Top 250 Operating Systems Interview Questions and Answers
Updated 11 Dec 2024
Q1. What do you mean by Linux? Explain its features.
Linux is an open-source operating system known for its stability, security, and flexibility.
Linux is a Unix-like operating system that was developed as a free and open-source software.
It provides a stable and secure environment for running applications and services.
Linux supports a wide range of hardware architectures and has a large community of developers and users.
It offers a command-line interface, as well as various graphical user interfaces.
Linux is highly customizable ...read more
Q2. What is your knowledge about windows and Linux based servers
I have extensive knowledge of both Windows and Linux based servers.
I am proficient in managing and configuring Windows Server operating systems.
I have experience in setting up and maintaining Linux servers, including Ubuntu, CentOS, and Red Hat.
I am familiar with server virtualization technologies like VMware and Hyper-V.
I have knowledge of server security best practices and can implement firewall rules and access controls.
I am skilled in troubleshooting server issues and opt...read more
Q3. What is Active Directory? How do we manage role from active directory
Active Directory is a Microsoft service that manages network resources and user access.
Active Directory is used to manage user accounts, computers, and other network resources.
It allows for centralized authentication and authorization for users and computers in a network.
Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.
Examples of roles that can be managed through Active Directory include domain administrators,...read more
Q4. Do you know what is BSOD and how to resolve it?
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.
BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.
It is usually caused by hardware or driver issues, software conflicts, or system file corruption.
To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.
Examples...read more
Q5. what is modern and classic folder?
Modern and Classic folders are two different types of folders in UiPath Orchestrator.
Modern folders are designed for multi-tenancy and allow for more granular control over permissions and access.
Classic folders are the traditional folders in Orchestrator and are used for single-tenancy.
Modern folders have a different user interface and are organized by tenants, while classic folders are organized by folders and subfolders.
Modern folders also have additional features such as t...read more
Use two threads to print even and odd numbers in increasing order.
Create two threads, one for printing even numbers and one for printing odd numbers.
Use a shared variable to keep track of the current number to be printed.
Synchronize access to the shared variable to ensure correct ordering of numbers.
Use a loop in each thread to print the next number and update the shared variable.
Q7. What is a deadlock? How to know if a deadlock is present?
A deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.
Deadlocks occur when two or more processes are blocked and unable to continue executing.
To detect a deadlock, look for circular wait, hold and wait, no preemption, and mutual exclusion.
Examples of deadlocks include a printer that is waiting for a user to replace the paper tray, or two trains that are stuck on the same track waiting for each ...read more
Q8. How do you give all rwx permissions to a file ? How do you search for a specific text in a file ?
To give all rwx permissions to a file, use chmod 777 filename. To search for specific text in a file, use grep 'text' filename.
To give all rwx permissions to a file, use the chmod command followed by 777 and the filename.
Example: chmod 777 myfile.txt
To search for specific text in a file, use the grep command followed by the text and the filename.
Example: grep 'hello' myfile.txt
Operating Systems Jobs
Q9. Differentiate between a process and a thread
A process is an instance of a program while a thread is a subset of a process.
A process has its own memory space while threads share memory space
Processes are heavyweight while threads are lightweight
Processes communicate through inter-process communication while threads communicate through shared memory
Examples of processes include web browsers, text editors, etc. while examples of threads include GUI updates, background tasks, etc.
Q10. Why the os is installed in c drive only and why not in d or e or f......
OS is installed in C drive due to historical reasons and system requirements.
C drive is the default location for OS installation due to historical reasons.
Some system files and programs require installation in the C drive for proper functioning.
Changing the default installation location can cause compatibility issues and errors.
However, users can choose to install programs and files in other drives.
Partitioning the hard drive can also help in managing space and organizing fil...read more
Q11. What is LVM why we use LVM
LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.
LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.
It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.
LVM enables dynamic allocation of storage space, making it easier to add or remove storage devices without disrupting the system.
It allows ...read more
Q12. Design Memory allocator for user space programs like malloc.
Design a memory allocator for user space programs like malloc.
The allocator should manage memory efficiently and avoid fragmentation.
It should support multiple threads and handle concurrent requests.
Consider using techniques like buddy allocation or slab allocation.
Implement features like memory alignment and garbage collection.
Test the allocator thoroughly to ensure correctness and performance.
Q13. What is the command to search a file like test.txt in linux?
The command to search a file like test.txt in Linux is 'grep'.
Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.
For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.
Q14. Wat are the causes of a blue screen error
A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.
Hardware issues like faulty RAM or overheating can cause blue screen errors.
