Operating Systems
Top 250 Operating Systems Interview Questions and Answers 2024
250 questions found
Updated 11 Dec 2024
Q1. What do you mean by Linux? Explain its features.
Linux is an open-source operating system known for its stability, security, and flexibility.
Linux is a Unix-like operating system that was developed as a free and open-source software.
It provides a stable and secure environment for running applications and services.
Linux supports a wide range of hardware architectures and has a large community of developers and users.
It offers a command-line interface, as well as various graphical user interfaces.
Linux is highly customizable ...read more
Q2. What is your knowledge about windows and Linux based servers
I have extensive knowledge of both Windows and Linux based servers.
I am proficient in managing and configuring Windows Server operating systems.
I have experience in setting up and maintaining Linux servers, including Ubuntu, CentOS, and Red Hat.
I am familiar with server virtualization technologies like VMware and Hyper-V.
I have knowledge of server security best practices and can implement firewall rules and access controls.
I am skilled in troubleshooting server issues and opt...read more
Q3. What is Active Directory? How do we manage role from active directory
Active Directory is a Microsoft service that manages network resources and user access.
Active Directory is used to manage user accounts, computers, and other network resources.
It allows for centralized authentication and authorization for users and computers in a network.
Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.
Examples of roles that can be managed through Active Directory include domain administrators,...read more
Q4. Do you know what is BSOD and how to resolve it?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.
BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.
It is usually caused by hardware or driver issues, software conflicts, or system file corruption.
To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.
Examples...read more
Q5. Differentiate between a process and a thread
A process is an instance of a program while a thread is a subset of a process.
A process has its own memory space while threads share memory space
Processes are heavyweight while threads are lightweight
Processes communicate through inter-process communication while threads communicate through shared memory
Examples of processes include web browsers, text editors, etc. while examples of threads include GUI updates, background tasks, etc.
Q6. what is modern and classic folder?
Modern and Classic folders are two different types of folders in UiPath Orchestrator.
Modern folders are designed for multi-tenancy and allow for more granular control over permissions and access.
Classic folders are the traditional folders in Orchestrator and are used for single-tenancy.
Modern folders have a different user interface and are organized by tenants, while classic folders are organized by folders and subfolders.
Modern folders also have additional features such as t...read more
Q7. How do you give all rwx permissions to a file ? How do you search for a specific text in a file ?
To give all rwx permissions to a file, use chmod 777 filename. To search for specific text in a file, use grep 'text' filename.
To give all rwx permissions to a file, use the chmod command followed by 777 and the filename.
Example: chmod 777 myfile.txt
To search for specific text in a file, use the grep command followed by the text and the filename.
Example: grep 'hello' myfile.txt
Q8. Define Threads and why we use it ??
Threads are lightweight processes that allow multiple tasks to run concurrently within a single program.
Threads are used to achieve multitasking and improve the performance of a program.
They allow multiple parts of a program to execute simultaneously.
Threads share the same memory space and resources of a process.
They can be used for parallel processing, handling multiple user requests, and improving responsiveness.
Examples of using threads include web servers handling multipl...read more
Operating Systems Jobs
Q9. What is a deadlock? How to know if a deadlock is present?
A deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Deadlocks occur when two or more processes are blocked and unable to continue executing.
To detect a deadlock, look for circular wait, hold and wait, no preemption, and mutual exclusion.
Examples of deadlocks include a printer that is waiting for a user to replace the paper tray, or two trains that are stuck on the same track waiting for each ...read more
Q10. What is structure padding and why it happens?
Structure padding is the insertion of unused bytes between members of a structure to align the data in memory.
Padding is added to ensure that each member of the structure is aligned to a memory address that is a multiple of its size.
Padding can be compiler-dependent and can vary based on the target architecture.
Padding can affect the size of the structure and the performance of the program.
Example: struct MyStruct { char a; int b; char c; }; - padding will be added between a ...read more
Q11. Why the os is installed in c drive only and why not in d or e or f......
OS is installed in C drive due to historical reasons and system requirements.
C drive is the default location for OS installation due to historical reasons.
Some system files and programs require installation in the C drive for proper functioning.
Changing the default installation location can cause compatibility issues and errors.
However, users can choose to install programs and files in other drives.
Partitioning the hard drive can also help in managing space and organizing fil...read more
Q12. Design Memory allocator for user space programs like malloc.
Design a memory allocator for user space programs like malloc.
The allocator should manage memory efficiently and avoid fragmentation.
It should support multiple threads and handle concurrent requests.
