Operating Systems

Skill
Computer Science

Top 250 Operating Systems Interview Questions and Answers 2024

250 questions found

Updated 11 Dec 2024

Q1. What do you mean by Linux? Explain its features.

Ans.

Linux is an open-source operating system known for its stability, security, and flexibility.

  • Linux is a Unix-like operating system that was developed as a free and open-source software.

  • It provides a stable and secure environment for running applications and services.

  • Linux supports a wide range of hardware architectures and has a large community of developers and users.

  • It offers a command-line interface, as well as various graphical user interfaces.

  • Linux is highly customizable ...read more

View 2 more answers

Q2. What is your knowledge about windows and Linux based servers

Ans.

I have extensive knowledge of both Windows and Linux based servers.

  • I am proficient in managing and configuring Windows Server operating systems.

  • I have experience in setting up and maintaining Linux servers, including Ubuntu, CentOS, and Red Hat.

  • I am familiar with server virtualization technologies like VMware and Hyper-V.

  • I have knowledge of server security best practices and can implement firewall rules and access controls.

  • I am skilled in troubleshooting server issues and opt...read more

View 1 answer

Q3. What is Active Directory? How do we manage role from active directory

Ans.

Active Directory is a Microsoft service that manages network resources and user access.

  • Active Directory is used to manage user accounts, computers, and other network resources.

  • It allows for centralized authentication and authorization for users and computers in a network.

  • Roles can be managed through Active Directory by assigning users to specific groups with corresponding permissions.

  • Examples of roles that can be managed through Active Directory include domain administrators,...read more

View 4 more answers
Frequently asked in

Q4. Do you know what is BSOD and how to resolve it?

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a critical system error occurs.

  • BSOD is a stop error screen that appears when the Windows operating system encounters a fatal system error.

  • It is usually caused by hardware or driver issues, software conflicts, or system file corruption.

  • To resolve BSOD, one can try restarting the computer, updating drivers, running hardware diagnostics, or performing a system restore.

  • Examples...read more

View 1 answer
Frequently asked in
Are these interview questions helpful?

Q5. Differentiate between a process and a thread

Ans.

A process is an instance of a program while a thread is a subset of a process.

  • A process has its own memory space while threads share memory space

  • Processes are heavyweight while threads are lightweight

  • Processes communicate through inter-process communication while threads communicate through shared memory

  • Examples of processes include web browsers, text editors, etc. while examples of threads include GUI updates, background tasks, etc.

View 2 more answers
Frequently asked in

Q6. what is modern and classic folder?

Ans.

Modern and Classic folders are two different types of folders in UiPath Orchestrator.

  • Modern folders are designed for multi-tenancy and allow for more granular control over permissions and access.

  • Classic folders are the traditional folders in Orchestrator and are used for single-tenancy.

  • Modern folders have a different user interface and are organized by tenants, while classic folders are organized by folders and subfolders.

  • Modern folders also have additional features such as t...read more

Add your answer
Frequently asked in
Share interview questions and help millions of jobseekers 🌟

Q7. How do you give all rwx permissions to a file ? How do you search for a specific text in a file ?

Ans.

To give all rwx permissions to a file, use chmod 777 filename. To search for specific text in a file, use grep 'text' filename.

  • To give all rwx permissions to a file, use the chmod command followed by 777 and the filename.

  • Example: chmod 777 myfile.txt

  • To search for specific text in a file, use the grep command followed by the text and the filename.

  • Example: grep 'hello' myfile.txt

View 2 more answers

Q8. Define Threads and why we use it ??

Ans.

Threads are lightweight processes that allow multiple tasks to run concurrently within a single program.

  • Threads are used to achieve multitasking and improve the performance of a program.

  • They allow multiple parts of a program to execute simultaneously.

  • Threads share the same memory space and resources of a process.

  • They can be used for parallel processing, handling multiple user requests, and improving responsiveness.

  • Examples of using threads include web servers handling multipl...read more

Add your answer
Frequently asked in

Operating Systems Jobs

C++ Software, Senior Design Engineer 4-7 years
Schneider Electric India Pvt. Ltd.
4.2
₹ 16 L/yr - ₹ 26 L/yr
(AmbitionBox estimate)
Bangalore / Bengaluru
Management Trainee : Accounts Payable 3-7 years
Genpact
3.9
₹ 4 L/yr - ₹ 8 L/yr
(AmbitionBox estimate)
India
Contract Data Management Analyst, Procurement, Management Trainee 3-7 years
Genpact
3.9
Gurgaon / Gurugram

Q9. What is a deadlock? How to know if a deadlock is present?

Ans.

A deadlock is a situation where two or more processes are unable to proceed because they are waiting for each other to release resources.

  • Deadlocks occur when two or more processes are blocked and unable to continue executing.

  • To detect a deadlock, look for circular wait, hold and wait, no preemption, and mutual exclusion.

  • Examples of deadlocks include a printer that is waiting for a user to replace the paper tray, or two trains that are stuck on the same track waiting for each ...read more

View 7 more answers
Frequently asked in

Q10. What is structure padding and why it happens?

Ans.

Structure padding is the insertion of unused bytes between members of a structure to align the data in memory.

  • Padding is added to ensure that each member of the structure is aligned to a memory address that is a multiple of its size.

  • Padding can be compiler-dependent and can vary based on the target architecture.

  • Padding can affect the size of the structure and the performance of the program.

  • Example: struct MyStruct { char a; int b; char c; }; - padding will be added between a ...read more

Add your answer

Q11. Why the os is installed in c drive only and why not in d or e or f......

Ans.

OS is installed in C drive due to historical reasons and system requirements.

  • C drive is the default location for OS installation due to historical reasons.

  • Some system files and programs require installation in the C drive for proper functioning.

