HP Global e-Business Operations
Kedia Organisation Interview Questions and Answers
Q1. How to add user and create directory in Linux?
To add a user and create a directory in Linux, you can use the 'useradd' command to create the user and 'mkdir' command to create the directory.
Use the 'useradd' command followed by the username to create a new user. For example: 'useradd john'
To create a directory, use the 'mkdir' command followed by the directory name. For example: 'mkdir /home/john'
You can also specify additional options with the 'useradd' command, such as setting the user's home directory or assigning a s...read more
Q2. How to give permission to directory and file?
To give permission to a directory and file, you can use the chmod command in Linux or the Set-ACL command in Windows.
In Linux, use the chmod command followed by the permission code and the directory/file name.
In Windows, use the Set-ACL command followed by the directory/file name and the desired permissions.
Permission codes in Linux include read (r), write (w), and execute (x) for owner, group, and others.
In Windows, permissions can be granted to users or groups with specific...read more
Q3. How to give ip and see ip address
To give and see IP address, use the command 'ipconfig' on Windows or 'ifconfig' on Linux/Mac.
On Windows, open Command Prompt and type 'ipconfig'. Look for 'IPv4 Address' under the network adapter you're interested in.
On Linux/Mac, open Terminal and type 'ifconfig'. Look for 'inet' or 'inet addr' under the network adapter you want to check.
Alternatively, you can use the 'hostname -I' command on Linux/Mac to quickly see the IP address.
If you want to see the public IP address of...read more
Q4. What is port number of telne,sshd
The port number of telnet is 23 and the port number of sshd is 22.
The port number of telnet is 23.
The port number of sshd (Secure Shell Daemon) is 22.
Q5. Where is locate user's password in linux
The user's password in Linux is stored in the /etc/shadow file.
The /etc/shadow file contains the encrypted passwords for all the users on the system.
Each line in the /etc/shadow file represents a user and their password information.
The password field in the /etc/shadow file contains the encrypted password.
The password is stored in a hashed format to enhance security.
Only the root user or users with sufficient privileges can access the /etc/shadow file.
Q6. How many run level in Linux?
There are 7 run levels in Linux.
Run levels are numbered from 0 to 6 in Linux.
Each run level has a specific purpose and defines the state of the system.
Run level 0 is used for system shutdown, while run level 6 is used for system reboot.
Run level 1 is known as the single-user mode, used for system maintenance and troubleshooting.
Run levels 2 to 5 are multi-user modes with different configurations.
Run level 3 is typically the default multi-user mode with a command-line interfac...read more
Q7. How to rename directory?
To rename a directory, use the 'mv' command followed by the current directory name and the desired new name.
Use the 'mv' command followed by the current directory name and the desired new name
Make sure you have the necessary permissions to rename the directory
If the directory is located in a different location, provide the full path to the directory
Top System Administrator Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month