Driver conflicts occur when incompatible or outdated drivers are installed.
Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.
Q15. How to kill process in rhel 7.2
To kill a process in RHEL 7.2, use the 'kill' command followed by the process ID.
Identify the process ID using 'ps' command
Use 'kill' command followed by the process ID to terminate the process
Use 'kill -9' command to force kill the process if it doesn't respond to regular kill command
Q16. Explain threading and how to implement multithreading
Threading is a technique to execute multiple tasks concurrently. Multithreading can be implemented using threads.
Threading allows multiple tasks to run concurrently, improving performance and responsiveness.
Threads are lightweight processes that share the same memory space.
Threads can be created using programming languages like Java, C++, or Python.
Multithreading can be implemented by creating and managing multiple threads within a program.
Thread synchronization techniques li...read more
Q17. Give a few technical differences between Windows and UNIX
Windows and UNIX have several technical differences.
Windows has a graphical user interface (GUI) while UNIX is primarily command-line based.
Windows uses the NTFS file system while UNIX typically uses the ext4 file system.
Windows supports a wide range of software applications, while UNIX is known for its stability and security.
Windows has a larger user base and is more commonly used for personal computers, while UNIX is popular for servers and high-performance computing.
Window...read more
Q18. What is BSOD, how do you resolve.
BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.
BSOD is caused by hardware or software issues
To resolve, try restarting the computer
Check for any recent hardware or software changes
Run a virus scan and update drivers
If problem persists, seek professional help
Q19. What is boot.properties file
The boot.properties file is a configuration file used by middleware applications to store username and password credentials.
The boot.properties file is typically found in the domain directory of a middleware application.
It is used to store the username and password credentials required for the application to start up.
The file is encrypted to protect the sensitive information stored within it.
It allows for automatic authentication during the startup process, eliminating the ne...read more
Q20. what is binder in android?
Binder is a mechanism for inter-process communication in Android.
Binder allows different processes to communicate with each other.
It is used for implementing Android's IPC (Inter-Process Communication) system.
Binder uses a client-server model where the client sends requests to the server and the server responds with the requested data.
It is used for sharing data between different components of an Android application.
Binder is implemented using kernel-level drivers and user-le...read more
Q21. what is a Kernel in OS
Kernel is the core component of an operating system that manages system resources and provides a bridge between hardware and software.
Kernel is responsible for managing memory, processes, and device drivers.
It provides an interface for applications to access hardware resources.
Kernel operates in privileged mode and has direct access to the hardware.
Examples of popular kernels are Linux kernel, Windows NT kernel, and macOS kernel.
List of 15 Linux commands with their functions
ls - list directory contents
pwd - print working directory
cd - change directory
mkdir - make a new directory
rm - remove files or directories
cp - copy files and directories
mv - move or rename files and directories
grep - search for patterns in files
chmod - change file permissions
ps - display information about running processes
top - display and update sorted information about processes
kill - send signals to processes
tar - create or ext...read more
Q23. What's the limit of drive
The limit of drive refers to the maximum distance or duration one can drive without taking a break.
The limit of drive is typically determined by regulations and guidelines set by transportation authorities.
In many countries, there are legal limits on the number of hours a driver can continuously drive before taking a rest.
For example, in the United States, commercial truck drivers are subject to the Hours of Service regulations, which limit them to 11 hours of driving after 1...read more
Q24. What is the command to check profile consistency in Linux?
The command to check profile consistency in Linux is 'saproot.sh'.
The 'saproot.sh' command checks the consistency of SAP profiles in Linux.
It can be run as the 'root' user or with 'sudo'.
The output of the command shows any inconsistencies in the profiles.
The command can be used to troubleshoot issues related to SAP profiles.
Q25. What is scheduling? List different types of scheduling
Scheduling is the process of allocating resources to tasks based on priority and availability.
Different types of scheduling include: preemptive and non-preemptive scheduling, round-robin scheduling, priority scheduling, and deadline scheduling.
Preemptive scheduling allows higher priority tasks to interrupt lower priority tasks, while non-preemptive scheduling does not.
Round-robin scheduling allocates a fixed time slice to each task in a cyclic manner.
Priority scheduling assig...read more
Q26. Define Process &thread
Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.
A process is a program in execution
A process can have multiple threads
Threads share the same memory space as the process
Threads can run concurrently with other threads within the same process
Examples of processes include web browsers, word processors, and media players
Examples of threads include GUI thread, network thread, and background thread
Q27. How create a user in single line commands
A user can be created in a single line command using the 'useradd' command in Linux.
Use the 'useradd' command followed by the username to create a user.
