Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

How To Reduce The Reserved Space Of The Disk?

Answer»

This will REDUCE the RESERVED SPACE to 2%
# tunefs –m 2 /dev/rdsk/c1d0s0 

This will reduce the reserved space to 2%
# tunefs –m 2 /dev/rdsk/c1d0s0 

2.

Brief Filesystem Structure?

Answer»

VTOC present in the first sector in the raw DISK area.
VTOC - 512 sector
Boot Block - 1-15 sector
Super Block - 16-31
First Cylinder GROUP - 32

VTOC present in the first sector in the raw disk area.
VTOC - 512 sector
Boot Block - 1-15 sector
Super Block - 16-31
First Cylinder Group - 32

3.

Type Of Filesystems ?

Answer»
  • Disk Based FS : UFS (Unix FS), hsfs (High Sierra FS), pcfs (PC FS for DOS FAT32), 
  • UDFS : Universal Disk FORMAT FS
  • NETWORK FS : nfs (Network FS) 
  • Memory based FS (Pseudo FS) : tmpfs, swapfs, procfs, mntfs

4.

How To View Vtoc (volume Table Of Contents)?and How To Copy?

Answer»

PRINT the VTOC
# prtvtoc /dev/rdsk/c0t0d0s2

COPY the VTOC to other DISK
# prtvtoc /dev/rdsk/c0t0d0s2|fmthard -s - /dev/rdsk/c1t0d0s2

Print the VTOC
# prtvtoc /dev/rdsk/c0t0d0s2

Copy the VTOC to other disk
# prtvtoc /dev/rdsk/c0t0d0s2|fmthard -s - /dev/rdsk/c1t0d0s2

5.

Explain About Port Of Telnet, Ssh, Ftp, Http, Nfs, Ntp?

Answer»

6.

What Is The Difference Between Dsk And Rdsk?

Answer»
  • DSK: Block level devices, FS Which are FORMATTED and mounted that device is called block device.
  • RDSK: Raw level device or CHARACTER level device

7.

Describe About Fsck?

Answer»

FSCK Utility is for checking and repairing the files system inconsistencies, It has 5 phases 

Phase 1: Check Blocks and SIZES - checks inodes for inconsistencies
Phase 2: Check Path-Names - checks directory inode consistencies
Phase 3: Check Connectivity - checks that all directories are connected to the file system
Phase 4: Check Reference COUNTS - compares link count information from Phases 2 & 3, correcting discrepancies
Phase 5: Check Cylinder Groups - checks free blocks and the used inode maps for consistency
Phase 6: Salvage Cylinder Groups - UPDATE the tables to reflect any CHANGES made in earlier passes

FSCK Utility is for checking and repairing the files system inconsistencies, It has 5 phases 

Phase 1: Check Blocks and Sizes - checks inodes for inconsistencies
Phase 2: Check Path-Names - checks directory inode consistencies
Phase 3: Check Connectivity - checks that all directories are connected to the file system
Phase 4: Check Reference Counts - compares link count information from Phases 2 & 3, correcting discrepancies
Phase 5: Check Cylinder Groups - checks free blocks and the used inode maps for consistency
Phase 6: Salvage Cylinder Groups - update the tables to reflect any changes made in earlier passes

8.

Explain The Boot Process?

Answer»

Boot process dived into 4 PHASES

  1. POST : Power on self test (POST), It will detect HARDWARE, machine host ID,serial No, architecture type, memory and Ethernet address and it will load the primary program called bootblk. 
  2. OBPROM : Open boot programmable Diagnosing all the system hardware and memory. Initializing the boot parameter. Creating device trees and load the boot block from (0-15 sector), it is called as SECONDARY boot -- programmable ufsboot. 
  3. KERNEL INITIALIZATION : ufsboot load the kernel (generic unix) kernel will load all the necessary devices modules to mount the root partition to continue the booting process .
  4. INIT PHASES : It will started by executing of /etc/init program and start other process reading the /etc/inittab FILES, as the directory in the /etc/inittab files. 

Boot process dived into 4 phases. 

9.

What Is The Difference Between Init 1 And Init S?

Answer»

If you switch from MULTIUSER MODE to init s and switch it back to multiuser mode.then remote useres AUTOMATICALLY reconnects to the system. where as in the case of init 1. they have to RECONNECT manually means they have to relogin 

If you switch from multiuser mode to init s and switch it back to multiuser mode.then remote useres automatically reconnects to the system. where as in the case of init 1. they have to reconnect manually means they have to relogin 

10.