Consider using techniques like buddy allocation or slab allocation.
Implement features like memory alignment and garbage collection.
Test the allocator thoroughly to ensure correctness and performance.
Q13. Difference between a semaphore and mutex
Semaphore is used to control access to a resource with limited capacity while mutex is used to synchronize access to a shared resource.
Semaphore allows multiple threads to access a resource simultaneously up to a certain limit while mutex allows only one thread to access a shared resource at a time.
Semaphore can be used to solve the producer-consumer problem while mutex can be used to solve the critical section problem.
Semaphore can be binary or counting while mutex is always...read more
Q14. What is LVM why we use LVM
LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.
LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.
It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.
LVM enables dynamic allocation of storage space, making it easier to add or remove storage devices without disrupting the system.
It allows ...read more
Q15. Explain threading and how to implement multithreading
Threading is a technique to execute multiple tasks concurrently. Multithreading can be implemented using threads.
Threading allows multiple tasks to run concurrently, improving performance and responsiveness.
Threads are lightweight processes that share the same memory space.
Threads can be created using programming languages like Java, C++, or Python.
Multithreading can be implemented by creating and managing multiple threads within a program.
Thread synchronization techniques li...read more
Q16. What is the command to search a file like test.txt in linux?
The command to search a file like test.txt in Linux is 'grep'.
Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.
For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.
Q17. Wat are the causes of a blue screen error
A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.
Hardware issues like faulty RAM or overheating can cause blue screen errors.
Driver conflicts occur when incompatible or outdated drivers are installed.
Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.
Q18. What is BSOD, how do you resolve.
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.
BSOD is caused by hardware or software issues
To resolve, try restarting the computer
Check for any recent hardware or software changes
Run a virus scan and update drivers
If problem persists, seek professional help
Q19. How to kill process in rhel 7.2
To kill a process in RHEL 7.2, use the 'kill' command followed by the process ID.
Identify the process ID using 'ps' command
Use 'kill' command followed by the process ID to terminate the process
Use 'kill -9' command to force kill the process if it doesn't respond to regular kill command
Q20. Give a few technical differences between Windows and UNIX
Windows and UNIX have several technical differences.
Windows has a graphical user interface (GUI) while UNIX is primarily command-line based.
Windows uses the NTFS file system while UNIX typically uses the ext4 file system.
Windows supports a wide range of software applications, while UNIX is known for its stability and security.
Windows has a larger user base and is more commonly used for personal computers, while UNIX is popular for servers and high-performance computing.
Window...read more
Q21. what is binder in android?
Binder is a mechanism for inter-process communication in Android.
Binder allows different processes to communicate with each other.
It is used for implementing Android's IPC (Inter-Process Communication) system.
Binder uses a client-server model where the client sends requests to the server and the server responds with the requested data.
It is used for sharing data between different components of an Android application.
Binder is implemented using kernel-level drivers and user-le...read more
Q22. What is the command to check profile consistency in Linux?
The command to check profile consistency in Linux is 'saproot.sh'.
The 'saproot.sh' command checks the consistency of SAP profiles in Linux.
It can be run as the 'root' user or with 'sudo'.
The output of the command shows any inconsistencies in the profiles.
The command can be used to troubleshoot issues related to SAP profiles.
Q23. What is boot.properties file
The boot.properties file is a configuration file used by middleware applications to store username and password credentials.
The boot.properties file is typically found in the domain directory of a middleware application.
It is used to store the username and password credentials required for the application to start up.
The file is encrypted to protect the sensitive information stored within it.
It allows for automatic authentication during the startup process, eliminating the ne...read more
Q24. what is a Kernel in OS
Kernel is the core component of an operating system that manages system resources and provides a bridge between hardware and software.
Kernel is responsible for managing memory, processes, and device drivers.
It provides an interface for applications to access hardware resources.
Kernel operates in privileged mode and has direct access to the hardware.
Examples of popular kernels are Linux kernel, Windows NT kernel, and macOS kernel.
Q25. Define Process &thread
Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.
A process is a program in execution
A process can have multiple threads
Threads share the same memory space as the process
Threads can run concurrently with other threads within the same process
Examples of processes include web browsers, word processors, and media players
Examples of threads include GUI thread, network thread, and background thread
Q26. How create a user in single line commands
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
Q27. What's the basic requirements for a windows 10 operating system?
The basic requirements for a Windows 10 operating system include a compatible processor, sufficient memory, and available storage space.
