Krishna Logo
qa training in canada now
Divied
Call: Anusha @ 1 (877) 864-8462

 

Latest News
Home Navigation Divied
INTERVIEW Navigation Divied UNIX INTERVIEW QUESTIONS
Showing 141 - 150 of 324 Previous | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next
UNIX INTERVIEW QUESTIONS
 
141Explain About DELETE And BREAK?
Date Posted: 07/02/2012

Ans: These keys have significant meaning sometimes DELETE is called as RUBOUT key. Break is sometimes called INTERRUPT. In most SYSTEMS the delete key stops a program immediately, without waiting for it to finish on some systems, Ctrl-C provides this service. Break is a synonym for DELETE or CTRL-C.

 
 
142How Would You Kill A Process?
Date Posted: 07/02/2012

Ans: The kill command takes the PID as one argument; this identifies which process to terminate. The PID of a process can be got using 'ps' command.

 
 
143How Can We Add The Modules In The Kernel?
Date Posted: 07/02/2012

Ans: We can use modload and the module name.

 
 
144What Are The Bits That Support The Demand Paging?
Date Posted: 07/02/2012

Ans: Valid, Reference, Modify, Copy on write, Age. These bits are the part of the page table entry, which includes physical address of the page and protection bits.

Page address
Age Copy on write Modify Reference Valid Protection

 
 
145What Is The Window Of The Working Set Of A Process?
Date Posted: 07/02/2012

Ans: The window of the working set of a process is the total number in which the process had referred the set of pages in the working set of the process.

 
 
146Explain About Vis?
Date Posted: 07/02/2012

Ans: Vis that copied its standard input to its standard output, except that it makes all non printing characters visible by printing them as nn, where nnn is the octal value of the character. Vis is invaluable for detecting strange or unwanted characters that may have crept into files.

 
 

Ans: Every file has following attributes: owner's user ID ( 16 bit integer ) owner's group ID ( 16 bit integer ) File access mode word 'r w x -r w x- r w x' (user permission-group permission-others permission) r-read,...  

 
 
148In What Way The Validity Fault Handler Concludes?
Date Posted: 07/02/2012

Ans:
It sets the valid bit of the page by clearing the modify bit.
It recalculates the process priority.

 
 
149What Is Fork Swap?
Date Posted: 07/02/2012

Ans: Fork () is a system call to create a child process. When the parent process calls fork() system call, the child process is created and if there is short of memory then the child process is sent to the read-to-run state in the swap device, and return to the user state without swapping the parent process. When the memory will be available the child process will be swapped into the main memory.

 
 
150What Do You Mean By U-area (user Area) Or U-block
Date Posted: 07/02/2012

Ans: This contains the private data that is manipulated only by the Kernel. This is local to the Process, i.e. each process is allocated a u-area.

 
Showing 141 - 150 of 324 Previous | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | Next
Shadow Bottom
 
 
© 2005 -