SlideShare uma empresa Scribd logo
1 de 5
1.    What is a shell?

       A Unix shell is the program which reads user input from the command line and
       executes actions based upon that input.

2.    Define session?

      A session is a collection of one or more process groups. A process establishes a new
      session by calling setsid function. This function returns process group id if OK.

3.    What do you mean by signal?

      Signals are software interrupts. Signals provide a way of handling asynchronous
      events: a user at a terminal typing the interrupt key to stop a program or the next
      program in the pipeline terminating prematurely.

4.    What is unix?

      UNIX is the most popular operating system on multi-user systems. This operating
      system originated as a single-user system. It started off on a cast-off DEC PDP-7 at
      Bell laboratories in 1969. Ken Thompson, with ideas and help from Dennis Ritchie,
      and others, wrote a small, general-purpose operating system.

5.    Define message queue?

      message queue Message queue is a linked list of messages. It is used to make a
      communication between the related or unrelated processes.


6.    Define directory and filename?

      A directory is a file that contains directory entries. The directory entry containing a
      file name along with structure of information describing the attributes of the file.
      The names in a directory are called filename. The only two characters that cannot
      appear in a file name are / and null character.

7.    Define program and process?

      A program is a executable file residing in a disk file. An executing instance of a
      program is called a process. Every UNIX process have a unique numeric identifier
      called the process ID. The process ID is always a non negative integer.

8.    List down the different file types?
     Regular file
     Directory file
    Character special file
     Block special file
     FIFO
     Symbolic link
     Socket

9.    What are the options available to determine the group ID of the new file?
     The group ID of the new file can be the effective group ID of the process
     The group ID of the new file can be the group ID of the directory in which the file is
      being created.

10.   Define sticky bit?

      The bit S_ISVTX is known as sticky bit. If this bit is set for an executable program
      file, then the first time the program was executed a copy of the programmer’s text
      was saved in the swap area when the process terminated. The advantage of using
      this is the program is loaded into memory faster the next time.
12345678
11.   What is called a page fault?

      Page fault is referred to the situation when the process addresses a page in the
      working set of the process but the process fails to locate the page in the working
      set. And on a page fault the kernel updates the working set by reading the page
      from the secondary device.

12.   What do you mean by u-area (user area)?

      This contains the private data that is manipulated only by the Kernel. This is local to
      the Process, i.e. each process is allocated a u-area.

13.   What are the different types of buffering is supported by UNIX?
     Fuly buffered
     Line buffered
     Un buffered

14.   What is the purpose of exec functions?

      When a process calls one of the exec functions that process is completely replaced
      by the new program. The new program stats execution from main function. The
      processed does not change across an exec because a new process is not created.But
      this function replaces the current process with new program from disk.

15.   Define process group?
A process group is a collection of one or more processes. Each process group has a
      unique process ID. A function getpgrp returns the process group id of the calling
      process.
16.   What difference between cmp and diff commands?

      cmp - Compares two files byte by byte and displays the first mismatch.
      diff - tells the changes to be made to make the files identical.

17.   How many prompts are available in a UNIX system?

      Two prompts, PS1 (Primary Prompt), PS2 (Secondary Prompt).

18.   What are shell variables?

      Shell variables are special variables, a name-value pair created and maintained by
      the shell.

19.   What is Block Started by Symbol?

      A data representation at the machine level, that has initial values when a program
      starts and tells about how much space the kernel allocates for the un-initialized
      data. Kernel initializes it to zero at run-time.

20.   What is the command to find out today’s date?

      date


21.   what are the different commands used to create files?
     touch - to create empty files.(e.g) - touch ‹filename›
     vi ‹filename›
     cat>filename
      .

22.   What is chmod, chown and chgrp?

      Chmod : It is used for to change permissions on files.
      Chown : It is used for to change ownership of a file.
      Chgrp : It is used for to change group of the file.

23.   What are PIDs?

      They are process IDs given to processes. A PID can vary from 0 to 65535.

24.   What does the top command display?

      Top command displays the current ammount of memory occupied by the currently
      executing processes and the details. In addition to memory usage top command
displays cpu usage and process details.

25.   What is the command to send message to all users who are logged in?

      Wall
26.   What is Kernel?

      Kernel is core part of unix o/s. It is a group of hundreds of system calls.