Processor: 1 GHz or faster processor or SoC
Memory: 1 GB for 32-bit or 2 GB for 64-bit
Storage: 16 GB for 32-bit OS or 20 GB for 64-bit OS
Display: 800x600 resolution
Graphics: DirectX 9 or later with WDDM 1.0 driver
Internet connection: Required for updates and downloads
Q28. What is scheduling? List different types of scheduling
Scheduling is the process of allocating resources to tasks based on priority and availability.
Different types of scheduling include: preemptive and non-preemptive scheduling, round-robin scheduling, priority scheduling, and deadline scheduling.
Preemptive scheduling allows higher priority tasks to interrupt lower priority tasks, while non-preemptive scheduling does not.
Round-robin scheduling allocates a fixed time slice to each task in a cyclic manner.
Priority scheduling assig...read more
What is the difference between a mutex and a semaphore
A mutex is a binary semaphore used for mutual exclusion, while a semaphore is a generalized synchronization primitive.
Mutex is used to protect a critical section of code, allowing only one thread to access it at a time.
Semaphore is used to control access to a shared resource, allowing multiple threads to access it simultaneously.
Mutex has ownership, meaning the thread that locks it must unlock it.
Semaphore does not have ownership, meaning any thread can release it.
Mutex is ty...read more
Q30. Difference between Windows7 and Windows XP?
Windows 7 is a newer version of Windows than XP, with improved features and security.
Windows 7 has a more user-friendly interface
Windows 7 has better security features, such as BitLocker encryption
Windows 7 supports newer hardware and software
Windows 7 has improved performance compared to XP
Windows 7 has a built-in virtual assistant, Cortana, which XP does not have
Q31. Major difference between windows server 2008 and windows server 2012
Windows Server 2008 and Windows Server 2012 have several major differences.
Windows Server 2012 introduced a new user interface called Metro UI, while Windows Server 2008 uses the traditional Windows interface.
Windows Server 2012 has improved virtualization capabilities with features like Hyper-V 3.0, while Windows Server 2008 has an older version of Hyper-V.
Windows Server 2012 includes improved storage features such as Storage Spaces and SMB 3.0, which are not available in Wi...read more
Q32. Do you how to create and manage Users and Groups?
Yes, I know how to create and manage Users and Groups.
To create a user, use the appropriate command or tool provided by the operating system or directory service.
To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.
To create a group, use the command or tool provided by the operating system or directory service.
To manage groups, you can add or remove members, assign permissions, and modify group properties.
Exampl...read more
Q33. What are the basic functions of OS?
OS functions include managing hardware resources, providing user interface, and running applications.
Managing hardware resources such as CPU, memory, and storage
Providing user interface for interaction with the computer
Running applications and managing processes
Managing file systems and data storage
Providing security and access control
Managing network connections and communication
Performing system updates and maintenance
Handling errors and system crashes
Virtualization and con...read more
Q34. How will you take backup from hard drive if OS get corrupted? How to backup C drive Data?
To backup data from a corrupted OS, connect the hard drive to another computer and use backup software or manually copy the files.
Remove the hard drive from the affected computer
Connect the hard drive to another computer using an external enclosure or adapter
Use backup software to create a backup of the data on the C drive
Alternatively, manually copy the important files and folders from the C drive to another storage device
Q35. how do you achieve synchronization? what are the differences between the synchronization ways?
Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.
Synchronization can be achieved using techniques like locks, semaphores, and monitors.
Locks are used to ensure that only one thread can access a shared resource at a time.
Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.
Monitors are used to ensure that only one thread can execute a critical ...read more
Q36. How to delete CTL and ITL files from phone.
To delete CTL and ITL files from a phone, access the phone's settings, navigate to the security or device administration section, and delete the files.
Access the phone's settings
Navigate to the security or device administration section
Locate the CTL and ITL files
Delete the files
Q37. what is virtual memory? Will we need virtual memory even if we have infinite amount of RAM?
Virtual memory is a memory management technique that allows a computer to use more memory than it physically has.
Virtual memory uses a combination of RAM and hard disk space to store data.
It allows programs to use more memory than is physically available.
If a program tries to access memory that is not currently in RAM, it will be swapped in from the hard disk.
Even if we had infinite RAM, virtual memory would still be necessary for certain tasks such as memory isolation and pr...read more
Q38. What is Operating System (os)?
An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs.
OS acts as an interface between the user and the computer hardware.
It manages the computer's memory and processes.
Examples of OS include Windows, macOS, Linux, Android, and iOS.
Q39. What is Paging in OS ?