Specify additional options like home directory, shell, etc. if required.
Example: useradd john -m -s /bin/bash
Q28. Print the disk show commands
The disk show commands are used to display information about disks in a data center.
Use the 'disk show' command followed by specific options to retrieve disk information
Common options include 'disk show -v' for verbose output and 'disk show -a' for all disks
Examples: 'disk show -v' to display detailed disk information, 'disk show -a' to show all disks
Q29. Difference between a semaphore and mutex
Semaphore is used to control access to a resource with limited capacity while mutex is used to synchronize access to a shared resource.
Semaphore allows multiple threads to access a resource simultaneously up to a certain limit while mutex allows only one thread to access a shared resource at a time.
Semaphore can be used to solve the producer-consumer problem while mutex can be used to solve the critical section problem.
Semaphore can be binary or counting while mutex is always...read more
Q30. Major difference between windows server 2008 and windows server 2012
Windows Server 2008 and Windows Server 2012 have several major differences.
Windows Server 2012 introduced a new user interface called Metro UI, while Windows Server 2008 uses the traditional Windows interface.
Windows Server 2012 has improved virtualization capabilities with features like Hyper-V 3.0, while Windows Server 2008 has an older version of Hyper-V.
Windows Server 2012 includes improved storage features such as Storage Spaces and SMB 3.0, which are not available in Wi...read more
Q31. How to delete CTL and ITL files from phone.
To delete CTL and ITL files from a phone, access the phone's settings, navigate to the security or device administration section, and delete the files.
Access the phone's settings
Navigate to the security or device administration section
Locate the CTL and ITL files
Delete the files
Q32. What is Paging in OS ?
Paging is a memory management technique used by OS to store and retrieve data from secondary storage.
It divides the memory into fixed-size pages and stores data in these pages.
It allows efficient use of memory by swapping out less frequently used pages to disk.
It reduces fragmentation and improves memory utilization.
Examples include Windows Virtual Memory and Linux Swap Space.
Q33. What are the basic functions of OS?
OS functions include managing hardware resources, providing user interface, and running applications.
Managing hardware resources such as CPU, memory, and storage
Providing user interface for interaction with the computer
Running applications and managing processes
Managing file systems and data storage
Providing security and access control
Managing network connections and communication
Performing system updates and maintenance
Handling errors and system crashes
Virtualization and con...read more
Q34. how do you achieve synchronization? what are the differences between the synchronization ways?
Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.
Synchronization can be achieved using techniques like locks, semaphores, and monitors.
Locks are used to ensure that only one thread can access a shared resource at a time.
Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.
Monitors are used to ensure that only one thread can execute a critical ...read more
Q35. Do you how to create and manage Users and Groups?
Yes, I know how to create and manage Users and Groups.
To create a user, use the appropriate command or tool provided by the operating system or directory service.
To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.
To create a group, use the command or tool provided by the operating system or directory service.
To manage groups, you can add or remove members, assign permissions, and modify group properties.
Exampl...read more
Q36. How will you take backup from hard drive if OS get corrupted? How to backup C drive Data?
To backup data from a corrupted OS, connect the hard drive to another computer and use backup software or manually copy the files.
Remove the hard drive from the affected computer
Connect the hard drive to another computer using an external enclosure or adapter
Use backup software to create a backup of the data on the C drive
Alternatively, manually copy the important files and folders from the C drive to another storage device
Q37. What is Operating System (os)?
An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs.
OS acts as an interface between the user and the computer hardware.
It manages the computer's memory and processes.
Examples of OS include Windows, macOS, Linux, Android, and iOS.
Q38. how do you delete last 30 days logs in tomcat by using shell script
Deleting last 30 days logs in Tomcat using shell script
Use find command to locate files older than 30 days
Use xargs command to pass the file names to rm command
Use crontab to schedule the script to run periodically
Q39. What's the basic requirements for a windows 10 operating system?
The basic requirements for a Windows 10 operating system include a compatible processor, sufficient memory, and available storage space.
Processor: 1 GHz or faster processor or SoC
Memory: 1 GB for 32-bit or 2 GB for 64-bit
Storage: 16 GB for 32-bit OS or 20 GB for 64-bit OS
Display: 800x600 resolution
Graphics: DirectX 9 or later with WDDM 1.0 driver
Internet connection: Required for updates and downloads
Q40. What is Linux, how will you add the commands
Linux is an open-source operating system based on Unix. Commands can be added using the terminal or by installing packages.
Linux is free and can be customized to suit specific needs
Commands can be added using the terminal by creating a script or alias
Packages can be installed using package managers like apt-get or yum
Examples of commands include ls, cd, mkdir, rm, etc.