27.   What are the different security features in Unix?
     Password protection
     File permissions
     Encryption.

28.   What does the swapping system do if it identifies the illegal page for swapping?

      If the disk block descriptor does not contain any record of the faulted page, then
      this causes the attempted memory reference is invalid and the kernel sends a
      “Segmentation violation” signal to the offending process. This happens when the
      swapping system identifies any invalid memory reference.

29.   How do you find out the current directory you’re in?

      pwd
30.   What is a pipe?

      A pipe is two or more commands separated by pipe char ‘|’. That tells the shell to
      arrange for the output of the preceding command to be passed as input to the
      following command.

31.   How to close the current user account?

      exit

32.   What is the use of grep command?

      grep is a pattern search command. It searches for the pattern, specified in the
      command line with appropriate option, in a file(s).

33.   which command is used to identify the type of the file?

      file “grep” means Globally search a regular expression and print it.
4.    What are the features and benefits of unix?
     Portability
     Machine Independent
     Multi-user operations
    Hierarchical file system
     Unix shell
     Pipes and filters
     Utilities
     Background Processing
     Software Development Tools
     Maturity

35.   What is the use of break and continue statements?

      The continue statement suspends execution of all statements following it, and
      switches control to the top of the loop for the next iteration. The break statement,
      on the other hand, causes control to break out of the loop.

36.   What is single users system?

      The personal computer (PC) is a small, general-purpose system that can execute
      programs to perform a wide variety of tasks. The PC, however, was designed for
      use by one person at a time; that is, it is Single-User oriented with MS-DOS as the
      de facto standard operating system for this range of machines. Single user systems
      became very popular due to the low cost hardware and wide range of software
      available for these machines.

Mais conteúdo relacionado

Mais procurados

Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unixAchu dhan
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating SystemMahakKasliwal
 
Unix
UnixUnix
UnixErm78
 
Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)hildenjohannes
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment pptRama .
 
linux software architecture
linux software architecture linux software architecture
linux software architecture Sneha Ramesh
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure amol_chavan
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksLOKESH KUMAR
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux SystemWayne Jones Jnr
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating SystemShivam Pandey
 
The Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOsThe Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOsDivye Kapoor
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linuxMazenetsolution
 

Mais procurados (20)

Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unix
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Ch1 linux basics
Ch1 linux basicsCh1 linux basics
Ch1 linux basics
 
Unix
UnixUnix
Unix
 
Unix Introduction
Unix IntroductionUnix Introduction
Unix Introduction
 
Unix Administration
Unix AdministrationUnix Administration
Unix Administration
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)Introduction to Unix-like systems (Part I-IV)
Introduction to Unix-like systems (Part I-IV)
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
OSCh20
OSCh20OSCh20
OSCh20
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
linux software architecture
linux software architecture linux software architecture
linux software architecture
 
Unix ppt
Unix pptUnix ppt
Unix ppt
 
Unix operating system architecture with file structure
Unix operating system architecture with file structure Unix operating system architecture with file structure
Unix operating system architecture with file structure
 
Unix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | BlocksUnix and shell programming | Unix File System | Unix File Permission | Blocks
Unix and shell programming | Unix File System | Unix File Permission | Blocks
 
Chapter 21 - The Linux System
Chapter 21 - The Linux SystemChapter 21 - The Linux System
Chapter 21 - The Linux System
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
The Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOsThe Linux Kernel Implementation of Pipes and FIFOs
The Linux Kernel Implementation of Pipes and FIFOs
 
Process management in linux
Process management in linuxProcess management in linux
Process management in linux
 
UNIX Operating System ppt
UNIX Operating System pptUNIX Operating System ppt
UNIX Operating System ppt
 

Destaque

Shell Scripts
Shell ScriptsShell Scripts
Shell ScriptsDr.Ravi
 
basic shell_programs
 basic shell_programs basic shell_programs
basic shell_programsmadhugvskr
 
Unix Shell Scripting Tutorial | Unix Shell Scripting Online Training
Unix Shell Scripting Tutorial | Unix Shell Scripting Online TrainingUnix Shell Scripting Tutorial | Unix Shell Scripting Online Training
Unix Shell Scripting Tutorial | Unix Shell Scripting Online TrainingVyshnavi Reddy
 
Unix shell program training
Unix shell program trainingUnix shell program training
Unix shell program trainingAditya Sharat
 
Unix Shell Script
Unix Shell ScriptUnix Shell Script
Unix Shell Scriptstudent
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014Supriya Radhakrishna
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSSupriya Radhakrishna
 

