Results 1 to 6 of 6

Thread: A+ and basic PC questions

  1. #1
    :evil2:A+ and basic PC questions :evil2:

    1. What are the basic expansion card types?ISA and PCI, ISA can be used only on XT, AT and ATX boards. The industry now considers ISA obsolete.
    2. How do you clear CMOS password? Since CMOS is a special chip with its own battery, the best way to clear out a CMOS chip is to disconnect it from its power supply.
    3. Where does the Real mode on the CPU come from? The original 8086, which only had 1 MB of memory. This megabyte is split into low memory for IRQ tables, application memory and high memory.
    4. Where does CPU Enhanced mode originate from? Intel??s 80386 was the first 32-bit processor, and since the company had to backward-support the 8086. All the modern Intel-based processors run in the Enhanced mode, capable of switching between Real mode (just like the real 8086) and Protected mode, which is the current mode of operation.
    5. Name the processor lines of two major manufacturers? High-end: Intel - Pentium (II, III, 4), AMD - Athlon. Low-end: Intel - Celeron, AMD - Duron. 64-bit: Intel - Itanium 2, AMD - Opteron.
    6. What??s the difference between L1 and L2 cache? Level 1 cache is internal to the chip, L2 is external.
    7. What??s the speed and device maximum specs for Firewire? IEEE 1394 (Firewire) supports the maximum of 63 connected devices with speeds up to 400 Mbps.
    8. Where??s MBR located on the disk? Main Boot Record is located in sector 0, track 0, head 0, cylinder 0 of the primary active partition.
    9. What??s the maximum hard drive size for FAT16-based Windows system? 2 GB.
    10. How many logical drives is it possible to fit onto a physical disk? Maximum of 24 logical drives. The extended partition can only have 23 logical drives.
    11. WHat are * and ? when using them for wildcards in Windows? * - any characters, arbitrary amoung, ? - single character.
    12. How does the browser know to go to a certain IP address when you enter a domain like google.com? It searches through local DNS cache, if nothing is there, it queries the ISP??s DNS server.

    Computer architecture and design interview questions

    1. What is pipelining?
    2. What are the five stages in a DLX pipeline?
    3. For a pipeline with ??n?? stages, what??s the ideal throughput? What prevents us from achieving this ideal throughput?
    4. What are the different hazards? How do you avoid them?
    5. Instead of just 5-8 pipe stages why not have, say, a pipeline with 50 pipe stages?
    6. What are Branch Prediction and Branch Target Buffers?
    7. How do you handle precise exceptions or interrupts?
    8. What is a cache?
    9. What??s the difference between Write-Through and Write-Back Caches? Explain advantages and disadvantages of each.
    10. Cache Size is 64KB, Block size is 32B and the cache is Two-Way Set

    Associative. For a 32-bit physical address, give the division between Block Offset, Index and Tag.
    11. What is Virtual Memory?
    12. What is Cache Coherency?
    13. What is MESI?
    14. What is a Snooping cache?
    15. What are the components in a Microprocessor?
    16. What is ACBF(Hex) divided by 16?
    17. Convert 65(Hex) to Binary
    18. Convert a number to its two??s compliment and back

    The CPU is busy but you want to stop and do some other task. How do you do it?

    Hardware design interview questions

    1. Give two ways of converting a two input NAND gate to an inverter
    2. Given a circuit, draw its exact timing response. (I was given a Pseudo Random Signal Generator; you can expect any sequential ckt)
    3. What are set up time & hold time constraints? What do they signify? Which one is critical for estimating maximum clock frequency of a circuit?
    4. Give a circuit to divide frequency of clock cycle by two
    5. Design a divide-by-3 sequential circuit with 50% duty circle. (Hint: Double the Clock)
    6. Suppose you have a combinational circuit between two registers driven by a clock. What will you do if the
    delay of the combinational circuit is greater than your clock signal? (You can??t resize the combinational circuit transistors)
    7. The answer to the above question is breaking the combinational circuit and pipelining it. What will be affected if you do this?
    8. What are the different Adder circuits you studied?
    9. Give the truth table for a Half Adder. Give a gate level implementation of the same.
    10. Draw a Transmission Gate-based D-Latch.
    11. Design a Transmission Gate based XOR. Now, how do you convert it to XNOR? (Without inverting the output)
    12. How do you detect if two 8-bit signals are same?
    13. How do you detect a sequence of "1101" arriving serially from a signal line?
    14. Design any FSM in VHDL or Verilog.
    15. Explain RC circuit??s charging and discharging.
    16. Explain the working of a binary counter.
    17. Describe how you would reverse a singly linked list.

