful by using pressing the spacebar, with pg you press the return key.
The extra command returns you robotically to the UNIX shell whilst completed, even as pg waits till you press go back.
Question 39. When Is It Better To Use The More Command Rather Than Cat Command?
It is occasionally higher to use the extra command when you are viewing a file as a way to show over one display.
Question 40. What Are Two Functions The Move Mv Command Can Carry Out?
The mv command actions documents and can also be used to rename a file or listing.
HP-ux 11iv3 system management Interview Questions
Question 41. Name Two Methods You Could Use To Rename A File?
Two strategies that might be used:
a. Use the mv command
b. Replica the file and deliver it a new call and then remove the authentic document if now not needed.
Question forty two. List All The Files Beginning With A?
To listing all the documents beginning with A command: ls A*
Red Hat cluster Interview Questions
Question forty three. Which Of The Quoting Or Escape Characters Allows The Dollar Sign ($) To Retain Its Special Meaning?
The double quote (") lets in the dollar sign ($) to hold its unique that means. Both the backslash () and single quote (') could put off the unique meaning of the greenback sign.
Question 44. What Is A Faster Way To Do The Same Command? Mv Fileo.Txt Newdir Mv Filel.Txt Newdir Mv File2.Txt Newdir Mv File3.Txt Newdir?
A shortcut method might be: mv file?.Txt newdir
Question forty five. List Two Ways To Create A New File:
a.Copy a document to make a brand new record.
B. Use the output operator e.G. Ls -l > newfile.Txt
Question 46. What Is The Difference Between > And >> Operators?
The operator > both overwrites the present report (WITHOUT WARNING) or creates a new report.
The operator >> both provides the brand new contents to the cease of an present record or creates a new report.
Question forty seven. How Can You See All Mounted Drives?
Question 48. How Can You Find A Path To The File In The System?
discover file_name (locate - list documents in databases that match a sample)
Question forty nine. What Linux Hotkeys Do You Know?
Ctrl-Alt-F1 Exit to command activate
Ctrl-Alt-F7 or F8 Takes you lower back to KDE laptop from command activate
Crtl-Alt-Backspace Restart XWindows
Ctrl-Alt-D Show computing device
Question 50. What Can You Tell About The Tar Command?
The tar application is an immensely beneficial archiving application. It can integrate an entire directory tree into one large record suitable for transferring or compression.
Question fifty one. What Types Of Files You Know?
Files are available in eight flavors:
Question 52. How You Will Uncompress The File?
Use tar command (The GNU model of the tar archiving application):
tar -zxvf file_name.Tar.Gz
Question fifty three. What Does Grep() Stand For?
General Regular Expression Parser.
Question 54. What Does The Top Command Display?
Top presents an ongoing look at processor interest in actual time.It displays a listing of the maximum CPU-intensive obligations on the device, and might provide an interactive interÂ¬ face for manipulating processes. (q is to give up)
Question 55. How To Find Difference In Two Configuration Files On The Same Server?
Use diff command that is compare files line by using line
diff -u /usr/home/my_project1/and so on/ABC.Conf /usr/home/my_project2/and so forth/ABC.Conf
Question 56. What Is The Best Way To See The End Of A Logfile.Log File?
Use tail command - output the ultimate a part of documents
tail -n file_name ( the final N strains, instead of the remaining 10 as default)
Question 57. Please Write A Loop For Removing All Files In The Current Directory That Contains A Word 'log'?
for i in *log*; do rm $i; completed
Question 58. How To Switch To A Previously Used Directory?
Question 59. How Many Vi Editor Modes Do You Know?
Three modes -
Command mode: letters or collection of letters interactively command vi.
Insert mode: Text is inserted.
Command line mode: enter this mode by typing ":" and entry command line at the foot of the display screen.
Question 60. How Can You Terminate Vi Session?
Use command: ZZ that is save adjustments and quit.
Use command line: ":wq" this is write adjustments and end.
Use command line: ":q!" to disregard adjustments and stop.