  • Changing the default installation location can cause compatibility issues and errors.

  • However, users can choose to install programs and files in other drives.

  • Partitioning the hard drive can also help in managing space and organizing fil...read more

Add your answer

Q12. Design Memory allocator for user space programs like malloc.

Ans.

Design a memory allocator for user space programs like malloc.

  • The allocator should manage memory efficiently and avoid fragmentation.

  • It should support multiple threads and handle concurrent requests.

  • Consider using techniques like buddy allocation or slab allocation.

  • Implement features like memory alignment and garbage collection.

  • Test the allocator thoroughly to ensure correctness and performance.

Add your answer

Q13. Difference between a semaphore and mutex

Ans.

Semaphore is used to control access to a resource with limited capacity while mutex is used to synchronize access to a shared resource.

  • Semaphore allows multiple threads to access a resource simultaneously up to a certain limit while mutex allows only one thread to access a shared resource at a time.

  • Semaphore can be used to solve the producer-consumer problem while mutex can be used to solve the critical section problem.

  • Semaphore can be binary or counting while mutex is always...read more

Add your answer
Frequently asked in

Q14. What is LVM why we use LVM

Ans.

LVM (Logical Volume Manager) is a disk management tool used in Linux systems to manage storage devices and create logical volumes.

  • LVM allows for easy management of storage by abstracting physical storage devices into logical volumes.

  • It provides features like volume resizing, snapshots, and striping for improved performance and flexibility.

  • LVM enables dynamic allocation of storage space, making it easier to add or remove storage devices without disrupting the system.

  • It allows ...read more

View 1 answer
Frequently asked in

Q15. Explain threading and how to implement multithreading

Ans.

Threading is a technique to execute multiple tasks concurrently. Multithreading can be implemented using threads.

  • Threading allows multiple tasks to run concurrently, improving performance and responsiveness.

  • Threads are lightweight processes that share the same memory space.

  • Threads can be created using programming languages like Java, C++, or Python.

  • Multithreading can be implemented by creating and managing multiple threads within a program.

  • Thread synchronization techniques li...read more

Add your answer
Frequently asked in

Q16. What is the command to search a file like test.txt in linux?

Ans.

The command to search a file like test.txt in Linux is 'grep'.

  • Use the 'grep' command followed by the search term and the file name to search for a specific text in a file.

  • For example, to search for the word 'hello' in a file named test.txt, you would use the command 'grep hello test.txt'.

Add your answer

Q17. Wat are the causes of a blue screen error

Ans.

A blue screen error can be caused by various factors such as hardware issues, driver conflicts, and software errors.

  • Hardware issues like faulty RAM or overheating can cause blue screen errors.

  • Driver conflicts occur when incompatible or outdated drivers are installed.

  • Software errors, such as corrupted system files or incompatible applications, can also lead to blue screen errors.

View 10 more answers
Frequently asked in

Q18. What is BSOD, how do you resolve.

Ans.

BSOD stands for Blue Screen of Death. It is an error screen displayed on Windows operating systems when a system error occurs.

  • BSOD is caused by hardware or software issues

  • To resolve, try restarting the computer

  • Check for any recent hardware or software changes

  • Run a virus scan and update drivers

  • If problem persists, seek professional help

Add your answer

Q19. How to kill process in rhel 7.2

Ans.

To kill a process in RHEL 7.2, use the 'kill' command followed by the process ID.

  • Identify the process ID using 'ps' command

  • Use 'kill' command followed by the process ID to terminate the process

  • Use 'kill -9' command to force kill the process if it doesn't respond to regular kill command

View 1 answer

Q20. Give a few technical differences between Windows and UNIX

Ans.

Windows and UNIX have several technical differences.

  • Windows has a graphical user interface (GUI) while UNIX is primarily command-line based.

  • Windows uses the NTFS file system while UNIX typically uses the ext4 file system.

  • Windows supports a wide range of software applications, while UNIX is known for its stability and security.

  • Windows has a larger user base and is more commonly used for personal computers, while UNIX is popular for servers and high-performance computing.

  • Window...read more

Add your answer
Frequently asked in

Q21. what is binder in android?

Ans.

Binder is a mechanism for inter-process communication in Android.

  • Binder allows different processes to communicate with each other.

  • It is used for implementing Android's IPC (Inter-Process Communication) system.

  • Binder uses a client-server model where the client sends requests to the server and the server responds with the requested data.

  • It is used for sharing data between different components of an Android application.

  • Binder is implemented using kernel-level drivers and user-le...read more

Add your answer
Frequently asked in

Q22. What is the command to check profile consistency in Linux?

Ans.

The command to check profile consistency in Linux is 'saproot.sh'.

  • The 'saproot.sh' command checks the consistency of SAP profiles in Linux.

  • It can be run as the 'root' user or with 'sudo'.

  • The output of the command shows any inconsistencies in the profiles.

  • The command can be used to troubleshoot issues related to SAP profiles.

Add your answer

Q23. What is boot.properties file

Ans.

The boot.properties file is a configuration file used by middleware applications to store username and password credentials.

  • The boot.properties file is typically found in the domain directory of a middleware application.

  • It is used to store the username and password credentials required for the application to start up.

  • The file is encrypted to protect the sensitive information stored within it.

  • It allows for automatic authentication during the startup process, eliminating the ne...read more

View 2 more answers
Frequently asked in

Q24. what is a Kernel in OS

Ans.

Kernel is the core component of an operating system that manages system resources and provides a bridge between hardware and software.

  • Kernel is responsible for managing memory, processes, and device drivers.

  • It provides an interface for applications to access hardware resources.

  • Kernel operates in privileged mode and has direct access to the hardware.

  • Examples of popular kernels are Linux kernel, Windows NT kernel, and macOS kernel.