    Intel interview questions

    1. The following questions are used for screening the candidates during the first interview. The questions apply mostly to fresh college grads pursuing an engineering career at Intel.
    1. Have you studied buses? What types?
    2. Have you studied pipelining? List the 5 stages of a 5 stage pipeline. Assuming 1 clock per stage, what is the latency of an instruction in a 5 stage machine? What is the throughput of this machine ?
    3. How many bit combinations are there in a byte?
    4. For a single computer processor computer system, what is the purpose of a processor cache and describe its operation?
    5. Explain the operation considering a two processor computer system with a cache for each processor.
    6. What are the main issues associated with multiprocessor caches and how might you solve them?
    7. Explain the difference between write through and write back cache.
    8. Are you familiar with the term MESI?
    9. Are you familiar with the term snooping?
    10. Describe a finite state machine that will detect three consecutive coin tosses (of one coin) that results in heads.
    11. In what cases do you need to double clock a signal before presenting it to a synchronous state machine?
    12. You have a driver that drives a long signal & connects to an input device. At the input device there is either overshoot, undershoot or signal threshold violations, what can be done to correct this problem?
    13. What are the total number of lines written by you in C/C++? What is the most complicated/ valuable program written in C/C++?
    14. What compiler was used?
    15. What is the difference between = and == in C?
    16. Are you familiar with VHDL and/or Verilog?
    17. What types of CMOS memories have you designed? What were their size? Speed?
    18. What work have you done on full chip Clock and Power distribution? What process technology and budgets were used?
    19. What types of I/O have you designed? What were their size? Speed? Configuration? Voltage requirements?
    20. Process technology? What package was used and how did you model the package/system? What parasitic effects were considered?
    21. What types of high speed CMOS circuits have you designed?
    22. What transistor level design tools are you proficient with? What types of designs were they used on?
    23. What products have you designed which have entered high volume production?
    24. What was your role in the silicon evaluation/product ramp? What tools did you use?
    25. If not into production, how far did you follow the design and why did not you see it into production?
    x86 interview questions

