Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Unix Interview Questions
Questions Answers Views Company eMail

what is the functionality of kernel in unix architecture?

12 33329

Sorry to all Technical person for mistake of Question. Now i am post currect question Why copied file permission is changed in destination. When i give all permission i.e 777 to file and copy that to other location in destination the permission is 755. But if give permission 555 in destination that file permission is 555 and if give permission 444 to file after copy in destination the file permission is 444. These all are happening in normal user. How the umask value is calculate here really i am not understand. Please write the proper answer. Thanks in Advance

TCS,

3 9038

What is RC (return code)? What is useful for? Which are the common values?

Accenture,

1 8207

What does "bulk loading of a table" mean? Can you describe advantages or disadvantages of using these features?

Accenture,

2 13003

What is a "parameter card" and what is useful for?

Accenture,

1 10297

Suppose you have a scheduling chain where the process 1 is a predecessor of the process 2 and both of them are scheduled every Monday at 8.00pm. Will I find execution log of process 1 every Tuesday morning? And what about the other one? Why?

Accenture, IBM,

1 5261

How i'll delete a particular line from the file? Please give answer as soon as possible. Thanks in advance.

IBM,

12 23514

What is the number of the masked code ee@?

Accenture, Amazon, Amdocs,

2 33095

What is difference between SSH V1 and SSH V2? What are drawbacks of SSH V2?

Wipro,

1 11943

How to display a file name which has zero bytes in size.

Polaris,

11 21522

what is the difference between KILL and KILL -9?

Informatica, Nutanix,

5 28629

What are the general Commands in using Unix OS for a beginner? how many commands you know in that?

2 7097

what is the difference between SED and GREP ? Which one is more better and why?

IBM,

4 36917

how to find the 51th record of a file containing 100 records in unix.

IBM,

12 24931

how to use grep command to list find the records of a file containg 10 different strings

IBM,

5 13880


Un-Answered Questions { Unix }

How can I write a multi-homed server?

1647


What is unix and why it is used?

1008


What do know about tee command and its usage?

1185


What is the condition required for dead lock in unix system?

972


How to write the program on full-duplex communication on bidirectional(e.g using two pipes)?

1017


What is a bash command?

1184


Which file system is used in unix?

994


How can I set the timeout for the connect() system call?

1512


Explain what are links and symbolic links in unix file system?

984


What is sed awk grep?

1139


What is nr in awk command?

1211


Is there any advantage to handling the signal, rather than just ignoring it and checking for the EPIPE error? Are there any useful parameters passed to the signal catching function?

1427


What is protection boundary?

1069


Name two paging states for a page in memory?

1064


What is hardlink and softlink in unix?

983