Q41. How to do os install
OS installation involves creating a bootable media and following the installation wizard.
Create a bootable media (USB/DVD)
Insert the media and restart the computer
Boot from the media and follow the installation wizard
Select the language, time zone, and keyboard layout
Choose the installation type (upgrade or clean install)
Select the partition to install the OS
Wait for the installation to complete
Enter the product key and activate the OS
Install drivers and necessary software
Q42. Which Linux commands you have used on daily basis??
I have used various Linux commands on a daily basis.
ls - to list files and directories
cd - to change directories
grep - to search for specific text in files
tail - to view the end of a file
ps - to view running processes
kill - to terminate a process
chmod - to change file permissions
ssh - to connect to remote servers
scp - to transfer files between servers
tar - to archive and compress files
Q43. what is virtual memory? Will we need virtual memory even if we have infinite amount of RAM?
Virtual memory is a memory management technique that allows a computer to use more memory than it physically has.
Virtual memory uses a combination of RAM and hard disk space to store data.
It allows programs to use more memory than is physically available.
If a program tries to access memory that is not currently in RAM, it will be swapped in from the hard disk.
Even if we had infinite RAM, virtual memory would still be necessary for certain tasks such as memory isolation and pr...read more
Q44. What is a cronjob?
A cronjob is a scheduled task that runs automatically at specified intervals.
Cronjobs are commonly used in web development to automate tasks such as database backups or sending emails.
They are set up using a cron expression, which specifies the frequency and timing of the task.
Cronjobs can be managed through the command line or a web-based interface.
Examples of cronjobs include running a script to update website content every hour or sending a weekly newsletter to subscribers...read more
Q45. How to rollback Patches trough Yum
To rollback patches through Yum, use the yum history command and the yum history undo command.
Use the 'yum history' command to view the history of installed packages and patches.
Identify the transaction ID of the patch you want to rollback.
Use the 'yum history undo
' command to rollback the patch. Confirm the rollback by reviewing the output and checking the system's package status.
Q46. Ways of upgrading ESXi patch
ESXi patch can be upgraded using vSphere Update Manager, ESXCLI command-line tool, or manually.
vSphere Update Manager can be used to upgrade ESXi patches
ESXCLI command-line tool can also be used to upgrade ESXi patches
Manual upgrade can be done by downloading the patch from VMware website and installing it using ESXi Shell or SSH
Q47. what type of operating system in apple phone
The operating system in Apple phones is iOS.
iOS is a mobile operating system developed by Apple Inc.
It is the second most popular mobile operating system in the world.
iOS is known for its user-friendly interface and security features.
Examples of Apple phones that run on iOS are iPhone 12, iPhone 11, and iPhone SE.
Q48. How to take backup via tar utility
Tar utility is used to create backups by compressing files and directories.
To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.
Specify the files or directories to be included in the backup.
Use the '-cvf' options to create a new tar archive file.
Specify the name of the archive file to be created.
To compress the backup, use the '-z' option for gzip compression or '-j' option for bzip2 compression.
To extract files from a tar back...read more
Q49. Difference between various operating systems.
Operating systems differ in their user interface, functionality, and compatibility with hardware and software.
Windows is the most widely used OS, known for its user-friendly interface and compatibility with most software.
MacOS is known for its sleek design and compatibility with Apple hardware and software.
Linux is an open-source OS with various distributions, known for its customization and security features.
Android is a mobile OS based on Linux, used in smartphones and tabl...read more
Q50. What is difference between OST
OST stands for Offline Storage Table and is a file format used by Microsoft Outlook to store offline copies of email messages.
OST is a file format used by Microsoft Outlook for offline access to email messages.
OST files are created when Outlook is configured to use Cached Exchange Mode.
OST files allow users to access their email, calendar, and contacts even when not connected to the Exchange server.
Changes made to OST files while offline are synchronized with the Exchange ser...read more
Q51. Difference between semaphore and mutex with real time example
Semaphore and mutex are synchronization mechanisms used in multi-threaded environments.
Semaphore allows multiple threads to access a shared resource simultaneously, while mutex allows only one thread at a time.
Semaphore is used to control access to a pool of resources, while mutex is used to protect a single resource.
Semaphore uses a counter to keep track of the number of available resources, while mutex uses a lock to ensure exclusive access.
Example of semaphore: a printer t...read more
Q52. How does a system call actually work?
A system call is a request made by a program to the operating system for a service or resource.
A program executes a system call instruction.
The CPU switches to kernel mode and transfers control to the operating system.