Brief About Init Phases?

Answer»

There are 8 run level.

  1. Init0: Shutting down the system and BRING back the system to OBP Prompt (OK)
  2. Init1: Single user mode for administrative
  3. Init2: Multi user mode without RESOURCE sharing
  4. Init3: Multi user mode with resource sharing
  5. Init4: Not in use
  6. Init5: Shutdown and POWER off the system
  7. Init6: REBOOT the system to default run level
  8. Inits: Single user mode but user login are disabled

There are 8 run level.

11.

Is There A Way To Erase All Files In The Current Directory, Including All Its Sub-directories, Using Only One Command?

Answer»

Yes, that is possible. Use “rm –r *” for this purpose. The rm command is for deleting files. The –r option will erase DIRECTORIES and subdirectories, including files WITHIN. The ASTERISK REPRESENTS all entries.

Yes, that is possible. Use “rm –r *” for this purpose. The rm command is for deleting files. The –r option will erase directories and subdirectories, including files within. The asterisk represents all entries.

12.

What Is The Chief Difference Between The –v And –x Option S To Set?

Answer»

The –v OPTION echoes each COMMAND before arguments and VARIABLES have been substituted for; the –x option echoes the COMMANDS after substitution has taken PLACE.

The –v option echoes each command before arguments and variables have been substituted for; the –x option echoes the commands after substitution has taken place.

13.

What Is Shell?

Answer»

A SHELL acts as an interface between the user and the system. As a command interpreter, the shell TAKES COMMANDS and sets them up for execution.

A shell acts as an interface between the user and the system. As a command interpreter, the shell takes commands and sets them up for execution.

14.

What Is Command Substitution?

Answer»

Command substitution is one of the STEPS being PERFORMED every TIME commands are processed by the shell. Commands that are enclosed in backquotes are executed by the shell. This will then REPLACE the standard output of the command and displayed on the command line.

Command substitution is one of the steps being performed every time commands are processed by the shell. Commands that are enclosed in backquotes are executed by the shell. This will then replace the standard output of the command and displayed on the command line.

15.

Differentiate Multiuser From Multitask?

Answer»

Multiuser means that more than one person can use the computer at the same time. MULTITASK means that even a SINGLE user can have the computer WORK on more than one task or program at the same time.

Multiuser means that more than one person can use the computer at the same time. Multitask means that even a single user can have the computer work on more than one task or program at the same time.

16.

What Is A Directory?

Answer»

EVERY file is assigned to a directory. A directory is a SPECIALIZED FORM of file that MAINTAINS a LIST of all files in it.

Every file is assigned to a directory. A directory is a specialized form of file that maintains a list of all files in it.

17.

What Is Inode?

Answer»

An inode is an entry CREATED on a section of the disk SET aside for a file system. The inode contains nearly all there is to know about a file, which INCLUDES the location on the disk where the file starts, the size of the file, when the file was LAST used, when the file was last changed, what the various read, write and execute permissions are, who owns the file, and other information.

An inode is an entry created on a section of the disk set aside for a file system. The inode contains nearly all there is to know about a file, which includes the location on the disk where the file starts, the size of the file, when the file was last used, when the file was last changed, what the various read, write and execute permissions are, who owns the file, and other information.

18.

Briefly Describe The Shell’s Responsibilities?

Answer»
  • program execution
  • variable and FILE NAME substitution
  • I/O redirection
  • pipeline hookup
  • environment control
  • interpreted PROGRAMMING language

19.

Describe File Systems In Unix?

Answer»

Understanding file SYSTEMS in UNIX has to do with knowing how files and inodes are stored on a SYSTEM. What happens is that a DISK or PORTION of a disk is set ASIDE to store files and the inode entries. The entire functional unit is referred to as a file system.

Understanding file systems in UNIX has to do with knowing how files and inodes are stored on a system. What happens is that a disk or portion of a disk is set aside to store files and the inode entries. The entire functional unit is referred to as a file system.

20.

Differentiate Relative Path From Absolute Path?

Answer»

Relative path refers to the path relative to the CURRENT path. ABSOLUTE path, on the other HAND, refers to the EXACT path as REFERENCED from the root directory.

Relative path refers to the path relative to the current path. Absolute path, on the other hand, refers to the exact path as referenced from the root directory.

21.

Explain The Importance Of Directories In A Unix System?

Answer»

Files in a DIRECTORY can actually be a directory itself; it would be CALLED a subdirectory of the ORIGINAL. This capability makes it possible to develop a tree-like structure of DIRECTORIES and files, which is crucial in MAINTAINING an organizational scheme.