Paging is a memory management technique used by OS to store and retrieve data from secondary storage.
It divides the memory into fixed-size pages and stores data in these pages.
It allows efficient use of memory by swapping out less frequently used pages to disk.
It reduces fragmentation and improves memory utilization.
Examples include Windows Virtual Memory and Linux Swap Space.
Q40. How to do os install
OS installation involves creating a bootable media and following the installation wizard.
Create a bootable media (USB/DVD)
Insert the media and restart the computer
Boot from the media and follow the installation wizard
Select the language, time zone, and keyboard layout
Choose the installation type (upgrade or clean install)
Select the partition to install the OS
Wait for the installation to complete
Enter the product key and activate the OS
Install drivers and necessary software
Q41. how do you delete last 30 days logs in tomcat by using shell script
Deleting last 30 days logs in Tomcat using shell script
Use find command to locate files older than 30 days
Use xargs command to pass the file names to rm command
Use crontab to schedule the script to run periodically
Q42. What is Linux, how will you add the commands
Linux is an open-source operating system based on Unix. Commands can be added using the terminal or by installing packages.
Linux is free and can be customized to suit specific needs
Commands can be added using the terminal by creating a script or alias
Packages can be installed using package managers like apt-get or yum
Examples of commands include ls, cd, mkdir, rm, etc.
Q43. What is a cronjob?
A cronjob is a scheduled task that runs automatically at specified intervals.
Cronjobs are commonly used in web development to automate tasks such as database backups or sending emails.
They are set up using a cron expression, which specifies the frequency and timing of the task.
Cronjobs can be managed through the command line or a web-based interface.
Examples of cronjobs include running a script to update website content every hour or sending a weekly newsletter to subscribers...read more
Q44. How to rollback Patches trough Yum
To rollback patches through Yum, use the yum history command and the yum history undo command.
Use the 'yum history' command to view the history of installed packages and patches.
Identify the transaction ID of the patch you want to rollback.
Use the 'yum history undo
' command to rollback the patch. Confirm the rollback by reviewing the output and checking the system's package status.
Q45. Ways of upgrading ESXi patch
ESXi patch can be upgraded using vSphere Update Manager, ESXCLI command-line tool, or manually.
vSphere Update Manager can be used to upgrade ESXi patches
ESXCLI command-line tool can also be used to upgrade ESXi patches
Manual upgrade can be done by downloading the patch from VMware website and installing it using ESXi Shell or SSH
Q46. Which Linux commands you have used on daily basis??
I have used various Linux commands on a daily basis.
ls - to list files and directories
cd - to change directories
grep - to search for specific text in files
tail - to view the end of a file
ps - to view running processes
kill - to terminate a process
chmod - to change file permissions
ssh - to connect to remote servers
scp - to transfer files between servers
tar - to archive and compress files
Q47. what type of operating system in apple phone
The operating system in Apple phones is iOS.
iOS is a mobile operating system developed by Apple Inc.
It is the second most popular mobile operating system in the world.
iOS is known for its user-friendly interface and security features.
Examples of Apple phones that run on iOS are iPhone 12, iPhone 11, and iPhone SE.
Q48. How to take backup via tar utility
Tar utility is used to create backups by compressing files and directories.
To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.
Specify the files or directories to be included in the backup.
Use the '-cvf' options to create a new tar archive file.
Specify the name of the archive file to be created.
To compress the backup, use the '-z' option for gzip compression or '-j' option for bzip2 compression.
To extract files from a tar back...read more
Q49. Difference between various operating systems.
Operating systems differ in their user interface, functionality, and compatibility with hardware and software.
Windows is the most widely used OS, known for its user-friendly interface and compatibility with most software.
MacOS is known for its sleek design and compatibility with Apple hardware and software.
Linux is an open-source OS with various distributions, known for its customization and security features.
Android is a mobile OS based on Linux, used in smartphones and tabl...read more
Q50. What is difference between OST
OST stands for Offline Storage Table and is a file format used by Microsoft Outlook to store offline copies of email messages.
OST is a file format used by Microsoft Outlook for offline access to email messages.
OST files are created when Outlook is configured to use Cached Exchange Mode.
OST files allow users to access their email, calendar, and contacts even when not connected to the Exchange server.
Changes made to OST files while offline are synchronized with the Exchange ser...read more
Q51. Give the full form of BIOS
BIOS stands for Basic Input/Output System.
BIOS is a firmware that initializes hardware during the boot process.
It provides a low-level interface between the hardware and the operating system.
BIOS settings can be accessed and modified through a setup utility.