View 1 answer

Q25. Define Process &thread

Ans.

Process is an instance of a program while thread is a subset of a process that can run concurrently with other threads.

  • A process is a program in execution

  • A process can have multiple threads

  • Threads share the same memory space as the process

  • Threads can run concurrently with other threads within the same process

  • Examples of processes include web browsers, word processors, and media players

  • Examples of threads include GUI thread, network thread, and background thread

Add your answer
Frequently asked in

Q26. How create a user in single line commands

Ans.

A user can be created in a single line command using the 'useradd' command in Linux.

  • Use the 'useradd' command followed by the username to create a user.

  • Specify additional options like home directory, shell, etc. if required.

  • Example: useradd john -m -s /bin/bash

View 8 more answers
Frequently asked in

Q27. What's the basic requirements for a windows 10 operating system?

Ans.

The basic requirements for a Windows 10 operating system include a compatible processor, sufficient memory, and available storage space.

  • Processor: 1 GHz or faster processor or SoC

  • Memory: 1 GB for 32-bit or 2 GB for 64-bit

  • Storage: 16 GB for 32-bit OS or 20 GB for 64-bit OS

  • Display: 800x600 resolution

  • Graphics: DirectX 9 or later with WDDM 1.0 driver

  • Internet connection: Required for updates and downloads

View 3 more answers

Q28. What is scheduling? List different types of scheduling

Ans.

Scheduling is the process of allocating resources to tasks based on priority and availability.

  • Different types of scheduling include: preemptive and non-preemptive scheduling, round-robin scheduling, priority scheduling, and deadline scheduling.

  • Preemptive scheduling allows higher priority tasks to interrupt lower priority tasks, while non-preemptive scheduling does not.

  • Round-robin scheduling allocates a fixed time slice to each task in a cyclic manner.

  • Priority scheduling assig...read more

View 4 more answers
Frequently asked in
Q29. Operating System Question

What is the difference between a mutex and a semaphore

Ans.

A mutex is a binary semaphore used for mutual exclusion, while a semaphore is a generalized synchronization primitive.

  • Mutex is used to protect a critical section of code, allowing only one thread to access it at a time.

  • Semaphore is used to control access to a shared resource, allowing multiple threads to access it simultaneously.

  • Mutex has ownership, meaning the thread that locks it must unlock it.

  • Semaphore does not have ownership, meaning any thread can release it.

  • Mutex is ty...read more

View 1 answer

Q30. Difference between Windows7 and Windows XP?

Ans.

Windows 7 is a newer version of Windows than XP, with improved features and security.

  • Windows 7 has a more user-friendly interface

  • Windows 7 has better security features, such as BitLocker encryption

  • Windows 7 supports newer hardware and software

  • Windows 7 has improved performance compared to XP

  • Windows 7 has a built-in virtual assistant, Cortana, which XP does not have

Add your answer

Q31. Major difference between windows server 2008 and windows server 2012

Ans.

Windows Server 2008 and Windows Server 2012 have several major differences.

  • Windows Server 2012 introduced a new user interface called Metro UI, while Windows Server 2008 uses the traditional Windows interface.

  • Windows Server 2012 has improved virtualization capabilities with features like Hyper-V 3.0, while Windows Server 2008 has an older version of Hyper-V.

  • Windows Server 2012 includes improved storage features such as Storage Spaces and SMB 3.0, which are not available in Wi...read more

View 1 answer

Q32. Do you how to create and manage Users and Groups?

Ans.

Yes, I know how to create and manage Users and Groups.

  • To create a user, use the appropriate command or tool provided by the operating system or directory service.

  • To manage users, you can modify their properties, reset passwords, enable or disable accounts, and assign permissions.

  • To create a group, use the command or tool provided by the operating system or directory service.

  • To manage groups, you can add or remove members, assign permissions, and modify group properties.

  • Exampl...read more

View 1 answer
Frequently asked in

Q33. What are the basic functions of OS?

Ans.

OS functions include managing hardware resources, providing user interface, and running applications.

  • Managing hardware resources such as CPU, memory, and storage

  • Providing user interface for interaction with the computer

  • Running applications and managing processes

  • Managing file systems and data storage

  • Providing security and access control

  • Managing network connections and communication

  • Performing system updates and maintenance

  • Handling errors and system crashes

  • Virtualization and con...read more

View 10 more answers
Frequently asked in

Q34. How will you take backup from hard drive if OS get corrupted? How to backup C drive Data?

Ans.

To backup data from a corrupted OS, connect the hard drive to another computer and use backup software or manually copy the files.

  • Remove the hard drive from the affected computer

  • Connect the hard drive to another computer using an external enclosure or adapter

  • Use backup software to create a backup of the data on the C drive

  • Alternatively, manually copy the important files and folders from the C drive to another storage device

View 1 answer

Q35. how do you achieve synchronization? what are the differences between the synchronization ways?

Ans.

Synchronization is the process of coordinating the execution of multiple threads to ensure proper order of execution.

  • Synchronization can be achieved using techniques like locks, semaphores, and monitors.

  • Locks are used to ensure that only one thread can access a shared resource at a time.

  • Semaphores are used to control access to a shared resource by limiting the number of threads that can access it at once.

  • Monitors are used to ensure that only one thread can execute a critical ...read more

Add your answer
Frequently asked in

Q36. How to delete CTL and ITL files from phone.

Ans.

To delete CTL and ITL files from a phone, access the phone's settings, navigate to the security or device administration section, and delete the files.

  • Access the phone's settings

  • Navigate to the security or device administration section

  • Locate the CTL and ITL files

  • Delete the files

Add your answer

Q37. what is virtual memory? Will we need virtual memory even if we have infinite amount of RAM?

Ans.