Question 61. How Can You Copy Lines Into The Buffer In Command Mode?
yy - copy a single line defined via cutting-edge cursor position
3yy - reproduction three strains. Current line and two lines underneath it.
Question 62. We Saw The Mention On The Linux Bios Website About One Million Devices Shipped With Linux Bios. Could You Tell Us More About These Devices?
Yes, those are internet terminals that have been constructed in India, based totally at the [x86 system-on-chip] STPC chip, I am instructed; additionally, there evidently is a Turkish-built digital TV that runs Linux BIOS. I even have also heard that there are routers and lots of different embedded devices strolling Linux BIOS. I suppose at this factor that 1 million is a low range. I am in contact with different set-top box vendors that are speaking about numbers within the lOs of tens of millions for his or her merchandise. These numbers genuinely make the OLPC numbers appear small, that is in it excellent.
Question sixty three. What's Your Goal For Your Talk At Fosdem?
I’d want to talk the basic ideas — that Linux is a good BIOS, and why; why Linux BIOS is constructed the way it's miles; in which we're going; and the way human beings can assist. Most importantly, why it all topics — and it truly matters loads. We’re on the verge of losing manipulate of the systems we purchase, and we want to make a aware attempt, as a community, to make sure this lack of manage does now not happen. That attempt will not be without a few sacrifice, however if we are to maintain our ability to apply and software our machines, and feature a laugh with them, we must act now. Because, if the computing business stops being fun, what’s the point$
Question sixty four. What Are Mysql Transactions?
A set of instructions/queries that ought to be accomplished or rolled lower back as a single atomic unit.
Question 65. Explain Multi-version Concurrency Control In Mysql?
Each row has two additional columns related to it - advent time and deletion time, however in preference to storing timestamps, MySQL stores model numbers.
Question sixty six. Explain Mysql Locks.
Table-stage locks allow the user to fasten the whole table, web page-degree locks permit locking of certain quantities of the tables (those portions are referred to as tables), row-stage locks are the maximum granular and permit locking of specific rows.
Question sixty seven. Explain Mysql Architecture.
The front layer takes care of community connections and protection authentications, the middle layer does the SQL query parsing, after which the question is treated off to the storage engine. A storage engine might be either a default one supplied with MySQL (MyISAM) or a industrial one provided through a 3rd-party dealer (ScaleDB, InnoDB, and many others.)
Question 68. List The Main Applications Of eight Bit Microprocessors?
8 bit microprocessors are used in a variety of applications such as appliances vehicles ,industrial manner and manage applications.
Question sixty nine. What Is Nv-ram?
Nonvolatile Read Write Memory, also called Flash reminiscence. It is likewise know as shadow RAM.
Question 70. Can Rom Be Used As Stack?
ROM cannot be used as stack because it isn't always feasible to write down to ROM.
Question 71. What Is Stack?
Stack is a part of RAM used for saving the content material of Program Counter and wellknown motive registers.
Question 72. What Is Flag?
Flag is a turn-flop used to keep the records about the fame of a processor and the popularity of the education executed most lately .
Question 73. Which Processor Structure Is Pipelined?
All x86 processors have pipelined shape.
Question 74. What Is A Compiler?
Compiler is used to translate the excessive-degree language program into system code at a time. It doesn’t require unique training to store in a reminiscence, it stores automatically. The Execution time is much less as compared to Interpreter.
Question 75. Differentiate Between Ram And Rom?
RAM: Read / Write reminiscence, High Speed, Volatile Memory. ROM: Read best reminiscence, Low Speed, Non Voliate Memory.
Question seventy six. Which Transistor Is Used In Each Cell Of Eprom?
Floating .Gate Avalanche Injection MOS (FAMOS) transistor is used in each cellular of EPROM.
Question 77. What Is Called .Scratch Pad Of Computer.?
Cache Memory is scratch pad of computer.
Question 78. What Is Cache Memory?
Cache reminiscence is a small high-speed memory. It is used for brief storage of facts & records among the principle reminiscence and the CPU (center processing unit). The cache reminiscence is simplest in RAM.
Question 79. What Is Interrupt?
Interrupt is a signal ship through external tool to the processor in an effort to request the processor to perform a selected work.