BIOS can be updated to fix bugs or add new features.
Examples of BIOS manufacturers include AMI, Phoenix, and Award.
Q52. What is the standard code of pipe
The standard code of pipe refers to the set of regulations and specifications that govern the design, construction, and use of pipes in various industries.
The standard code of pipe varies depending on the industry and the type of pipe being used.
For example, in the oil and gas industry, the American Petroleum Institute (API) provides standards for pipes used in drilling and production operations.
In the construction industry, the American Society for Testing and Materials (AST...read more
Q53. What is virtualization and why do we need it?
Virtualization is the creation of a virtual version of something, such as an operating system, server, storage device, or network resource.
Virtualization allows multiple operating systems or applications to run on a single physical machine, increasing efficiency and reducing costs.
It enables better utilization of hardware resources and provides flexibility in managing and deploying IT infrastructure.
Examples include VMware, Hyper-V, and VirtualBox.
Virtualization can also impr...read more
Q54. What is RTOS and Difference between RTOS and normal OS
RTOS stands for Real-Time Operating System. It is designed to handle time-sensitive tasks and has a deterministic response time.
RTOS is used in applications where timing is critical, such as aerospace and automotive industries.
RTOS has a predictable response time, whereas normal OS may have varying response times.
RTOS is designed to handle tasks with strict deadlines and priorities.
RTOS typically has a smaller footprint and lower overhead than normal OS.
Examples of RTOS inclu...read more
Q55. What are different interrupts?
Interrupts are signals sent to the processor to temporarily halt its current task and execute a specific task.
Hardware interrupts - generated by external devices
Software interrupts - generated by software programs
Maskable interrupts - can be disabled by the processor
Non-maskable interrupts - cannot be disabled by the processor
Examples - keyboard input, mouse input, timer interrupts, etc.
Q56. 1. What is BSOD error and how to resolve 2. How to resolve outlook not responding error
BSOD error is a blue screen error that occurs in Windows. Outlook not responding error can be resolved by repairing the installation or creating a new profile.
BSOD error is caused by hardware or software issues
To resolve BSOD error, try updating drivers, checking hardware components, or performing a system restore
Outlook not responding error can be resolved by repairing the installation or creating a new profile
To repair Outlook installation, go to Control Panel > Programs an...read more
Q57. what happens when you delete files in Linux
When files are deleted in Linux, they are not immediately removed from the disk but rather marked as available for reuse.
Deleting a file in Linux removes its entry from the file system's directory structure.
The file's data blocks are not immediately erased but are marked as available for reuse.
The file's inode, which contains metadata about the file, is also marked as available for reuse.
Until the space occupied by the deleted file is overwritten by new data, it can potential...read more
Q58. What is concurrency and formula of it?
Concurrency is the number of tasks that can be executed simultaneously in a system.
Concurrency is important in real-time analysis to ensure that the system can handle the workload.
Formula for concurrency is: Concurrency = (Total workload in seconds) / (Average handling time in seconds)
For example, if the total workload is 3600 seconds and the average handling time is 10 seconds, then the concurrency would be 360.
Concurrency can be increased by optimizing system resources and ...read more
Q59. Tell me process of booting
Booting is the process of starting a computer and loading the operating system into memory.
When the computer is turned on, the BIOS (Basic Input/Output System) performs a Power-On Self Test (POST)
The BIOS then searches for a bootable device, such as a hard drive or CD-ROM
Once a bootable device is found, the BIOS loads the boot loader, which is responsible for loading the operating system
The boot loader then loads the kernel, which initializes the operating system and starts t...read more
Q60. what is the difference between zombie and orphan?
Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.
Zombie process is waiting for its parent to read its exit status
Orphan process is adopted by init process (PID 1)
Zombie process can be removed by killing its parent process
Orphan process can continue running even after its parent has terminated
Q61. explain what is deadloacks and ways to prevent them
Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlocks occur when multiple processes are stuck in a circular waiting state.
Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.
Examples of prevention techniques are using a resource allocation graph, implementing a banker's algorithm, and employing timeouts and resource preemption.
Q62. How can troubleshoot the system when system restarting continuously
To troubleshoot a system that is restarting continuously, you can follow these steps:
Check for hardware issues such as overheating or faulty components
Verify if any recent software or driver updates have caused the issue
Examine the system logs for any error messages or patterns
Test the system in safe mode to determine if a third-party application is causing the problem
Perform a system restore to a previous stable state
Scan for malware or viruses that may be affecting the syst...read more
Q63. How to do windows system installation
Windows system installation involves preparing installation media, booting from it, following prompts, and configuring settings.
