Krishna Logo
Divied
Call: Harsha @ 571-386-2972

 

Loading
Latest News
Home Navigation Divied
INTERVIEW Navigation Divied UNIX INTERVIEW QUESTIONS
Showing 1 - 10 of 324 Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next
UNIX INTERVIEW QUESTIONS
 
1What Is Database Testing?
Date Posted: 07/02/2012

Ans: Data base testing basically include the following.
1) Data validity testing.
2) Data Integrity testing
3) Performance related to data base.
4) Testing of Procedure, triggers and functions.
For doing data validity testing you should be good in SQL queries
For data integrity testing you should know about referential integrity and different constraint.
For performance related things you should have idea about the table structure and design.
For testing Procedure triggers and functions you should be able to understand the same.

 
 
2How Does The System Know Where One Command Ends And Another Begins?
Date Posted: 07/02/2012

Ans: Normally, the newline character, which is generated by the ENTER or RETURN key, acts as the signpost. However, the semicolon and the ampersand characters can also serve as command terminators.

 
 
3What Is Parsing?
Date Posted: 07/02/2012

Ans: Parsing is the process of breaking up of a command line into words. This is made possible by using delimiters and spaces. In the event that tabs or multiple spaces are part of the command, these are eventually replaced by a single space

 
 
4Why Is It That It Is Not Advisable To Use Root As The Default Login?
Date Posted: 07/02/2012

Ans: The root account is very important, and with abusive usage, can easily lead to system damage. That’s because safeguards that normally apply to user accounts are not applicable to the root account.

 
 
5What Is The Standard Convention Being Followed When Naming Files In UNIX?
Date Posted: 07/02/2012

Ans: One important rule when naming files is that characters that have special meaning are not allowed, such as * / & and %. A directory, being a special type of file, follows the same naming convention as that of files. Letters and numbers are used, along with characters like underscore and dot characters.

 
 
6Is It Possible To See Information About A Process While It Is Being Executed?
Date Posted: 07/02/2012

Ans: Every process is uniquely identified by a process identifier. It is possible to view details and status regarding a process by using the ps command.

 
 
7What Is A Super User?
Date Posted: 07/02/2012

Ans: A super user is a special type user who has open access to all files and commands on a system. Note that the super user’s login is usually root, and is protected by a so-called root password.

 
 
8What Is Piping?
Date Posted: 07/02/2012

Ans: Piping, represented by the pipe character “|”, is used to combine two or more commands together. The output of the first command serves as input the next command, and so on.

 
 
9What Is The Use Of -l When Listing A Directory?
Date Posted: 07/02/2012

Ans: -l, which is normally used in listing command like ls, is used to show files in a long format, one file per line. Long format refers to additional information that is associated with the file, such as ownership, permissions, data and file size.

 
 
10Enumerate Some Of The Most Commonly Used Network Commands In UNIX?
Date Posted: 07/02/2012

Ans:
- Telnet – used for remote login
- ping – an echo request for testing connectivity
- su – user switching command
- ftp – file transfer protocol used for copying files
- finger – information gathering command

 
Showing 1 - 10 of 324 Previous | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | Next
Shadow Bottom
 
    Courses Offered
  • Courses not available.
 
© 2005 - 2018 Krishna Training.
Designed & Developed By BitraNet