Question eighty. Difference Between Static And Dynamic Ram?
Static RAM: No refreshing, 6 to eight MOS transistors are required to form one memory mobile, Information saved as voltage level in a flip flop.
Dynamic RAM: Refreshed periodically, three to 4 transistors are required to form one memory cellular, Information is saved as a fee inside the gate to substrate capacitance.
Question 81. What Is The Difference Between Primary & Secondary Storage Device?
In number one storage tool the storage capability is restricted. It has a risky memory. In secondary storage device the garage ability is greater. It is a nonvolatile memory. Primary gadgets are: RAM / ROM. Secondary devices are: Floppy disc I Hard disk.
Question 82. Why Does Microprocessor Contain Rom Chips?
Microprocessor comprise ROM chip because it contain commands to execute information.
Question eighty three. What Is Meant By Latch?
Latch is a D- kind turn-flop used as a brief storage device controlled by using a timing sign, which could keep zero or 1. The number one characteristic of a Latch is data garage. It is utilized in output gadgets which includes LED, to keep the data for display.
Question eighty four. What Is The Difference Between Microprocessor And Microcontroller?
In Microprocessor extra op-codes, few bit coping with commands. But in Microcontroller: fewer op-codes, greater bit dealing with Instructions, and also it is defined as a tool that consists of micro processor, memory, & enter / output sign strains on a single chip.
Question eighty five. What Is The Disadvantage Of Microprocessor?
It has limitations on the size of statistics. Most Microprocessor does not support floating-factor operations.
Question 86. Is The Data Bus Is Bi-directional?
The records bus is Bi-directional because the same bus is used for transfer of data among Micro Processor and reminiscence or enter / output devices in both the course.
Question 87. Is The Address Bus Unidirectional?
The deal with bus is unidirectional due to the fact the address records is usually given through the Micro Processor to address a memory location of an input I output devices.
Question 88. Define Hcmos?
High-density n- type Complimentary Metal Oxide Silicon subject impact transistor.
Question 89. What Is 1st / 2nd / 3rd / 4th Generation Processor?
The processor made from PMOS I NMOS / HMOS I HCMOS technology is referred to as 1st / 2d / third / 4th technology processor, and it is made of 4 / 8 / 16 / 32 bits.
Question 90. Why 8085 Processor Is Called An 8 Bit Processor?
Because 8085 processor has 8 bit ALU (Arithmetic Logic Review). Similarly 8086 processor has sixteen bit ALU.
Question 91. Give Examples For 8 I sixteen / 32 Bit Microprocessor?
eight-bit Processor - 8085 I Z80 / 6800; sixteen-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 I 80486.
Question ninety two. What Is A Microprocessor?
Microprocessor is a software-controlled tool, which fetches the commands from memory, decodes and executes the instructions. Most Micro Processor is unmarried- chip devices.
Question 93. What Command Would You Use To Create An Empty File Without Opening It To Edit It?
You use the contact command to create an empty report with no need to open it. Answers a and e point to invalid commands, although both of those may actually be aliased to point to a real command. Answers b and c make use of editors, and so do no longer fulfill the necessities of the question. Actually touch is used to exchange the timestamps of a document if its exits, otherwise a new report with present day timestamps will be created.
Question ninety four. What Do You Type To Stop A Hung Process That Resists The Standard Attempts To Shut It Down?
The kill command by itself attempts to permit a system to exit cleanly. You kind kill -9 PID, however, to unexpectedly forestall a system as a way to not cease by any other means. Also, urgent CtrI+C works for lots applications. Answers b and d are simplest valid in some contexts, and even in those contexts will no longer work on a hung system.
Question ninety five. Which Two Commands Can You Use To Delete Directories?
You can use rmdir or rm -rf to delete a directory. Answer a is incorrect, due to the fact the rm command without any precise flags will now not delete a listing, it will simplest delete files. Answers d and e point to a non-existent command.
Question ninety six. What Is Difference Between At And Cron?
Cron command is used to time table the task each day at the same time repeatedly ,“at” command is used to agenda the mission simplest as soon as i.E. To run only one time.