Virtual memory is a memory management technique that allows a computer to use more memory than it physically has.

  • Virtual memory uses a combination of RAM and hard disk space to store data.

  • It allows programs to use more memory than is physically available.

  • If a program tries to access memory that is not currently in RAM, it will be swapped in from the hard disk.

  • Even if we had infinite RAM, virtual memory would still be necessary for certain tasks such as memory isolation and pr...read more

Add your answer
Frequently asked in

Q38. What is Operating System (os)?

Ans.

An operating system (OS) is a software that manages computer hardware and software resources and provides common services for computer programs.

  • OS acts as an interface between the user and the computer hardware.

  • It manages the computer's memory and processes.

  • Examples of OS include Windows, macOS, Linux, Android, and iOS.

Add your answer

Q39. What is Paging in OS ?

Ans.

Paging is a memory management technique used by OS to store and retrieve data from secondary storage.

  • It divides the memory into fixed-size pages and stores data in these pages.

  • It allows efficient use of memory by swapping out less frequently used pages to disk.

  • It reduces fragmentation and improves memory utilization.

  • Examples include Windows Virtual Memory and Linux Swap Space.

View 1 answer

Q40. How to do os install

Ans.

OS installation involves creating a bootable media and following the installation wizard.

  • Create a bootable media (USB/DVD)

  • Insert the media and restart the computer

  • Boot from the media and follow the installation wizard

  • Select the language, time zone, and keyboard layout

  • Choose the installation type (upgrade or clean install)

  • Select the partition to install the OS

  • Wait for the installation to complete

  • Enter the product key and activate the OS

  • Install drivers and necessary software

Add your answer
Frequently asked in

Q41. how do you delete last 30 days logs in tomcat by using shell script

Ans.

Deleting last 30 days logs in Tomcat using shell script

  • Use find command to locate files older than 30 days

  • Use xargs command to pass the file names to rm command

  • Use crontab to schedule the script to run periodically

Add your answer
Frequently asked in

Q42. What is Linux, how will you add the commands

Ans.

Linux is an open-source operating system based on Unix. Commands can be added using the terminal or by installing packages.

  • Linux is free and can be customized to suit specific needs

  • Commands can be added using the terminal by creating a script or alias

  • Packages can be installed using package managers like apt-get or yum

  • Examples of commands include ls, cd, mkdir, rm, etc.

Add your answer
Frequently asked in

Q43. What is a cronjob?

Ans.

A cronjob is a scheduled task that runs automatically at specified intervals.

  • Cronjobs are commonly used in web development to automate tasks such as database backups or sending emails.

  • They are set up using a cron expression, which specifies the frequency and timing of the task.

  • Cronjobs can be managed through the command line or a web-based interface.

  • Examples of cronjobs include running a script to update website content every hour or sending a weekly newsletter to subscribers...read more

Add your answer

Q44. How to rollback Patches trough Yum

Ans.

To rollback patches through Yum, use the yum history command and the yum history undo command.

  • Use the 'yum history' command to view the history of installed packages and patches.

  • Identify the transaction ID of the patch you want to rollback.

  • Use the 'yum history undo ' command to rollback the patch.

  • Confirm the rollback by reviewing the output and checking the system's package status.

Add your answer

Q45. Ways of upgrading ESXi patch

Ans.

ESXi patch can be upgraded using vSphere Update Manager, ESXCLI command-line tool, or manually.

  • vSphere Update Manager can be used to upgrade ESXi patches

  • ESXCLI command-line tool can also be used to upgrade ESXi patches

  • Manual upgrade can be done by downloading the patch from VMware website and installing it using ESXi Shell or SSH

Add your answer
Frequently asked in

Q46. Which Linux commands you have used on daily basis??

Ans.

I have used various Linux commands on a daily basis.

  • ls - to list files and directories

  • cd - to change directories

  • grep - to search for specific text in files

  • tail - to view the end of a file

  • ps - to view running processes

  • kill - to terminate a process

  • chmod - to change file permissions

  • ssh - to connect to remote servers

  • scp - to transfer files between servers

  • tar - to archive and compress files

View 1 answer
Frequently asked in

Q47. what type of operating system in apple phone

Ans.

The operating system in Apple phones is iOS.

  • iOS is a mobile operating system developed by Apple Inc.

  • It is the second most popular mobile operating system in the world.

  • iOS is known for its user-friendly interface and security features.

  • Examples of Apple phones that run on iOS are iPhone 12, iPhone 11, and iPhone SE.

View 1 answer
Frequently asked in

Q48. How to take backup via tar utility

Ans.

Tar utility is used to create backups by compressing files and directories.

  • To create a backup using tar, use the 'tar' command followed by the appropriate options and arguments.

  • Specify the files or directories to be included in the backup.

  • Use the '-cvf' options to create a new tar archive file.

  • Specify the name of the archive file to be created.

  • To compress the backup, use the '-z' option for gzip compression or '-j' option for bzip2 compression.

  • To extract files from a tar back...read more

Add your answer

Q49. Difference between various operating systems.

Ans.

Operating systems differ in their user interface, functionality, and compatibility with hardware and software.

  • Windows is the most widely used OS, known for its user-friendly interface and compatibility with most software.

  • MacOS is known for its sleek design and compatibility with Apple hardware and software.

  • Linux is an open-source OS with various distributions, known for its customization and security features.

  • Android is a mobile OS based on Linux, used in smartphones and tabl...read more

View 2 more answers

Q50. What is difference between OST

Ans.

OST stands for Offline Storage Table and is a file format used by Microsoft Outlook to store offline copies of email messages.

  • OST is a file format used by Microsoft Outlook for offline access to email messages.

  • OST files are created when Outlook is configured to use Cached Exchange Mode.