Prepare installation media (e.g. USB, DVD)
Boot from the installation media
Follow the prompts to select language, edition, and installation type
Configure settings like disk partitioning, username, and password
Wait for the installation to complete
Install necessary drivers and software
Update the system with the latest patches and security updates
Q64. What is system ?
A system is a collection of interconnected components that work together to achieve a common goal.
A system is made up of multiple parts or components.
These components are interconnected and interact with each other.
The components work together to achieve a common goal or purpose.
Examples of systems include computer systems, transportation systems, and ecological systems.
Q65. Explain about android architecture system.
Android architecture system is a layered architecture consisting of four main layers.
The four main layers are Linux kernel, native libraries, application framework, and applications.
The Linux kernel provides low-level hardware abstraction and security.
Native libraries are written in C or C++ and provide access to hardware-specific features.
Application framework provides high-level services such as activity management, resource management, and content providers.
Applications ar...read more
Q66. What's the difference between cp and pp
cp and pp are both commands in Unix-like operating systems, but they have different functionalities.
cp stands for 'copy' and is used to copy files or directories from one location to another.
pp stands for 'print and pause' and is used to print files with pagination, pausing after each page.
cp can be used to create a duplicate of a file or directory, while pp is used for printing files in a controlled manner.
Example: cp file1.txt file2.txt will create a copy of file1.txt named...read more
Q67. How many Type of file ?
There are various types of files used in mechanical fitting.
There are hand files, needle files, and machine files.
Hand files are used for general purpose filing and come in various shapes and sizes.
Needle files are used for intricate work and have a pointed end.
Machine files are used with power tools and have teeth that are cut in a specific pattern.
Other types of files include diamond files, riffler files, and rotary files.
Q68. What is safe mode
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be lower and some features may be disabled.
Safe mode is not ...read more
Q69. How to recover a guest
Recovering a guest involves addressing their concerns and providing exceptional service.
Listen actively to the guest's concerns
Apologize sincerely for any inconvenience caused
Offer a solution or alternative to resolve the issue
Provide exceptional service to exceed guest expectations
Follow up with the guest to ensure satisfaction
Q70. What is the deffirent OST and PST
OST and PST are file formats used by Microsoft Outlook to store email, contacts, and other data.
OST stands for Offline Storage Table and is used by Outlook to store a copy of mailbox data from an Exchange server.
OST files allow users to access their mailbox data even when they are not connected to the server.
PST stands for Personal Storage Table and is used by Outlook to store email, contacts, calendar items, and other data locally on a user's computer.
PST files are typically...read more
Q71. Tell me if windows show a blue screen what are the main problem in this side?
A blue screen in Windows indicates a system crash or error.
Hardware failure
Driver issues
Corrupted system files
Malware or virus infections
Overheating
Memory issues
Power supply problems
Q72. What is Gc principal
GC principal refers to the principle of gas chromatography, which involves separating and analyzing components of a mixture based on their affinity for a stationary phase and a mobile phase.
Gas chromatography (GC) is a technique used to separate and analyze volatile compounds in a mixture.
The principle of GC involves the use of a stationary phase (typically a solid or liquid) and a mobile phase (usually a gas) to separate the components of the mixture.
The components of the mi...read more
Q73. what is a interrupt latency
Interrupt latency is the time delay between the occurrence of an interrupt and the start of the routine that services the interrupt.
Interrupt latency is a critical factor in real-time systems
It can be affected by factors such as the priority of the interrupt and the current state of the processor
Reducing interrupt latency can improve system performance and responsiveness
Examples of interrupts include hardware interrupts from devices like keyboards and software interrupts from...read more
Q74. What is this command?
The command is used to display the current working directory in a command line interface.
The command is 'pwd'
It stands for 'print working directory'
It is commonly used in Unix-based systems
It helps users identify their current location in the file system
Q75. Explain priority scheduling (preemptive , non-preemptive). Explain a case when a low priority process will preempt a high priority process
Priority scheduling is a scheduling algorithm where processes are assigned priorities and executed based on their priority level.
Preemptive priority scheduling allows a higher priority process to interrupt a lower priority process that is currently running.
Non-preemptive priority scheduling allows a higher priority process to wait until the lower priority process finishes executing.
A low priority process can preempt a high priority process if the high priority process is wait...read more
Difference between Orphan and Zombie process
Orphan process is a process whose parent process has terminated, while a zombie process is a process that has completed execution but still has an entry in the process table.