Destaque (10)

Shell Scripts
Shell ScriptsShell Scripts
Shell Scripts
 
Prog i
Prog iProg i
Prog i
 
basic shell_programs
 basic shell_programs basic shell_programs
basic shell_programs
 
Chap06
Chap06Chap06
Chap06
 
Unix Shell Scripting Tutorial | Unix Shell Scripting Online Training
Unix Shell Scripting Tutorial | Unix Shell Scripting Online TrainingUnix Shell Scripting Tutorial | Unix Shell Scripting Online Training
Unix Shell Scripting Tutorial | Unix Shell Scripting Online Training
 
Unix shell program training
Unix shell program trainingUnix shell program training
Unix shell program training
 
Unix Shell Script
Unix Shell ScriptUnix Shell Script
Unix Shell Script
 
Adbms lab manual
Adbms lab manualAdbms lab manual
Adbms lab manual
 
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
M.TECH 1ST SEM COMPUTER SCIENCE AOS LAB PRGMS 2014
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 

Semelhante a Unix1

UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in LinuxDr.YNM
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 
Linux internal
Linux internalLinux internal
Linux internalmcganesh
 
Linux architecture
Linux architectureLinux architecture
Linux architecturemcganesh
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating Systemsubhsikha
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingJérôme Kehrli
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programmingMohit Aggarwal
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).pptSavitha74
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating SystemKunalKewat1
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IJK Knowledge
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming ReportShivek Khurana
 
M.c.a. (sem ii) operating systems
M.c.a. (sem   ii) operating systemsM.c.a. (sem   ii) operating systems
M.c.a. (sem ii) operating systemsTushar Rajput
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxVivekGupta920049
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrationshaile468688
 

Semelhante a Unix1 (20)

Mc7404 np final
Mc7404 np finalMc7404 np final
Mc7404 np final
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 
Linux internal
Linux internalLinux internal
Linux internal
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Linux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and TroubleshootingLinux and Java - Understanding and Troubleshooting
Linux and Java - Understanding and Troubleshooting
 
Assignment unix & shell programming
Assignment  unix  & shell programmingAssignment  unix  & shell programming
Assignment unix & shell programming
 
Linux
LinuxLinux
Linux
 
Unix final
Unix finalUnix final
Unix final
 
LinuxOS-1 (1).ppt
LinuxOS-1 (1).pptLinuxOS-1 (1).ppt
LinuxOS-1 (1).ppt
 
Linux Operating System
Linux Operating SystemLinux Operating System
Linux Operating System
 
UNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-IUNIX INTERNALS UNIT-I
UNIX INTERNALS UNIT-I
 
Walking around linux kernel
Walking around linux kernelWalking around linux kernel
Walking around linux kernel
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf3CS LSP UNIT 1-1.pdf
3CS LSP UNIT 1-1.pdf
 
M.c.a. (sem ii) operating systems
M.c.a. (sem   ii) operating systemsM.c.a. (sem   ii) operating systems
M.c.a. (sem ii) operating systems
 
App A
App AApp A
App A
 
Architecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docxArchitecture-of-Linux-operating-system.docx
Architecture-of-Linux-operating-system.docx
 
linux system and network administrations
linux system and network administrationslinux system and network administrations
linux system and network administrations
 