  • OST files allow users to access their email, calendar, and contacts even when not connected to the Exchange server.

  • Changes made to OST files while offline are synchronized with the Exchange ser...read more

View 3 more answers

Q51. Give the full form of BIOS

Ans.

BIOS stands for Basic Input/Output System.

  • BIOS is a firmware that initializes hardware during the boot process.

  • It provides a low-level interface between the hardware and the operating system.

  • BIOS settings can be accessed and modified through a setup utility.

  • BIOS can be updated to fix bugs or add new features.

  • Examples of BIOS manufacturers include AMI, Phoenix, and Award.

View 1 answer
Frequently asked in

Q52. What is the standard code of pipe

Ans.

The standard code of pipe refers to the set of regulations and specifications that govern the design, construction, and use of pipes in various industries.

  • The standard code of pipe varies depending on the industry and the type of pipe being used.

  • For example, in the oil and gas industry, the American Petroleum Institute (API) provides standards for pipes used in drilling and production operations.

  • In the construction industry, the American Society for Testing and Materials (AST...read more

View 1 answer

Q53. What is virtualization and why do we need it?

Ans.

Virtualization is the creation of a virtual version of something, such as an operating system, server, storage device, or network resource.

  • Virtualization allows multiple operating systems or applications to run on a single physical machine, increasing efficiency and reducing costs.

  • It enables better utilization of hardware resources and provides flexibility in managing and deploying IT infrastructure.

  • Examples include VMware, Hyper-V, and VirtualBox.

  • Virtualization can also impr...read more

Add your answer

Q54. What is RTOS and Difference between RTOS and normal OS

Ans.

RTOS stands for Real-Time Operating System. It is designed to handle time-sensitive tasks and has a deterministic response time.

  • RTOS is used in applications where timing is critical, such as aerospace and automotive industries.

  • RTOS has a predictable response time, whereas normal OS may have varying response times.

  • RTOS is designed to handle tasks with strict deadlines and priorities.

  • RTOS typically has a smaller footprint and lower overhead than normal OS.

  • Examples of RTOS inclu...read more

Add your answer

Q55. What are different interrupts?

Ans.

Interrupts are signals sent to the processor to temporarily halt its current task and execute a specific task.

  • Hardware interrupts - generated by external devices

  • Software interrupts - generated by software programs

  • Maskable interrupts - can be disabled by the processor

  • Non-maskable interrupts - cannot be disabled by the processor

  • Examples - keyboard input, mouse input, timer interrupts, etc.

Add your answer

Q56. 1. What is BSOD error and how to resolve 2. How to resolve outlook not responding error

Ans.

BSOD error is a blue screen error that occurs in Windows. Outlook not responding error can be resolved by repairing the installation or creating a new profile.

  • BSOD error is caused by hardware or software issues

  • To resolve BSOD error, try updating drivers, checking hardware components, or performing a system restore

  • Outlook not responding error can be resolved by repairing the installation or creating a new profile

  • To repair Outlook installation, go to Control Panel > Programs an...read more

Add your answer

Q57. what happens when you delete files in Linux

Ans.

When files are deleted in Linux, they are not immediately removed from the disk but rather marked as available for reuse.

  • Deleting a file in Linux removes its entry from the file system's directory structure.

  • The file's data blocks are not immediately erased but are marked as available for reuse.

  • The file's inode, which contains metadata about the file, is also marked as available for reuse.

  • Until the space occupied by the deleted file is overwritten by new data, it can potential...read more

Add your answer

Q58. What is concurrency and formula of it?

Ans.

Concurrency is the number of tasks that can be executed simultaneously in a system.

  • Concurrency is important in real-time analysis to ensure that the system can handle the workload.

  • Formula for concurrency is: Concurrency = (Total workload in seconds) / (Average handling time in seconds)

  • For example, if the total workload is 3600 seconds and the average handling time is 10 seconds, then the concurrency would be 360.

  • Concurrency can be increased by optimizing system resources and ...read more

Add your answer

Q59. Tell me process of booting

Ans.

Booting is the process of starting a computer and loading the operating system into memory.

  • When the computer is turned on, the BIOS (Basic Input/Output System) performs a Power-On Self Test (POST)

  • The BIOS then searches for a bootable device, such as a hard drive or CD-ROM

  • Once a bootable device is found, the BIOS loads the boot loader, which is responsible for loading the operating system

  • The boot loader then loads the kernel, which initializes the operating system and starts t...read more

Add your answer

Q60. what is the difference between zombie and orphan?

Ans.

Zombie is a terminated process that still has an entry in the process table, while orphan is a child process whose parent has terminated.

  • Zombie process is waiting for its parent to read its exit status

  • Orphan process is adopted by init process (PID 1)

  • Zombie process can be removed by killing its parent process

  • Orphan process can continue running even after its parent has terminated

Add your answer

Q61. explain what is deadloacks and ways to prevent them

Ans.

Deadlocks are situations where two or more processes are unable to proceed because each is waiting for the other to release a resource.

  • Deadlocks occur when multiple processes are stuck in a circular waiting state.

  • Prevention techniques include resource allocation strategies, deadlock detection, and avoidance algorithms.

  • Examples of prevention techniques are using a resource allocation graph, implementing a banker's algorithm, and employing timeouts and resource preemption.

Add your answer
Frequently asked in

Q62. How can troubleshoot the system when system restarting continuously

Ans.

To troubleshoot a system that is restarting continuously, you can follow these steps:

  • Check for hardware issues such as overheating or faulty components

  • Verify if any recent software or driver updates have caused the issue

  • Examine the system logs for any error messages or patterns

  • Test the system in safe mode to determine if a third-party application is causing the problem

  • Perform a system restore to a previous stable state

  • Scan for malware or viruses that may be affecting the syst...read more

View 1 answer

Q63. How to do windows system installation

Ans.