Orphan process: Parent process has terminated, but the child process is still running.
Zombie process: Child process has completed execution, but the parent process has not yet collected its exit status.
Orphan processes are adopted by the init process.
Zombie processes consume system resources and should be...read more
Q77. How to check stystem logs in linux ?
To check system logs in Linux, use the command 'tail -f /var/log/syslog' or 'journalctl -f'.
Use 'tail -f /var/log/syslog' to view the system log in real-time
Use 'journalctl -f' to view the systemd journal in real-time
Use 'grep' command to filter the logs based on specific keywords
Logs are stored in /var/log directory with different file names for different services
Q78. What is the Sysvol folder? Why is it used?
The Sysvol folder is a shared folder in Windows Server that stores the server's copy of the domain's public files.
Sysvol stands for System Volume and is used in Active Directory environments.
It contains important files for the domain, such as Group Policy objects, scripts, and logon/logoff scripts.
The Sysvol folder is replicated to all domain controllers in a domain, ensuring consistency and availability of these files.
It plays a crucial role in the functioning of Active Dire...read more
Q79. What is maximum Input output handle
The maximum input output handle refers to the maximum number of inputs and outputs that a device can handle.
The maximum input output handle varies depending on the device and its specifications.
It is important to consider the maximum input output handle when selecting a device for a project.
For example, a PLC may have a maximum input output handle of 256 inputs and 256 outputs.
Another example is a microcontroller with a maximum input output handle of 40 pins.
Exceeding the max...read more
Q80. How to create bonding in linux
Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.
Install the bonding driver module
Configure the bonding interface in the network configuration file
Specify the bonding mode and options
Assign the physical interfaces to the bonding interface
Restart the network service to apply the changes
Q81. how to work DNS in Linux ? what is the record of DNS?
DNS in Linux is managed through configuration files and commands. DNS records contain information about domain names and IP addresses.
DNS in Linux is managed through the /etc/resolv.conf file which contains the IP addresses of DNS servers.
The 'nslookup' command can be used to query DNS records for a specific domain name.
DNS records include A records (IP address), MX records (mail server), CNAME records (alias), and more.
DNS caching can improve performance by storing frequentl...read more
Q82. How to reinstall drivers for any hardware?
To reinstall drivers for any hardware, follow these steps.
Uninstall the current driver from Device Manager
Download the latest driver from the manufacturer's website
Install the new driver by running the setup file
Restart the computer to complete the installation
If the driver is not available on the website, use Windows Update or a driver update tool
Ensure compatibility with the operating system and hardware version
Q83. What is a Real-Time System ?
A real-time system is a computer system that processes data as it is received and provides immediate results.
Real-time systems are used in industries such as aviation, healthcare, and finance.
They require fast response times and high reliability.
Examples include air traffic control systems, medical monitoring devices, and stock trading systems.
Q84. How will you open a file whos size is double that of RAM on your system.?
Use memory-mapped files or stream the file in chunks.
Use memory-mapped files to access the file in chunks.
Stream the file in chunks using a buffer.
Use compression techniques to reduce the file size before opening.
Q85. What is threading and how it work.
Threading is a way of achieving multitasking in a single process by dividing it into smaller threads.
Threads are lightweight processes that share the same memory space.
They can run concurrently and independently of each other.
Threading can improve performance by utilizing multiple CPU cores.
Examples of threading include GUI applications, web servers, and video games.
Q86. How to install drivers for different IO devices?
IO devices require specific drivers to be installed for proper functioning.
Identify the device and its manufacturer
Download the appropriate driver from the manufacturer's website
Run the installer and follow the on-screen instructions
Restart the computer if prompted
Verify the device is working properly in Device Manager
Q87. Is there any ideal CPU scheduling possible? Justify your answer?
No, there is no ideal CPU scheduling possible.
CPU scheduling is a complex problem with many variables.
Different scheduling algorithms are suited for different scenarios.
The ideal scheduling algorithm would depend on the specific system and workload.
For example, a real-time system would require a different scheduling algorithm than a batch processing system.
Q88. What is a hypervisor?
A hypervisor is a software or hardware component that enables the virtualization of computer hardware.
A hypervisor allows multiple operating systems to run on a single physical machine.
It provides a layer of abstraction between the physical hardware and the virtual machines.
There are two types of hypervisors: Type 1 (bare-metal) and Type 2 (hosted).
Examples of hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM.
Q89. How does a linux boot ?