Último

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

Unix1

  • 1. 1. What is a shell? A Unix shell is the program which reads user input from the command line and executes actions based upon that input. 2. Define session? A session is a collection of one or more process groups. A process establishes a new session by calling setsid function. This function returns process group id if OK. 3. What do you mean by signal? Signals are software interrupts. Signals provide a way of handling asynchronous events: a user at a terminal typing the interrupt key to stop a program or the next program in the pipeline terminating prematurely. 4. What is unix? UNIX is the most popular operating system on multi-user systems. This operating system originated as a single-user system. It started off on a cast-off DEC PDP-7 at Bell laboratories in 1969. Ken Thompson, with ideas and help from Dennis Ritchie, and others, wrote a small, general-purpose operating system. 5. Define message queue? message queue Message queue is a linked list of messages. It is used to make a communication between the related or unrelated processes. 6. Define directory and filename? A directory is a file that contains directory entries. The directory entry containing a file name along with structure of information describing the attributes of the file. The names in a directory are called filename. The only two characters that cannot appear in a file name are / and null character. 7. Define program and process? A program is a executable file residing in a disk file. An executing instance of a program is called a process. Every UNIX process have a unique numeric identifier called the process ID. The process ID is always a non negative integer. 8. List down the different file types?  Regular file  Directory file
  • 2. Character special file  Block special file  FIFO  Symbolic link  Socket 9. What are the options available to determine the group ID of the new file?  The group ID of the new file can be the effective group ID of the process  The group ID of the new file can be the group ID of the directory in which the file is being created. 10. Define sticky bit? The bit S_ISVTX is known as sticky bit. If this bit is set for an executable program file, then the first time the program was executed a copy of the programmer’s text was saved in the swap area when the process terminated. The advantage of using this is the program is loaded into memory faster the next time. 12345678 11. What is called a page fault? Page fault is referred to the situation when the process addresses a page in the working set of the process but the process fails to locate the page in the working set. And on a page fault the kernel updates the working set by reading the page from the secondary device. 12. What do you mean by u-area (user area)? This contains the private data that is manipulated only by the Kernel. This is local to the Process, i.e. each process is allocated a u-area. 13. What are the different types of buffering is supported by UNIX?  Fuly buffered  Line buffered  Un buffered 14. What is the purpose of exec functions? When a process calls one of the exec functions that process is completely replaced by the new program. The new program stats execution from main function. The processed does not change across an exec because a new process is not created.But this function replaces the current process with new program from disk. 15. Define process group?
  • 3. A process group is a collection of one or more processes. Each process group has a unique process ID. A function getpgrp returns the process group id of the calling process. 16. What difference between cmp and diff commands? cmp - Compares two files byte by byte and displays the first mismatch. diff - tells the changes to be made to make the files identical. 17. How many prompts are available in a UNIX system? Two prompts, PS1 (Primary Prompt), PS2 (Secondary Prompt). 18. What are shell variables? Shell variables are special variables, a name-value pair created and maintained by the shell. 19. What is Block Started by Symbol? A data representation at the machine level, that has initial values when a program starts and tells about how much space the kernel allocates for the un-initialized data. Kernel initializes it to zero at run-time. 20. What is the command to find out today’s date? date 21. what are the different commands used to create files?  touch - to create empty files.(e.g) - touch ‹filename›  vi ‹filename›  cat>filename . 22. What is chmod, chown and chgrp? Chmod : It is used for to change permissions on files. Chown : It is used for to change ownership of a file. Chgrp : It is used for to change group of the file. 23. What are PIDs? They are process IDs given to processes. A PID can vary from 0 to 65535. 24. What does the top command display? Top command displays the current ammount of memory occupied by the currently executing processes and the details. In addition to memory usage top command
  • 4. displays cpu usage and process details. 25. What is the command to send message to all users who are logged in? Wall 26. What is Kernel? Kernel is core part of unix o/s. It is a group of hundreds of system calls. 27. What are the different security features in Unix?  Password protection  File permissions  Encryption. 28. What does the swapping system do if it identifies the illegal page for swapping? If the disk block descriptor does not contain any record of the faulted page, then this causes the attempted memory reference is invalid and the kernel sends a “Segmentation violation” signal to the offending process. This happens when the swapping system identifies any invalid memory reference. 29. How do you find out the current directory you’re in? pwd 30. What is a pipe? A pipe is two or more commands separated by pipe char ‘|’. That tells the shell to arrange for the output of the preceding command to be passed as input to the following command. 31. How to close the current user account? exit 32. What is the use of grep command? grep is a pattern search command. It searches for the pattern, specified in the command line with appropriate option, in a file(s). 33. which command is used to identify the type of the file? file “grep” means Globally search a regular expression and print it. 4. What are the features and benefits of unix?  Portability  Machine Independent  Multi-user operations
  • 5. Hierarchical file system  Unix shell  Pipes and filters  Utilities  Background Processing  Software Development Tools  Maturity 35. What is the use of break and continue statements? The continue statement suspends execution of all statements following it, and switches control to the top of the loop for the next iteration. The break statement, on the other hand, causes control to break out of the loop. 36. What is single users system? The personal computer (PC) is a small, general-purpose system that can execute programs to perform a wide variety of tasks. The PC, however, was designed for use by one person at a time; that is, it is Single-User oriented with MS-DOS as the de facto standard operating system for this range of machines. Single user systems became very popular due to the low cost hardware and wide range of software available for these machines.