Files in a directory can actually be a directory itself; it would be called a subdirectory of the original. This capability makes it possible to develop a tree-like structure of directories and files, which is crucial in maintaining an organizational scheme.

22.

What Are Shell Variables?

Answer»

Shell variables are a combination of a name ( identifier), and an assigned VALUE, which EXIST within the shell. These variables may have default values, or whose values can be manually set USING the appropriate ASSIGNMENT command. Examples of shell variable are PATH, TERM and HOME.

Shell variables are a combination of a name ( identifier), and an assigned value, which exist within the shell. These variables may have default values, or whose values can be manually set using the appropriate assignment command. Examples of shell variable are PATH, TERM and HOME.

23.

What Are The Differences Among A System Call, A Library Function, And A Unix Command?

Answer»

A SYSTEM call is part of the programming for the kernel. A library function is a program that is not part of the kernel but which is available to users of the system. UNIX commands, HOWEVER, are stand-alone PROGRAMS; they MAY INCORPORATE both system calls and library functions in their programming.

A system call is part of the programming for the kernel. A library function is a program that is not part of the kernel but which is available to users of the system. UNIX commands, however, are stand-alone programs; they may incorporate both system calls and library functions in their programming.

24.

Enumerate Some Of The Most Commonly Used Network Commands In Unix?

Answer»
  • telnet – used for remote LOGIN
  • ping – an echo request for testing connectivity
  • su – user SWITCHING command
  • ftp – file transfer protocol used for copying FILES
  • FINGERINFORMATION gathering command

25.

Differentiate Cmp Command From Diff Command?

Answer»

The cmp command is USED mainly to compare two FILES byte by byte, after which the first encountered mismatch is shown. On the other HAND, the diff command is used to INDICATE the CHANGES that is to be made in order to make the two files identical to each other.

The cmp command is used mainly to compare two files byte by byte, after which the first encountered mismatch is shown. On the other hand, the diff command is used to indicate the changes that is to be made in order to make the two files identical to each other.

26.

What Is The Use Of -l When Listing A Directory?

Answer»

-l, which is normally used in LISTING command like ls, is used to show files in a long format, one FILE per line. Long format REFERS to additional INFORMATION that is associated with the file, such as ownership, permissions, data and filesize.

-l, which is normally used in listing command like ls, is used to show files in a long format, one file per line. Long format refers to additional information that is associated with the file, such as ownership, permissions, data and filesize.

27.

What Is Piping?

Answer»

Piping, represented by the PIPE character “|”, is used to COMBINE TWO or more commands together. The output of the first command SERVES as input the NEXT command, and so on.

Piping, represented by the pipe character “|”, is used to combine two or more commands together. The output of the first command serves as input the next command, and so on.

28.

What Is A Superuser?

Answer»

A SUPERUSER is a special type user who has open access to all FILES and commands on a system. Note that the superuser’s login is USUALLY root, and is PROTECTED by a so-called root password.

A superuser is a special type user who has open access to all files and commands on a system. Note that the superuser’s login is usually root, and is protected by a so-called root password.

29.

How Do You Determine And Set The Path In Unix?

Answer»

Each time you enter a command, a VARIABLE NAMED PATH or path will define in which directory the shell will search for that command. In cases wherein an error message was RETURNED, the reason maybe that the command was not in your path, or that the command itself does not exist. You can ALSO manually set the path using the “set path = [directory path]” command.

Each time you enter a command, a variable named PATH or path will define in which directory the shell will search for that command. In cases wherein an error message was returned, the reason maybe that the command was not in your path, or that the command itself does not exist. You can also manually set the path using the “set path = [directory path]” command.

30.

Is It Possible To See Information About A Process While It Is Being Executed?

Answer»

Every process is uniquely identified by a process IDENTIFIER. It is possible to VIEW details and status regarding a process by USING the ps COMMAND.

Every process is uniquely identified by a process identifier. It is possible to view details and status regarding a process by using the ps command.

31.

What Is The Standard Convention Being Followed When Naming Files In Unix?

Answer»

One important rule when naming files is that characters that have SPECIAL meaning are not allowed, such as * / & and %. A DIRECTORY, being a special type of file, follows the same naming CONVENTION as that of files. Letters and numbers are used, ALONG with characters like underscore and dot characters.

One important rule when naming files is that characters that have special meaning are not allowed, such as * / & and %. A directory, being a special type of file, follows the same naming convention as that of files. Letters and numbers are used, along with characters like underscore and dot characters.