Linux boot process involves several stages including BIOS, bootloader, kernel initialization, and user space initialization.
BIOS performs a power-on self-test and loads the bootloader from the boot device.
Bootloader loads the kernel into memory and initializes it.
Kernel initializes hardware, mounts the root file system, and starts the init process.
Init process starts user space processes and services.
Linux boot process can be customized by modifying bootloader configuration a...read more
Q90. How will you monitor file change in linux ?
Use inotifywait command to monitor file changes in Linux.
Install inotify-tools package
Use inotifywait command with options like -m for continuous monitoring and -e for specific events
Example: inotifywait -m /var/log/messages -e modify
Output will show the file path, event type and timestamp
Q91. What is load average? List of commands that gives you the metric.
Load average is the average number of processes in the run queue over a period of time.
Load average is a metric that measures the average number of processes that are either in a running or uninterruptable sleep state.
It is calculated over a period of time, usually 1, 5, or 15 minutes.
The load average is displayed as three numbers, which represent the load average for the past 1, 5, and 15 minutes, respectively.
Commands that give the load average metric include 'uptime', 'top...read more
What is RAID structure in OS? What are the different levels of RAID configuration?
RAID (Redundant Array of Independent Disks) is a data storage technology that combines multiple physical drives into a single logical unit.
RAID provides improved performance, fault tolerance, and increased storage capacity.
There are different levels of RAID configuration, including RAID 0, RAID 1, RAID 5, RAID 10, etc.
RAID 0 offers striping without redundancy, providing increased performance but no fault tolerance.
RAID 1 uses mirroring, where data is duplicated on multiple dr...read more
Q93. What is the system knowledge?
System knowledge refers to a comprehensive understanding of the processes, procedures, and technologies within a specific system or software.
It includes knowledge of how the system functions, its components, and their interactions.
Understanding the system's architecture, databases, and interfaces is crucial.
Knowledge of system configuration, customization, and troubleshooting is important.
Familiarity with system upgrades, integrations, and security measures is necessary.
Examp...read more
Q94. How to repair Ubuntu OS when it got corrupted?
To repair a corrupted Ubuntu OS, boot into recovery mode and use the built-in repair options.
Boot into recovery mode by holding down the Shift key during startup
Select the 'fsck' option to check and repair file system errors
Use the 'dpkg' option to fix broken packages
If all else fails, reinstall Ubuntu while preserving your personal files
Make sure to regularly backup important data to prevent data loss
Q95. Why VFS.?
VFS is a leading global outsourcing and technology services specialist.
VFS has a strong reputation in the industry for its expertise and quality of service.
VFS has a global presence, which provides opportunities for growth and exposure to different cultures and markets.
VFS offers a wide range of services and solutions, allowing for diverse and challenging work.
VFS values its employees and invests in their development and career progression.
VFS has a track record of success an...read more
Q96. How to release, renew IP in CMD?
To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.
Open Command Prompt
Type 'ipconfig /release' and press Enter to release the current IP address
Type 'ipconfig /renew' and press Enter to obtain a new IP address
You can also use 'ipconfig /all' to view detailed information about network interfaces
Q97. What are different computer platforms available?
Different computer platforms include Windows, macOS, Linux, and mobile platforms like iOS and Android.
Windows is a popular computer platform developed by Microsoft.
macOS is the operating system used on Apple computers.
Linux is an open-source platform that is widely used in servers and embedded systems.
iOS is the mobile platform used on Apple devices.
Android is the mobile platform used on a variety of devices from different manufacturers.
Q98. What is grep
grep is a command-line utility for searching text files for specific patterns.
Used to search for specific patterns in text files
Can be used with regular expressions
Can search for patterns in multiple files at once
Can be used to filter output from other commands
Q99. what is multiprocessing and multi threading
Multiprocessing is the use of multiple processors to execute multiple tasks simultaneously. Multithreading is the use of multiple threads within a single process to execute multiple tasks simultaneously.
Multiprocessing involves the use of multiple processors or cores to execute multiple tasks simultaneously.
Multithreading involves the use of multiple threads within a single process to execute multiple tasks simultaneously.
Multiprocessing is typically used for CPU-intensive ta...read more
Q100. if disk is full what will u do?
Free up disk space by identifying and removing unnecessary files.
Identify large files and delete them
Remove old log files
Clear cache and temporary files
Compress large files
Move files to another disk or server
Top Interview Questions for Related Skills
Interview Questions of Operating Systems Related Designations
Interview experiences of popular companies
Reviews
Interviews
Salaries
Users/Month