Windows system installation involves preparing installation media, booting from it, following prompts, and configuring settings.

  • Prepare installation media (e.g. USB, DVD)

  • Boot from the installation media

  • Follow the prompts to select language, edition, and installation type

  • Configure settings like disk partitioning, username, and password

  • Wait for the installation to complete

  • Install necessary drivers and software

  • Update the system with the latest patches and security updates

View 1 answer

Q64. What is system ?

Ans.

A system is a collection of interconnected components that work together to achieve a common goal.

  • A system is made up of multiple parts or components.

  • These components are interconnected and interact with each other.

  • The components work together to achieve a common goal or purpose.

  • Examples of systems include computer systems, transportation systems, and ecological systems.

View 1 answer
Frequently asked in

Q65. Explain about android architecture system.

Ans.

Android architecture system is a layered architecture consisting of four main layers.

  • The four main layers are Linux kernel, native libraries, application framework, and applications.

  • The Linux kernel provides low-level hardware abstraction and security.

  • Native libraries are written in C or C++ and provide access to hardware-specific features.

  • Application framework provides high-level services such as activity management, resource management, and content providers.

  • Applications ar...read more

Add your answer
Frequently asked in

Q66. What's the difference between cp and pp

Ans.

cp and pp are both commands in Unix-like operating systems, but they have different functionalities.

  • cp stands for 'copy' and is used to copy files or directories from one location to another.

  • pp stands for 'print and pause' and is used to print files with pagination, pausing after each page.

  • cp can be used to create a duplicate of a file or directory, while pp is used for printing files in a controlled manner.

  • Example: cp file1.txt file2.txt will create a copy of file1.txt named...read more

View 1 answer

Q67. How many Type of file ?

Ans.

There are various types of files used in mechanical fitting.

  • There are hand files, needle files, and machine files.

  • Hand files are used for general purpose filing and come in various shapes and sizes.

  • Needle files are used for intricate work and have a pointed end.

  • Machine files are used with power tools and have teeth that are cut in a specific pattern.

  • Other types of files include diamond files, riffler files, and rotary files.

Add your answer

Q68. What is safe mode

Ans.

Safe mode is a diagnostic mode in which a computer's operating system starts with only basic functions.

  • Safe mode is used to troubleshoot and fix issues with the operating system or software.

  • In safe mode, only essential drivers and services are loaded, which can help identify and resolve problems.

  • Safe mode can be accessed by pressing a key during startup, such as F8 for Windows.

  • In safe mode, the screen resolution may be lower and some features may be disabled.

  • Safe mode is not ...read more

Add your answer
Frequently asked in

Q69. How to recover a guest

Ans.

Recovering a guest involves addressing their concerns and providing exceptional service.

  • Listen actively to the guest's concerns

  • Apologize sincerely for any inconvenience caused

  • Offer a solution or alternative to resolve the issue

  • Provide exceptional service to exceed guest expectations

  • Follow up with the guest to ensure satisfaction

View 7 more answers
Frequently asked in

Q70. What is the deffirent OST and PST

Ans.

OST and PST are file formats used by Microsoft Outlook to store email, contacts, and other data.

  • OST stands for Offline Storage Table and is used by Outlook to store a copy of mailbox data from an Exchange server.

  • OST files allow users to access their mailbox data even when they are not connected to the server.

  • PST stands for Personal Storage Table and is used by Outlook to store email, contacts, calendar items, and other data locally on a user's computer.

  • PST files are typically...read more

View 1 answer

Q71. Tell me if windows show a blue screen what are the main problem in this side?

Ans.

A blue screen in Windows indicates a system crash or error.

  • Hardware failure

  • Driver issues

  • Corrupted system files

  • Malware or virus infections

  • Overheating

  • Memory issues

  • Power supply problems

Add your answer

Q72. What is Gc principal

Ans.

GC principal refers to the principle of gas chromatography, which involves separating and analyzing components of a mixture based on their affinity for a stationary phase and a mobile phase.

  • Gas chromatography (GC) is a technique used to separate and analyze volatile compounds in a mixture.

  • The principle of GC involves the use of a stationary phase (typically a solid or liquid) and a mobile phase (usually a gas) to separate the components of the mixture.

  • The components of the mi...read more

View 1 answer

Q73. what is a interrupt latency

Ans.

Interrupt latency is the time delay between the occurrence of an interrupt and the start of the routine that services the interrupt.

  • Interrupt latency is a critical factor in real-time systems

  • It can be affected by factors such as the priority of the interrupt and the current state of the processor

  • Reducing interrupt latency can improve system performance and responsiveness

  • Examples of interrupts include hardware interrupts from devices like keyboards and software interrupts from...read more

Add your answer
Frequently asked in

Q74. What is this command?

Ans.

The command is used to display the current working directory in a command line interface.

  • The command is 'pwd'

  • It stands for 'print working directory'

  • It is commonly used in Unix-based systems

  • It helps users identify their current location in the file system

View 1 answer

Q75. Explain priority scheduling (preemptive , non-preemptive). Explain a case when a low priority process will preempt a high priority process

Ans.

Priority scheduling is a scheduling algorithm where processes are assigned priorities and executed based on their priority level.

  • Preemptive priority scheduling allows a higher priority process to interrupt a lower priority process that is currently running.

  • Non-preemptive priority scheduling allows a higher priority process to wait until the lower priority process finishes executing.

  • A low priority process can preempt a high priority process if the high priority process is wait...read more

Add your answer
Frequently asked in
Q76. Operating System Question

Difference between Orphan and Zombie process

Ans.

Orphan process is a process whose parent process has terminated, while a zombie process is a process that has completed execution but still has an entry in the process table.