Question ninety seven. Which Of The Following Tasks Cannot Be Accomplished With The Touch Command?
The contact command is typically used to alter both a report’s get right of entry to or amendment time. It can also be used to create a brand new document.
Question ninety eight. You Want To Copy The User's Home Directories To A New Location. Which Of The Following Commands Will Accomplish This?
The -r choice tells the cp command to recurs the directories. The -P option keeps the unique permissions.
Question ninety nine. You Read An Article That Lists The Following Command: Dd If=/dev/fdo Bs=512 Of=/new What Does This Accomplish?
The dd command is a special copy command regularly used for floppy disks and tapes. The if= alternative specifies the source; the bs= is the block length; and the of= alternative is the output.
Question 100. You Attempt To Delete A File Called Sales.Mem Using The Rm Command But The Command Fails. What Could Be The Problem?
In order to delete a file, you have to have write rights to the directory containing the report.
Question one zero one. You Want To Search For Sale And Sales. What Regular Expression Should You Use?
Use the asterick (*) to fit to 0 or more characters. The ‘$‘ fits to any individual person so sale$ could now not locate sale.
Question 102. You Want To Know How Many Lines In The Kickoff File Contains 'prize'. Which Of The Following Commands Will Produce The Desired Results?
Using the -c choice with the grep command will show the full range of traces containing the desired pattern in preference to showing the traces containing the sample.
Question 103. You Want To Verify Which Lines In The File Kickoff Contain 'bob'. Which Of The Following Commands Will Accomplish This?
The -n choice when used with sed prints best the lines containing the pattern. In this case, the pattern is ‘Bob’ and the record to be searched is kickoff.
Question 104. You Have A File Called Docs.Z But Do Not Know What It Is. What Is The Easiest Way To Look At The Contents Of The File?
The .Z extension indicates that that is a document that has been compressed the use of the compress software. The zcat software provides the ability to display the contents of a compressed report.
Question one hundred and five. After Copying A File To A Floppy Disk, What Should You Do Before Removing The Disk?
If you do not unmount the floppy earlier than putting off it, the files at the floppy may also grow to be corrupted.
Question 106. You Have Set Quotas For All Your Users But Half Of Your Users Are Using More Space Than They Have Been Allotted. Which Of The Following Could Be The Problem?
Quotas are set on a partition by using partition basis. If your users have home directories on unique partitions, you'll need to configure quotas for every partition.
Question 107. What Command Should You Use To Check The Number Of Files And Disk Space Used And Each User's Defined Quotas?
The repquota command is used to get a file at the status of the quotas you have got set inclusive of the amount of allocated area and amount of used area.
Question 108. You Have A Large Spreadsheet Located In The /data Directory That Five Different People Need To Be Able To Change. How Can You Enable Each User To Edit The Spreadsheet From Their Individual Home Directories?
By creating a hyperlink to the document in each person’s domestic directory, each person is capable of without problems open and edit the spreadsheet. Also, any changes which might be made are visible through all of the users with get entry to.
Question 109. You Have A File Called Sales Data And Create Symbolic Links To It In Bob's Home Directory. Bob Calls You And Says That His Link No Longer Works. How Can You Fix The Link?
Because the hyperlink in bob’s listing is a symbolic hyperlink, if the report sales records inside the /information directory is deleted, the symbolic link will not work.
Question a hundred and ten. What Is Meant By Sticky Bit?
When the sticky bit is about on a international writable listing, most effective the proprietor can delete any record contained in that listing.
Question 111. Your Default Umask Is 002. What Does This Mean?
The digits of your umask constitute owner, organization and others in that order.
The zero gives read and write for documents and the two offers study only for documents.
Question 112. Which Of The Following Commands Will Replace All Occurrences Of The Word Rate With The Word Speed In The File Racing?
When the usage of sed to do a search and update, its default action is to most effective update the first prevalence in every line. Adding the ‘g’ makes sed replace all occurrences of the search term even if it happens multiple times on the same line.