The operating system performs the requested service or provides the requested resource.
The operating system returns control to the program by switching back to user mode.
Examples of system calls include open(), read(), write(), and close().
Q53. Give the full form of BIOS
BIOS stands for Basic Input/Output System.
BIOS is a firmware that initializes hardware during the boot process.
It provides a low-level interface between the hardware and the operating system.
BIOS settings can be accessed and modified through a setup utility.
BIOS can be updated to fix bugs or add new features.
Examples of BIOS manufacturers include AMI, Phoenix, and Award.
Q54. Difference between Windows7 and Windows XP?
Windows 7 is a newer version of Windows than XP, with improved features and security.
Windows 7 has a more user-friendly interface
Windows 7 has better security features, such as BitLocker encryption
Windows 7 supports newer hardware and software
Windows 7 has improved performance compared to XP
Windows 7 has a built-in virtual assistant, Cortana, which XP does not have
Q55. How many process MK have ?
MK (Marketing) has various processes depending on the company and industry.
MK processes can include market research, product development, advertising, sales, and customer service.
The number of processes can vary depending on the company and industry.
For example, a tech company may have more processes related to digital marketing and social media.
Meanwhile, a retail company may have more processes related to in-store promotions and customer loyalty programs.
Q56. What is the standard code of pipe
The standard code of pipe refers to the set of regulations and specifications that govern the design, construction, and use of pipes in various industries.
The standard code of pipe varies depending on the industry and the type of pipe being used.
For example, in the oil and gas industry, the American Petroleum Institute (API) provides standards for pipes used in drilling and production operations.
In the construction industry, the American Society for Testing and Materials (AST...read more
Q57. What is virtualization and why do we need it?
Virtualization is the creation of a virtual version of something, such as an operating system, server, storage device, or network resource.
Virtualization allows multiple operating systems or applications to run on a single physical machine, increasing efficiency and reducing costs.
It enables better utilization of hardware resources and provides flexibility in managing and deploying IT infrastructure.
Examples include VMware, Hyper-V, and VirtualBox.
Virtualization can also impr...read more
Q58. What is RTOS and Difference between RTOS and normal OS
RTOS stands for Real-Time Operating System. It is designed to handle time-sensitive tasks and has a deterministic response time.
RTOS is used in applications where timing is critical, such as aerospace and automotive industries.
RTOS has a predictable response time, whereas normal OS may have varying response times.
RTOS is designed to handle tasks with strict deadlines and priorities.
RTOS typically has a smaller footprint and lower overhead than normal OS.
Examples of RTOS inclu...read more
Q59. What are different interrupts?
Interrupts are signals sent to the processor to temporarily halt its current task and execute a specific task.
Hardware interrupts - generated by external devices
Software interrupts - generated by software programs
Maskable interrupts - can be disabled by the processor
Non-maskable interrupts - cannot be disabled by the processor
Examples - keyboard input, mouse input, timer interrupts, etc.
Q60. 1. What is BSOD error and how to resolve 2. How to resolve outlook not responding error
BSOD error is a blue screen error that occurs in Windows. Outlook not responding error can be resolved by repairing the installation or creating a new profile.
BSOD error is caused by hardware or software issues
To resolve BSOD error, try updating drivers, checking hardware components, or performing a system restore
Outlook not responding error can be resolved by repairing the installation or creating a new profile
To repair Outlook installation, go to Control Panel > Programs an...read more
Q61. what is the difference between zombie and orphan?
Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.
Zombie process is waiting for its parent to read its exit status
Orphan process is adopted by init process (PID 1)
Zombie process can be removed by killing its parent process
Orphan process can continue running even after its parent has terminated
Q62. explain what is deadloacks and ways to prevent them
Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.
Deadlocks occur when multiple processes are stuck in a circular waiting state.
Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.
Examples of prevention techniques are using a resource allocation graph, implementing a banker's algorithm, and employing timeouts and resource preemption.
Q63. what happens when you delete files in Linux
When files are deleted in Linux, they are not immediately removed from the disk but rather marked as available for reuse.
Deleting a file in Linux removes its entry from the file system's directory structure.
The file's data blocks are not immediately erased but are marked as available for reuse.
The file's inode, which contains metadata about the file, is also marked as available for reuse.
Until the space occupied by the deleted file is overwritten by new data, it can potential...read more
Q64. What is concurrency and formula of it?
Concurrency is the number of tasks that can be executed simultaneously in a system.
Concurrency is important in real-time analysis to ensure that the system can handle the workload.