  • Orphan process: Parent process has terminated, but the child process is still running.

  • Zombie process: Child process has completed execution, but the parent process has not yet collected its exit status.

  • Orphan processes are adopted by the init process.

  • Zombie processes consume system resources and should be...read more

Add your answer

Q77. How to check stystem logs in linux ?

Ans.

To check system logs in Linux, use the command 'tail -f /var/log/syslog' or 'journalctl -f'.

  • Use 'tail -f /var/log/syslog' to view the system log in real-time

  • Use 'journalctl -f' to view the systemd journal in real-time

  • Use 'grep' command to filter the logs based on specific keywords

  • Logs are stored in /var/log directory with different file names for different services

Add your answer

Q78. What is the Sysvol folder? Why is it used?

Ans.

The Sysvol folder is a shared folder in Windows Server that stores the server's copy of the domain's public files.

  • Sysvol stands for System Volume and is used in Active Directory environments.

  • It contains important files for the domain, such as Group Policy objects, scripts, and logon/logoff scripts.

  • The Sysvol folder is replicated to all domain controllers in a domain, ensuring consistency and availability of these files.

  • It plays a crucial role in the functioning of Active Dire...read more

View 2 more answers

Q79. What is maximum Input output handle

Ans.

The maximum input output handle refers to the maximum number of inputs and outputs that a device can handle.

  • The maximum input output handle varies depending on the device and its specifications.

  • It is important to consider the maximum input output handle when selecting a device for a project.

  • For example, a PLC may have a maximum input output handle of 256 inputs and 256 outputs.

  • Another example is a microcontroller with a maximum input output handle of 40 pins.

  • Exceeding the max...read more

Add your answer

Q80. How to create bonding in linux

Ans.

Bonding in Linux is a technique to combine multiple network interfaces into a single virtual interface for increased bandwidth and fault tolerance.

  • Install the bonding driver module

  • Configure the bonding interface in the network configuration file

  • Specify the bonding mode and options

  • Assign the physical interfaces to the bonding interface

  • Restart the network service to apply the changes

Add your answer

Q81. how to work DNS in Linux ? what is the record of DNS?

Ans.

DNS in Linux is managed through configuration files and commands. DNS records contain information about domain names and IP addresses.

  • DNS in Linux is managed through the /etc/resolv.conf file which contains the IP addresses of DNS servers.

  • The 'nslookup' command can be used to query DNS records for a specific domain name.

  • DNS records include A records (IP address), MX records (mail server), CNAME records (alias), and more.

  • DNS caching can improve performance by storing frequentl...read more

Add your answer

Q82. How to reinstall drivers for any hardware?

Ans.

To reinstall drivers for any hardware, follow these steps.

  • Uninstall the current driver from Device Manager

  • Download the latest driver from the manufacturer's website

  • Install the new driver by running the setup file

  • Restart the computer to complete the installation

  • If the driver is not available on the website, use Windows Update or a driver update tool

  • Ensure compatibility with the operating system and hardware version

Add your answer

Q83. What is a Real-Time System ?

Ans.

A real-time system is a computer system that processes data as it is received and provides immediate results.

  • Real-time systems are used in industries such as aviation, healthcare, and finance.

  • They require fast response times and high reliability.

  • Examples include air traffic control systems, medical monitoring devices, and stock trading systems.

Add your answer

Q84. How will you open a file whos size is double that of RAM on your system.?

Ans.

Use memory-mapped files or stream the file in chunks.

  • Use memory-mapped files to access the file in chunks.

  • Stream the file in chunks using a buffer.

  • Use compression techniques to reduce the file size before opening.

Add your answer
Frequently asked in

Q85. What is threading and how it work.

Ans.

Threading is a way of achieving multitasking in a single process by dividing it into smaller threads.

  • Threads are lightweight processes that share the same memory space.

  • They can run concurrently and independently of each other.

  • Threading can improve performance by utilizing multiple CPU cores.

  • Examples of threading include GUI applications, web servers, and video games.

View 1 answer
Frequently asked in

Q86. How to install drivers for different IO devices?

Ans.

IO devices require specific drivers to be installed for proper functioning.

  • Identify the device and its manufacturer

  • Download the appropriate driver from the manufacturer's website

  • Run the installer and follow the on-screen instructions

  • Restart the computer if prompted

  • Verify the device is working properly in Device Manager

Add your answer

Q87. Is there any ideal CPU scheduling possible? Justify your answer?

Ans.

No, there is no ideal CPU scheduling possible.

  • CPU scheduling is a complex problem with many variables.

  • Different scheduling algorithms are suited for different scenarios.

  • The ideal scheduling algorithm would depend on the specific system and workload.

  • For example, a real-time system would require a different scheduling algorithm than a batch processing system.

Add your answer
Frequently asked in

Q88. What is a hypervisor?

Ans.

A hypervisor is a software or hardware component that enables the virtualization of computer hardware.

  • A hypervisor allows multiple operating systems to run on a single physical machine.

  • It provides a layer of abstraction between the physical hardware and the virtual machines.

  • There are two types of hypervisors: Type 1 (bare-metal) and Type 2 (hosted).

  • Examples of hypervisors include VMware ESXi, Microsoft Hyper-V, and KVM.

Add your answer

Q89. How does a linux boot ?

Ans.

Linux boot process involves several stages including BIOS, bootloader, kernel initialization, and user space initialization.

  • BIOS performs a power-on self-test and loads the bootloader from the boot device.

  • Bootloader loads the kernel into memory and initializes it.

  • Kernel initializes hardware, mounts the root file system, and starts the init process.

  • Init process starts user space processes and services.

  • Linux boot process can be customized by modifying bootloader configuration a...read more

Add your answer
Frequently asked in

Q90. How will you monitor file change in linux ?

