Skip to main content

Linux Interview Questions

  1. You need to see the last fifteen lines of the files dog, cat and horse. What command should you use?
    tail -15 dog cat horse
    The tail utility displays the end of a file. The -15 tells tail to display the last fifteen lines of each specified file.
  2. Who owns the data dictionary?
    The SYS user owns the data dictionary. The SYS and SYSTEM users are created when the database is created.
  3. You routinely compress old log files. You now need to examine a log from two months ago. In order to view its contents without first having to decompress it, use the _________ utility.
    zcat
    The zcat utility allows you to examine the contents of a compressed file much the same way that cat displays a file.
  4. You suspect that you have two commands with the same name as the command is not producing the expected results. What command can you use to determine the location of the command being run?
    which
    The which command searches your path until it finds a command that matches the command you are looking for and displays its full path.
  5. You locate a command in the /bin directory but do not know what it does. What command can you use to determine its purpose.
    whatis
    The whatis command displays a summary line from the man page for the specified command.
  6. You wish to create a link to the /data directory in bob's home directory so you issue the command ln /data /home/bob/datalink but the command fails. What option should you use in this command line to be successful.
    Use the -F option
    In order to create a link to a directory you must use the -F option.
  7. When you issue the command ls -l, the first character of the resulting display represents the file's ___________.
    type
    The first character of the permission block designates the type of file that is being displayed.
  8. What utility can you use to show a dynamic listing of running processes? __________
    top
    The top utility shows a listing of all running processes that is dynamically updated.
  9. Where is standard output usually directed?
    to the screen or display
    By default, your shell directs standard output to your screen or display.
  10. You wish to restore the file memo.ben which was backed up in the tarfile MyBackup.tar. What command should you type?
    tar xf MyBackup.tar memo.ben
    This command uses the x switch to extract a file. Here the file memo.ben will be restored from the tarfile MyBackup.tar.
  11. You need to view the contents of the tarfile called MyBackup.tar. What command would you use?
    tar tf MyBackup.tar
    The t switch tells tar to display the contents and the f modifier specifies which file to examine.
  12. You want to create a compressed backup of the users' home directories. What utility should you use?
    tar
    You can use the z modifier with tar to compress your archive at the same time as creating it.
  13. What daemon is responsible for tracking events on your system?
    syslogd
    The syslogd daemon is responsible for tracking system information and saving it to specified log files.
  14. You have a file called phonenos that is almost 4,000 lines long. What text filter can you use to split it into four pieces each 1,000 lines long?
    split
    The split text filter will divide files into equally sized pieces. The default length of each piece is 1,000 lines.
  15. You would like to temporarily change your command line editor to be vi. What command should you type to change it?
    set -o vi
    The set command is used to assign environment variables. In this case, you are instructing your shell to assign vi as your command line editor. However, once you log off and log back in you will return to the previously defined command line editor.
  16. What account is created when you install Linux?
    root
    Whenever you install Linux, only one user account is created. This is the superuser account also known as root.
  17. What command should you use to check the number of files and disk space used and each user's defined quotas?
    repquota
    The repquota command is used to get a report on the status of the quotas you have set including the amount of allocated space and amount of used space.

Comments

Popular posts from this blog

Asynchronous Vs. Synchronous Communications

Synchronous (One thread):   1 thread -> |<---A---->||<----B---------->||<------C----->| Synchronous (multi-threaded):   thread A -> |<---A---->| \ thread B ------------> ->|<----B---------->| \ thread C ----------------------------------> ->|<------C----->|

WebSphere MQ Interview Questions

What is MQ and what does it do? Ans. MQ stands for MESSAGE QUEUEING. WebSphere MQ allows application programs to use message queuing to participate in message-driven processing. Application programs can communicate across different platforms by using the appropriate message queuing software products. What is Message driven process? Ans . When messages arrive on a queue, they can automatically start an application using triggering. If necessary, the applications can be stopped when the message (or messages) have been processed. What are advantages of the MQ? Ans. 1. Integration. 2. Asynchrony 3. Assured Delivery 4. Scalability. How does it support the Integration? Ans. Because the MQ is independent of the Operating System you use i.e. it may be Windows, Solaris,AIX.It is independent of the protocol (i.e. TCP/IP, LU6.2, SNA, NetBIOS, UDP).It is not required that both the sender and receiver should be running on the same platform What is Asynchrony? Ans. With messag...

Advantages & Disadvantages of Synchronous / Asynchronous Communications?

  Asynchronous Communication Advantages: Requests need not be targeted to specific server. Service need not be available when request is made. No blocking, so resources could be freed.  Could use connectionless protocol Disadvantages: Response times are unpredictable. Error handling usually more complex.  Usually requires connection-oriented protocol.  Harder to design apps Synchronous Communication Advantages: Easy to program Outcome is known immediately  Error recovery easier (usually)  Better real-time response (usually) Disadvantages: Service must be up and ready. Requestor blocks, held resources are “tied up”.  Usually requires connection-oriented protocol