Question 113. You Have A Tab Delimited File Called Phonenos And Want To Change Each Tab To Four Spaces. What Command Can You Use To Accomplish This?
By default, increase converts tabs to 8 spaces. Use the -t choice to exchange this conduct.
Question 114. You Issue The Command Head * What Would The Resulting Output Be?
If the range of lines to show is not specified, the first ten lines of the desired report are displayed. The asterick tells head to display the content material of each record in the gift working directory.
Question a hundred and fifteen. What Text Filter Can You Use To Display A Binary File In Octal Numbers?
The od text filter out will dumpt the contents of a file and display it in 2-byte octal numbers.
Question 116. What Would Be The Result Of The Command Paste -s Dog Cat?
The paste text filter generally joins two files separating the corresponding lines with a tab. The -s option, but, will cause paste to display the primary document, canine, then a new line individual, and then the report cat.
Question 117. You Wish To Print The File Vacations With 60 Lines To A Page. Which Of The Following Commands Will Accomplish This?
The default page length whilst using pr is sixty six strains. The -l alternative is used to specify a distinct length.
Question 118. What Would Be The Result Of Issuing The Command Cat Phonenos?
The tac textual content clear out is a reverse cat. It displays a record beginning with the last line and ending with the primary line.
Question 119. You Need To See The Last Fifteen Lines Of The Files Dog, Cat And Horse. What Command Should You Use?
The tail utility presentations the stop of a file. The -15 tells tail to show the remaining fifteen lines of each distinct report.
Question one hundred twenty. What Is The Real Mean Of Dhcp?
Dynamic addressing simplifies community management because the s/w maintains song of IP addresses rather than requiring an administrator to manage the project. That way new laptop can be added to the community with none risk of manually assigning precise IP cope with.
Question 121. What Is Nfs? What Is Its Job?
NFS stands for Network File System. NFS enables filesystems physically residing on one laptop gadget to be used by different computer systems in the community, appearing to users on the far flung host as simply some other local disk.
Question 122. In Linux Os, What Is The File Server?
The record server is a gadget that shares its disk storage and documents with other machines at the community.
Question 123. What Are The Techniques That You Use To Handle The Collisions In Hash Tables?
We can use primary techniques to handle the collisions. They are open addressing and separate chaining. In open addressing, data objects that hash to a full array cellular are located in any other cellular inside the array. In separate chaining, each array detail consists of a connected listing. All statistics objects hashing to a given array index are inserted in that listing.
Question 124. What Is The Major Advantage Of A Hash Table?
The primary benefit of a hash table is its pace. Because the hash feature is to take a range of key values and rework them into index values in this kind of manner that the important thing values are dispensed randomly throughout all of the indices of a hash table.
Question one hundred twenty five. What Is Write Command?
The write command allows you to write an real message on the other terminal on-line. You need to problem the write command with the login ID of the consumer with whom you need to communicate. The write command informs the person at the opposite give up that there is a message from every other consumer. Write pastes that message onto the other consumer’s terminal if their terminal’s write permissions are set. Even if they may be inside the center of an edit session, write overwrites something is on the screen. The edit consultation contents are not corrupted; you may restore the unique display screen on maximum editors with Ctrl-L. Write is by and large used for one-manner verbal exchange, but you can have an actual conversation as properly.
Question 126. Why You Shouldn't Use The Root Login?
The root login does now not restrict you in any way. When you log in as root, you come to be the device. The root login is also now and again referred to as the incredible user login. With one easy command, issued either on motive or by means of coincidence, you can wreck your whole Linux installation. For this cause, use the foundation login simplest whilst essential. Avoid experimenting with instructions whilst you do log in as root.
Question 127. How Big Should The Swap-space Partition Be?
Swap space is used as an extension of physical RAM, the greater RAM you have, the less switch area is required. You can upload the quantity of switch space and the amount of RAM collectively to get the quantity of RAM Linux will use. For instance, when you have 8MB of RAM in your system’s motherboard, and a 16MB change-space partition, Linux will behave as though you had 24MB of total RAM.
Question 128. Which Field Is Used To Define The User's Default Shell?
command-The remaining field, known as both command or login command, is used to specify what shell the user will use whilst he logs in.