32.

What Is The Use Of The Tee Command?

Answer»

The TEE COMMAND does two things: ONE is to get data from the standard INPUT and send it to standard output; the second is that it redirects a COPY of that input data into a file that was specified.

The tee command does two things: one is to get data from the standard input and send it to standard output; the second is that it redirects a copy of that input data into a file that was specified.

33.

What Is Unix?

Answer»

It is a portable operating SYSTEM that is designed for both EFFICIENT multi-tasking and mult-user functions. Its PORTABILITY allows it to run on different hardware platforms. It was WRITTEN is C and lets user do PROCESSING and control under a shell.

It is a portable operating system that is designed for both efficient multi-tasking and mult-user functions. Its portability allows it to run on different hardware platforms. It was written is C and lets user do processing and control under a shell.

34.

What Are File Names That Are Preceded By A Dot?

Answer»

In general, filenames that are preceded by a dot are HIDDEN files. These files can be configuration files that hold important DATA or setup info. Setting these files as hidden makes it less likely to be ACCIDENTALLY DELETED.

In general, filenames that are preceded by a dot are hidden files. These files can be configuration files that hold important data or setup info. Setting these files as hidden makes it less likely to be accidentally deleted.

35.

What Is The Maximum Length For A File Name Under Linux?

Answer»

Any filename can have a maximum of 255 characters. This limit does not include the PATH name, so THEREFORE the ENTIRE PATHNAME and filename could well exceed 255 characters.

Any filename can have a maximum of 255 characters. This limit does not include the path name, so therefore the entire pathname and filename could well exceed 255 characters.

36.

What Are Hard Links?

Answer»

Hard links point DIRECTLY to the physical file on DISK, and not on the path name. This means that if you RENAME or move the original file, the link will not break, SINCE the link is for the file itself, not the path where the file is located.

Hard links point directly to the physical file on disk, and not on the path name. This means that if you rename or move the original file, the link will not break, since the link is for the file itself, not the path where the file is located.

37.

How Do You Access Partitions Under Linux?

Answer»

Linux ASSIGNS numbers at the end of the drive IDENTIFIER. For EXAMPLE, if the first IDE hard drive had THREE primary PARTITIONS, they would be named/numbered, /dev/hda1, /dev/hda2 and /dev/hda3.

Linux assigns numbers at the end of the drive identifier. For example, if the first IDE hard drive had three primary partitions, they would be named/numbered, /dev/hda1, /dev/hda2 and /dev/hda3.

38.

In Linux, What Names Are Assigned To The Different Serial Ports?

Answer»

SERIAL PORTS are identified as /dev/ttyS0 to /dev/ttyS7. These are the EQUIVALENT names of COM1 to COM8 in Windows.

Serial ports are identified as /dev/ttyS0 to /dev/ttyS7. These are the equivalent names of COM1 to COM8 in Windows.

39.

How Do You Change Permissions Under Linux?

Answer»

ASSUMING you are the system administrator or the owner of a FILE or directory, you can grant permission using the chmod command. USE + symbol to add permission or – symbol to deny permission, along with any of the following letters: U (user), g (group), o (others), a (all), r (read), w (write) and X (execute). For example the command chmod go+rw FILE1.TXT grants read and write access to the file FILE1.TXT, which is assigned to groups and others.

Assuming you are the system administrator or the owner of a file or directory, you can grant permission using the chmod command. Use + symbol to add permission or – symbol to deny permission, along with any of the following letters: u (user), g (group), o (others), a (all), r (read), w (write) and x (execute). For example the command chmod go+rw FILE1.TXT grants read and write access to the file FILE1.TXT, which is assigned to groups and others.

40.

Are Drives Such As Hard Drive And Floppy Drives Represented With Drive Letters?

Answer»

No. In LINUX, each DRIVE and device has different designations. For EXAMPLE, floppy drives are REFERRED to as /dev/fd0 and /dev/fd1. IDE/EIDE HARD drives are referred to as /dev/hda, /dev/hdb, /dev/hdc, and so forth.

No. In Linux, each drive and device has different designations. For example, floppy drives are referred to as /dev/fd0 and /dev/fd1. IDE/EIDE hard drives are referred to as /dev/hda, /dev/hdb, /dev/hdc, and so forth.

41.

How Do You Refer To The Parallel Port Where Devices Such As Printers Are Connected?

Answer»

Whereas under WINDOWS you refer to the parallel port as the LPT port, under Linux you refer to it as /dev/lp . LPT1, LPT2 and LPT3 would THEREFORE be REFERRED to as /dev/lp0, /dev/lp1, or /dev/lp2 under Linux.