Ans.

Use inotifywait command to monitor file changes in Linux.

  • Install inotify-tools package

  • Use inotifywait command with options like -m for continuous monitoring and -e for specific events

  • Example: inotifywait -m /var/log/messages -e modify

  • Output will show the file path, event type and timestamp

Add your answer
Frequently asked in

Q91. What is load average? List of commands that gives you the metric.

Ans.

Load average is the average number of processes in the run queue over a period of time.

  • Load average is a metric that measures the average number of processes that are either in a running or uninterruptable sleep state.

  • It is calculated over a period of time, usually 1, 5, or 15 minutes.

  • The load average is displayed as three numbers, which represent the load average for the past 1, 5, and 15 minutes, respectively.

  • Commands that give the load average metric include 'uptime', 'top...read more

Add your answer
Q92. Operating System Question

What is RAID structure in OS? What are the different levels of RAID configuration?

Ans.

RAID (Redundant Array of Independent Disks) is a data storage technology that combines multiple physical drives into a single logical unit.

  • RAID provides improved performance, fault tolerance, and increased storage capacity.

  • There are different levels of RAID configuration, including RAID 0, RAID 1, RAID 5, RAID 10, etc.

  • RAID 0 offers striping without redundancy, providing increased performance but no fault tolerance.

  • RAID 1 uses mirroring, where data is duplicated on multiple dr...read more

Add your answer

Q93. What is the system knowledge?

Ans.

System knowledge refers to a comprehensive understanding of the processes, procedures, and technologies within a specific system or software.

  • It includes knowledge of how the system functions, its components, and their interactions.

  • Understanding the system's architecture, databases, and interfaces is crucial.

  • Knowledge of system configuration, customization, and troubleshooting is important.

  • Familiarity with system upgrades, integrations, and security measures is necessary.

  • Examp...read more

View 1 answer

Q94. How to repair Ubuntu OS when it got corrupted?

Ans.

To repair a corrupted Ubuntu OS, boot into recovery mode and use the built-in repair options.

  • Boot into recovery mode by holding down the Shift key during startup

  • Select the 'fsck' option to check and repair file system errors

  • Use the 'dpkg' option to fix broken packages

  • If all else fails, reinstall Ubuntu while preserving your personal files

  • Make sure to regularly backup important data to prevent data loss

Add your answer

Q95. Why VFS.?

Ans.

VFS is a leading global outsourcing and technology services specialist.

  • VFS has a strong reputation in the industry for its expertise and quality of service.

  • VFS has a global presence, which provides opportunities for growth and exposure to different cultures and markets.

  • VFS offers a wide range of services and solutions, allowing for diverse and challenging work.

  • VFS values its employees and invests in their development and career progression.

  • VFS has a track record of success an...read more

View 1 answer

Q96. How to release, renew IP in CMD?

Ans.

To release and renew IP in CMD, use the commands 'ipconfig /release' and 'ipconfig /renew'.

  • Open Command Prompt

  • Type 'ipconfig /release' and press Enter to release the current IP address

  • Type 'ipconfig /renew' and press Enter to obtain a new IP address

  • You can also use 'ipconfig /all' to view detailed information about network interfaces

View 1 answer

Q97. What are different computer platforms available?

Ans.

Different computer platforms include Windows, macOS, Linux, and mobile platforms like iOS and Android.

  • Windows is a popular computer platform developed by Microsoft.

  • macOS is the operating system used on Apple computers.

  • Linux is an open-source platform that is widely used in servers and embedded systems.

  • iOS is the mobile platform used on Apple devices.

  • Android is the mobile platform used on a variety of devices from different manufacturers.

View 3 more answers

Q98. What is grep

Ans.

grep is a command-line utility for searching text files for specific patterns.

  • Used to search for specific patterns in text files

  • Can be used with regular expressions

  • Can search for patterns in multiple files at once

  • Can be used to filter output from other commands

Add your answer

Q99. what is multiprocessing and multi threading

Ans.

Multiprocessing is the use of multiple processors to execute multiple tasks simultaneously. Multithreading is the use of multiple threads within a single process to execute multiple tasks simultaneously.

  • Multiprocessing involves the use of multiple processors or cores to execute multiple tasks simultaneously.

  • Multithreading involves the use of multiple threads within a single process to execute multiple tasks simultaneously.

  • Multiprocessing is typically used for CPU-intensive ta...read more

Add your answer
Frequently asked in

Q100. if disk is full what will u do?

Ans.

Free up disk space by identifying and removing unnecessary files.

  • Identify large files and delete them

  • Remove old log files

  • Clear cache and temporary files

  • Compress large files

  • Move files to another disk or server

Add your answer
1
2
3
Interview Tips & Stories
Ace your next interview with expert advice and inspiring stories

Interview experiences of popular companies

3.7
 • 10k Interviews
3.9
 • 7.8k Interviews
3.7
 • 7.3k Interviews
3.8
 • 5.4k Interviews
3.7
 • 5.2k Interviews
4.1
 • 4.9k Interviews
3.8
 • 4.6k Interviews
3.6
 • 3.7k Interviews
3.6
 • 3.6k Interviews
4.0
 • 535 Interviews
View all
Operating Systems Interview Questions
Share an Interview
Stay ahead in your career. Get AmbitionBox app
qr-code
Helping over 1 Crore job seekers every month in choosing their right fit company
70 Lakh+

Reviews

5 Lakh+

Interviews

4 Crore+

Salaries

1 Cr+

Users/Month

Contribute to help millions
Get AmbitionBox app

Made with ❤️ in India. Trademarks belong to their respective owners. All rights reserved © 2024 Info Edge (India) Ltd.

Follow us
  • Youtube
  • Instagram
  • LinkedIn
  • Facebook
  • Twitter