Question 129. When You Create A New Partition, You Need To Designate Its Size By Defining The Starting And Ending?
cylinders-When developing a brand new partition you ought to first specify its beginning cylinder. You can then both specify its size or the ending cylinder.
Question 130. What Can You Type At A Command Line To Determine Which Shell You Are Using?
echo $SHELL-The name and path to the shell you're using is saved to the SHELL environment variable. You can then use the echo command to print out the fee of any variable via previous the variable’s name with $. Therefore, typing echo $SHELL will display the name of your shell.
Question 131. In Order To Display The Last Five Commands You Have Entered Using The Fc Command, You Would Type?
fc -5-The fc command may be used to edit or rerun commands you have formerly entered. To specify the wide variety of commands to listing, use -n.
Question 132. What Command Should You Use To Check Your File System?
fsck-The fsck command is used to check the integrity of the document device for your disk.
Question 133. What File Defines The Levels Of Messages Written To System Log Files?
kernel.H-To decide the diverse degrees of messages that are defined for your gadget, look at the kernel.H record.
Question 134. What Account Is Created When You Install Linux?
root-Whenever you put in Linux, simplest one person account is created. This is the fantastic user account also called root.
Question 135. What Daemon Is Responsible For Tracking Events On Your System?
Syslogd-The syslogd daemon is liable for tracking gadget statistics and saving it to specified log flies.
Question 136. Where Standard Output Is Usually Directed?
To the display or display-By default, your shell directs preferred output for your screen or show.
Question 137. What Utility Can You Use To Show A Dynamic Listing Of Running Processes?
Top-The pinnacle software shows a list of all strolling methods that is dynamically updated.
Question 138. Who Owns The Data Dictionary?
The SYS person owns the statistics dictionary. The SYS and SYSTEM customers are created whilst the database is created.
Question 139. What Command Can You Use To Review Boot Messages?
The dmesg command shows the machine messages contained inside the kernel ring buffer.
By the use of this command at once after booting your pc, you may see the boot messages.
Question one hundred forty. What Is The Minimum Number Of Partitions You Need To Install Linux?
Linux may be mounted on walls, one as / as a way to contain all files and a change partition.
Question 141. What Is The Name And Path Of The Main System Log?
By default, the main gadget log is /var/log/messages.
Question 142. What Utility Can You Use To Automate Rotation Of Logs?
The logrotate command can be used to automate the rotation of various logs.
Question 143. What Key Combination Can You Press To Suspend A Running Job And Place It In The Background?
Using ctrl-z will droop a activity and put it within the historical past.
Question one hundred forty four. What Command Is Used To Remove The Password Assigned To A Group?
The gpasswd command is used to change the password assigned to a collection. Use the -r option to take away the password from the institution.
Question one hundred forty five. In Order To Improve Your System's Security You Decide To Implement Shadow Passwords. What Command Should You Use?
The pwconv command creates the file /and so on/shadow and adjustments all passwords to 'x' within the /and many others/passwd report.
Question 146. What Command Should You Use To Check The Number Of Files And Disk Space Used And Each User's Defined Quotas?
The repquota command is used to get a document at the reputation of the quotas you've got set along with the quantity of allocated area and quantity of used space.
Question 147. You Have A File Called Phonenos That Is Almost 4,000 Lines Long. What Text Filter Can You Use To Split It Into Four Pieces Each 1,000 Lines Long?
The cut up text filter will divide files into equally sized portions. The default length of each piece is 1,000 strains.
Question 148. You Want To Create A Compressed Backup Of The Users' Home Directories. What Utility Should You Use?
You can use the z modifier with tar to compress your archive at the identical time as developing it.
Question 149. You Wish To Restore The File Memo.Ben Which Was Backed Up In The Tarfile Mybackup.Tar. What Command Should You Type?
This command uses the x switch to extract a file. Here the file memo.Ben will be restored from the tarfile MyBackup.Tar.
Question 150. Where Is Standard Output Usually Directed?
By default, your shell directs general output in your screen or display.