Whereas under Windows you refer to the parallel port as the LPT port, under Linux you refer to it as /dev/lp . LPT1, LPT2 and LPT3 would therefore be referred to as /dev/lp0, /dev/lp1, or /dev/lp2 under Linux.

42.

Does The Ctrl+alt+del Key Combination Work On Linux?

Answer»

Yes, it does. Just like Windows, you can use this key combination to PERFORM a system restart. One difference is that you won’t be GETTING any CONFIRMATION message and therefore, reboot is IMMEDIATE.

Yes, it does. Just like Windows, you can use this key combination to perform a system restart. One difference is that you won’t be getting any confirmation message and therefore, reboot is immediate.

43.

What Are Symbolic Links?

Answer»

Symbolic LINKS act similarly to shortcuts in Windows. Such links point to programs, FILES or directories. It also ALLOWS you instant access to it WITHOUT having to go directly to the entire PATHNAME.

Symbolic links act similarly to shortcuts in Windows. Such links point to programs, files or directories. It also allows you instant access to it without having to go directly to the entire pathname.

44.

What Is Typical Size For A Swap Partition Under A Linux System?

Answer»

The preferred SIZE for a swap partition is twice the amount of physical memory AVAILABLE on the SYSTEM. If this is not POSSIBLE, then the minimum size should be the same as the amount of memory installed.

The preferred size for a swap partition is twice the amount of physical memory available on the system. If this is not possible, then the minimum size should be the same as the amount of memory installed.

45.

How Can You Find Out How Much Memory Linux Is Using?

Answer»

From a COMMAND shell, use the “concatenate” command: CAT /proc/meminfo for memory usage information. You should see a LINE starting something like: MEM: 64655360, etc. This is the total memory Linux thinks it has available to use.

From a command shell, use the “concatenate” command: cat /proc/meminfo for memory usage information. You should see a line starting something like: Mem: 64655360, etc. This is the total memory Linux thinks it has available to use.

46.

How Do You Open A Command Prompt When Issuing A Command?

Answer»

To open the DEFAULT shell (which is where the command prompt can be found), PRESS Ctrl-Alt-F1. This will provide a command line interface (CLI) from which you can run COMMANDS as needed.

To open the default shell (which is where the command prompt can be found), press Ctrl-Alt-F1. This will provide a command line interface (CLI) from which you can run commands as needed.

47.

Describe The Root Account?

Answer»

The ROOT account is like a systems administrator account, and allows you FULL control of the system. Here you can create and maintain user accounts, assigning different permissions for each account. It is the default account EVERY TIME you INSTALL Linux.

The root account is like a systems administrator account, and allows you full control of the system. Here you can create and maintain user accounts, assigning different permissions for each account. It is the default account every time you install Linux.

48.

What Is The Importance Of The Gnu Project?

Answer»

This so-called FREE software movement allows several advantages, such as the FREEDOM to run programs for any purpose and freedom to STUDY and MODIFY a program to your needs. It also allows you to redistribute copies of a software to other people, as well as freedom to IMPROVE software and have it released to the public.

This so-called Free software movement allows several advantages, such as the freedom to run programs for any purpose and freedom to study and modify a program to your needs. It also allows you to redistribute copies of a software to other people, as well as freedom to improve software and have it released to the public.

49.

What Is The Basic Difference Between Bash And Dos?

Answer»

The KEY DIFFERENCES between the BASH and DOS console lies in 3 areas:

  1. BASH commands are case sensitive while DOS commands are not.
  2. under BASH, / character is a directory separator and acts as an escape character. Under DOS, / serves as a command argument delimiter and is the directory separator.
  3. DOS follows a CONVENTION in NAMING files, which is 8 character file name followed by a dot and 3 character for the extension. BASH follows no such convention.

The key differences between the BASH and DOS console lies in 3 areas:

50.

Does It Help For A Linux System To Have Multiple Desktop Environments Installed?

Answer»

In general, one desktop environment, like KDE or Gnome, is GOOD enough to operate without issues. It’s all a matter of preference for the USER, although the system allows switching from one environment to another. Some programs will work on one environment and not work on the other, so it could ALSO be considered a factor in selecting which environment to use.

In general, one desktop environment, like KDE or Gnome, is good enough to operate without issues. It’s all a matter of preference for the user, although the system allows switching from one environment to another. Some programs will work on one environment and not work on the other, so it could also be considered a factor in selecting which environment to use.