Formula for concurrency is: Concurrency = (Total workload in seconds) / (Average handling time in seconds)
For example, if the total workload is 3600 seconds and the average handling time is 10 seconds, then the concurrency would be 360.
Concurrency can be increased by optimizing system resources and ...read more
Q65. Tell me process of booting
Booting is the process of starting a computer and loading the operating system into memory.
When the computer is turned on, the BIOS (Basic Input/Output System) performs a Power-On Self Test (POST)
The BIOS then searches for a bootable device, such as a hard drive or CD-ROM
Once a bootable device is found, the BIOS loads the boot loader, which is responsible for loading the operating system
The boot loader then loads the kernel, which initializes the operating system and starts t...read more
Q66. Is there any ideal CPU scheduling possible? Justify your answer?
No, there is no ideal CPU scheduling possible.
CPU scheduling is a complex problem with many variables.
Different scheduling algorithms are suited for different scenarios.
The ideal scheduling algorithm would depend on the specific system and workload.
For example, a real-time system would require a different scheduling algorithm than a batch processing system.
Zombie process is a terminated process that has completed execution but still has an entry in the process table. Orphan process is a process whose parent process has terminated.
Zombie process is created when a child process completes execution but its parent process has not yet read its exit status.
Zombie processes consume system resources and should be cleaned up by the parent process using wait() system call.
Orphan process is a process whose parent process has terminated be...read more
Q68. What is safe mode
Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.
Safe mode is used to troubleshoot and fix issues with the operating system or software.
In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.
Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.
In safe mode, the screen resolution may be lower and some features may be disabled.
Safe mode is not ...read more
Q69. How can troubleshoot the system when system restarting continuously
To troubleshoot a system that is restarting continuously, you can follow these steps:
Check for hardware issues such as overheating or faulty components
Verify if any recent software or driver updates have caused the issue
Examine the system logs for any error messages or patterns
Test the system in safe mode to determine if a third-party application is causing the problem
Perform a system restore to a previous stable state
Scan for malware or viruses that may be affecting the syst...read more
Q70. How to do windows system installation
Windows system installation involves preparing installation media, booting from it, following prompts, and configuring settings.
Prepare installation media (e.g. USB, DVD)
Boot from the installation media
Follow the prompts to select language, edition, and installation type
Configure settings like disk partitioning, username, and password
Wait for the installation to complete
Install necessary drivers and software
Update the system with the latest patches and security updates
Q71. What is system ?
A system is a collection of interconnected components that work together to achieve a common goal.
A system is made up of multiple parts or components.
These components are interconnected and interact with each other.
The components work together to achieve a common goal or purpose.
Examples of systems include computer systems, transportation systems, and ecological systems.
Q72. Explain about android architecture system.
Android architecture system is a layered architecture consisting of four main layers.
The four main layers are Linux kernel, native libraries, application framework, and applications.
The Linux kernel provides low-level hardware abstraction and security.
Native libraries are written in C or C++ and provide access to hardware-specific features.
Application framework provides high-level services such as activity management, resource management, and content providers.
Applications ar...read more
Q73. What's the difference between cp and pp
cp and pp are both commands in Unix-like operating systems, but they have different functionalities.
cp stands for 'copy' and is used to copy files or directories from one location to another.
pp stands for 'print and pause' and is used to print files with pagination, pausing after each page.
cp can be used to create a duplicate of a file or directory, while pp is used for printing files in a controlled manner.
Example: cp file1.txt file2.txt will create a copy of file1.txt named...read more
Q74. Explain Paging and Segmentation
Paging and Segmentation are memory management techniques used by operating systems.
Paging divides memory into fixed-size pages and stores them in physical memory.
Segmentation divides memory into logical segments and stores them in physical memory.
Paging allows for efficient use of physical memory and reduces fragmentation.
Segmentation allows for protection and sharing of memory between processes.
Examples of operating systems that use paging and segmentation are Windows and Li...read more
Q75. Explain priority scheduling (preemptive , non-preemptive). Explain a case when a low priority process will preempt a high priority process
Priority scheduling is a scheduling algorithm where processes are assigned priorities and executed based on their priority level.
Preemptive priority scheduling allows a higher priority process to interrupt a lower priority process that is currently running.
Non-preemptive priority scheduling allows a higher priority process to wait until the lower priority process finishes executing.
A low priority process can preempt a high priority process if the high priority process is wait...read more
Q76. How will you monitor file change in linux ?
Use inotifywait command to monitor file changes in Linux.
Install inotify-tools package
Use inotifywait command with options like -m for continuous monitoring and -e for specific events
Example: inotifywait -m /var/log/messages -e modify
Output will show the file path, event type and timestamp
Q77. How many Type of file ?
There are various types of files used in mechanical fitting.
There are hand files, needle files, and machine files.
Hand files are used for general purpose filing and come in various shapes and sizes.
Needle files are used for intricate work and have a pointed end.
Machine files are used with power tools and have teeth that are cut in a specific pattern.
Other types of files include diamond files, riffler files, and rotary files.
Q78. How to recover a guest
Recovering a guest involves addressing their concerns and providing exceptional service.
Listen actively to the guest's concerns
Apologize sincerely for any inconvenience caused
Offer a solution or alternative to resolve the issue
Provide exceptional service to exceed guest expectations
Follow up with the guest to ensure satisfaction
Q79. how to work DNS in Linux ? what is the record of DNS?
DNS in Linux is managed through configuration files and commands. DNS records contain information about domain names and IP addresses.
DNS in Linux is managed through the /etc/resolv.conf file which contains the IP addresses of DNS servers.
The 'nslookup' command can be used to query DNS records for a specific domain name.
DNS records include A records (IP address), MX records (mail server), CNAME records (alias), and more.
DNS caching can improve performance by storing frequentl...read more
Q80. How to check the data area value in as400
To check the data area value in AS400, you can use the DSPDTAARA command.
Use the DSPDTAARA command followed by the library and data area name to display the value.
You can also use the RTVDTAARA command to retrieve the value into a program variable.
If the data area is in a different library, specify the library name before the data area name.
Ensure that you have the necessary authority to access the data area.
Q81. What is the deffirent OST and PST
OST and PST are file formats used by Microsoft Outlook to store email, contacts, and other data.
OST stands for Offline Storage Table and is used by Outlook to store a copy of mailbox data from an Exchange server.
OST files allow users to access their mailbox data even when they are not connected to the server.
PST stands for Personal Storage Table and is used by Outlook to store email, contacts, calendar items, and other data locally on a user's computer.
PST files are typically...read more
Q82. Tell me if windows show a blue screen what are the main problem in this side?
A blue screen in Windows indicates a system crash or error.
Hardware failure
Driver issues
Corrupted system files
Malware or virus infections
Overheating
Memory issues
Power supply problems
Q83. what is multiprocessing and multi threading
Multiprocessing is the use of multiple processors to execute multiple tasks simultaneously. Multithreading is the use of multiple threads within a single process to execute multiple tasks simultaneously.
Multiprocessing involves the use of multiple processors or cores to execute multiple tasks simultaneously.
Multithreading involves the use of multiple threads within a single process to execute multiple tasks simultaneously.
Multiprocessing is typically used for CPU-intensive ta...read more
Q84. What is page fault and segmentation?
A page fault occurs when a requested page is not found in the main memory. Segmentation is a memory management technique.
Page fault: Occurs when a requested page is not present in the main memory
Segmentation: Memory management technique that divides the memory into segments
Examples: Page fault occurs when accessing data from virtual memory, while segmentation allows different segments for code, data, and stack
Q85. what is a interrupt latency
Interrupt latency is the time delay between the occurrence of an interrupt and the start of the routine that services the interrupt.
Interrupt latency is a critical factor in real-time systems
It can be affected by factors such as the priority of the interrupt and the current state of the processor
Reducing interrupt latency can improve system performance and responsiveness
Examples of interrupts include hardware interrupts from devices like keyboards and software interrupts from...read more
Demand paging is a memory management technique where pages are loaded into memory only when needed.
Demand paging allows for efficient memory utilization by loading pages into memory on demand.
It reduces the amount of initial memory required to start a process.
When a page is needed but not in memory, a page fault occurs and the required page is loaded from disk.
Demand paging allows for larger virtual memory space than physical memory.
Examples of demand paging systems include W...read more
Q87. What is race condition and how can it be eliminated
Race condition is a situation where multiple threads/processes access and manipulate shared data simultaneously.
It can be eliminated by using synchronization techniques like locks, semaphores, and mutexes.
Another way is to use atomic operations that ensure the data is accessed and modified atomically.
Using thread-safe data structures can also prevent race conditions.
Example: Two threads trying to increment a shared variable simultaneously can cause a race condition.
Example: U...read more
Q88. How to check stystem logs in linux ?
To check system logs in Linux, use the command 'tail -f /var/log/syslog' or 'journalctl -f'.
Use 'tail -f /var/log/syslog' to view the system log in real-time
Use 'journalctl -f' to view the systemd journal in real-time
Use 'grep' command to filter the logs based on specific keywords
Logs are stored in /var/log directory with different file names for different services
Q89. What is the Sysvol folder? Why is it used?
The Sysvol folder is a shared folder in Windows Server that stores the server's copy of the domain's public files.
Sysvol stands for System Volume and is used in Active Directory environments.
It contains important files for the domain, such as Group Policy objects, scripts, and logon/logoff scripts.
The Sysvol folder is replicated to all domain controllers in a domain, ensuring consistency and availability of these files.
It plays a crucial role in the functioning of Active Dire...read more
Q90. What is maximum Input output handle
The maximum input output handle refers to the maximum number of inputs and outputs that a device can handle.
The maximum input output handle varies depending on the device and its specifications.
It is important to consider the maximum input output handle when selecting a device for a project.
For example, a PLC may have a maximum input output handle of 256 inputs and 256 outputs.
Another example is a microcontroller with a maximum input output handle of 40 pins.
Exceeding the max...read more
Q91. How to reinstall drivers for any hardware?
To reinstall drivers for any hardware, follow these steps.
Uninstall the current driver from Device Manager
Download the latest driver from the manufacturer's website
Install the new driver by running the setup file
Restart the computer to complete the installation
If the driver is not available on the website, use Windows Update or a driver update tool
Ensure compatibility with the operating system and hardware version
Q92. Tell us about the Technical Knowledge you have about Linux and Networking.
I have extensive technical knowledge in Linux and Networking, including experience with system administration, network configuration, and troubleshooting.
Proficient in Linux operating systems such as Ubuntu, CentOS, and Red Hat
Experience with network protocols such as TCP/IP, DNS, DHCP, and VPN
Skilled in configuring routers, switches, firewalls, and other network devices
Knowledge of security practices and tools for securing networks and systems
Familiar with virtualization tec...read more
Major types of operating systems include Windows, macOS, Linux, and Unix.
Windows - developed by Microsoft, widely used in personal computers
macOS - developed by Apple, used in Mac computers
Linux - open-source OS popular in servers and embedded systems
Unix - older OS used in mainframes and servers
Q94. What is a Real-Time System ?
A real-time system is a computer system that processes data as it is received and provides immediate results.
Real-time systems are used in industries such as aviation, healthcare, and finance.
They require fast response times and high reliability.
Examples include air traffic control systems, medical monitoring devices, and stock trading systems.
Q95. How will you open a file whos size is double that of RAM on your system.?
Use memory-mapped files or stream the file in chunks.
Use memory-mapped files to access the file in chunks.
Stream the file in chunks using a buffer.
Use compression techniques to reduce the file size before opening.
Threading is a way for a program to execute multiple tasks concurrently. Different scheduling algorithms determine the order in which threads are executed.
Threading allows multiple tasks to run concurrently within a single process.
Scheduling algorithms determine the order in which threads are executed, such as First-Come-First-Served (FCFS), Round Robin, Priority-Based Scheduling, etc.
FCFS schedules threads based on their arrival time, Round Robin assigns a fixed time slice t...read more
Q97. How to check if your r/3 system is 32bit or 64bit?
To check if your r/3 system is 32bit or 64bit, go to transaction SM51 and check the 'Architecture' column.
Open transaction SM51
Check the 'Architecture' column
If it says 'x86_64', it's 64bit. If it says 'i386', it's 32bit.
Q98. How to install drivers for different IO devices?
IO devices require specific drivers to be installed for proper functioning.
Identify the device and its manufacturer
Download the appropriate driver from the manufacturer's website
Run the installer and follow the on-screen instructions
Restart the computer if prompted
Verify the device is working properly in Device Manager
Q99. Difference between Job scheduler and queue processor
Job scheduler schedules jobs to run at specific times while queue processor processes jobs in a queue.
Job scheduler is time-based while queue processor is event-based
Job scheduler is used for scheduling tasks like backups, updates, etc.
Queue processor is used for processing tasks like sending emails, processing orders, etc.
Job scheduler can be used to trigger a queue processor to process a job
Queue processor can handle multiple jobs concurrently while job scheduler handles on...read more
32-bit operating systems can only utilize up to 4GB of RAM, while 64-bit operating systems can handle much larger amounts of RAM.
32-bit operating systems can only address up to 4GB of RAM, limiting the amount of memory that can be used by the system and applications.
64-bit operating systems can handle larger amounts of RAM, allowing for better performance and the ability to run more demanding applications.
64-bit operating systems also offer better security features and suppor...read more
Top Interview Questions for Related Skills
Interview Questions of Operating Systems Related Designations
Interview experiences of popular companies
Reviews
Interviews
Salaries
Users/Month