    These interview questions test the knowledge of x86 Intel architecture and 8086 microprocessor specifically.
    1. What is a Microprocessor? - Microprocessor is a program-controlled device, which fetches the instructions from memory, decodes and executes the instructions. Most Micro Processor are single- chip devices.
    2. Give examples for 8 / 16 / 32 bit Microprocessor? - 8-bit Processor - 8085 / Z80 / 6800; 16-bit Processor - 8086 / 68000 / Z8000; 32-bit Processor - 80386 / 80486.
    3. Why 8085 processor is called an 8 bit processor? - Because 8085 processor has 8 bit ALU (Arithmetic Logic Review). Similarly 8086 processor has 16 bit ALU.
    4. What is 1st / 2nd / 3rd / 4th generation processor? - The processor made of PMOS / NMOS / HMOS / HCMOS technology is called 1st / 2nd / 3rd / 4th generation processor, and it is made up of 4 / 8 / 16 / 32 bits.
    5. Define HCMOS? - High-density n- type Complimentary Metal Oxide Silicon field effect transistor.
    6. What does microprocessor speed depend on? - The processing speed depends on DATA BUS WIDTH.
    7. Is the address bus unidirectional? - The address bus is unidirectional because the address info rmation is always given by the Micro Processor to address a memory location of an input / output devices.
    8. Is the data bus is Bi-directional? - The data bus is Bi-directional because the same bus is used for transfer of data between Micro Processor and memory or input / output devices in both the direction.
    9. What is the disadvantage of microprocessor? - It has limitations on the size of data. Most Microprocessor does not support floating-point operations.
    10. What is the difference between microprocessor and microcontroller? - In Microprocessor more op-codes, few bit handling instructions. But in Microcontroller: fewer op-codes, more bit handling Instructions, and also it is defined as a device that includes micro processor, memory, & input / output signal lines on a single chip.
    11. What is meant by LATCH? - Latch is a D- type flip-flop used as a temporary storage device controlled by a timing signal, which can store 0 or 1. The primary function of a Latch is data storage. It is used in output devices such as LED, to hold the data for display.
    12. Why does microprocessor contain ROM chips? - Microprocessor contain ROM chip because it contain instructions to execute data.
    13. What is the difference between primary & secondary storage device? - In primary storage device the storage capacity is limited. It has a volatile memory. In secondary storage device the storage capacity is larger. It is a nonvolatile memory. Primary devices are: RAM / ROM. Secondary devices are: Floppy disc / Hard disk.
    14. Difference between static and dynamic RAM? - Static RAM: No refreshing, 6 to 8 MOS transistors are required to form one memory cell, Information stored as voltage level in a flip flop. Dynamic RAM: Refreshed periodically, 3 to 4 transistors are required to form one memory cell, Information is stored as a charge in the gate to substrate capacitance.
    15. What is interrupt? - Interrupt is a signal send by external device to the processor so as to request the processor to perform a particular work.
    16. What is cache memory? - Cache memory is a small high-speed memory. It is used for temporary storage of data & info rmation between the main memory and the CPU (center processing unit). The cache memory is only in RAM.
    17. What is called ??Scratch pad of computer??? - Cache Memory is scratch pad of computer.
    18. Which transistor is used in each cell of EPROM? - Floating –gate Avalanche Injection MOS (FAMOS) transistor is used in each cell of EPROM.
    19. Differentiate between RAM and ROM? - RAM: Read / Write memory, High Speed, Volatile Memory. ROM: Read only memory, Low Speed, Non Voliate Memory.
    20. What is a compiler? - Compiler is used to translate the high-level language program into machine code at a time. It doesn??t require special instruction to store in a memory, it stores automatically. The Execution time is less compared to Interpreter.
    21. Which processor structure is pipelined? - All x86 processors have pipelined structure.
    22. What is flag? - Flag is a flip-flop used to store the info rmation about the status of a processor and the status of the instruction executed most recently
    23. What is stack? - Stack is a portion of RAM used for saving the content of Program Counter and general purpose registers.
    24. Can ROM be used as stack? - ROM cannot be used as stack because it is not possible to write to ROM.
    25. What is NV-RAM? - Nonvolatile Read Write Memory, also called Flash memory. It is also know as shadow RAM.



    Interview questions for network engineer

    1. Describe the OSI model.
    2. What is the difference between a repeater, bridge, router? Relate this to the OSI model.
    3. Describe an Ethernet switch and where it fits into the OSI model.
    4. What is a VLAN? What is an ELAN? What is the difference?
    5. Relate FDDI/ATM/SONET to the OSI model.
    6. Explain how to configure a host network interface (e.g. IP address, netmask, broadcast address)?
    7. Describe Ethernet packet contents: min/max size, header.
    8. Describe TCP/IP and its protocols.
    9. Describe ATM and what are its current advantages and disadvantages.
    10. Describe SONET.
    11. What are the maximum distances for CAT5 cabling?
    12. Describe UDP and TCP and the differences between the two.
    13. What is your current IP address? Hoiw do you find that out on different OSs ?
    14. Describe what a broadcast storm is.
    15. Describe what a runt, a giant, and a late collision are and what causes each of them.
    16. How do you distinguish a DNS problem from a network problem?
    17. Describe the Bandwidth Delay problem.
    18. Describe the principle of multi-layer switching.
    19. Describe the purpose and basic functionality of things like HSRP, VRRP etc

    Windows admin interview questions

    1. Describe how the DHCP lease is obtained. It??s a four-step process consisting of (a) IP request, (b) IP offer, © 2005-2006 feucos.com, IP selection and (d) acknowledgement.
    2. I can??t seem to access the Internet, don??t have any access to the corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running 98/2000/XP if the DHCP server is not available. The name for the technology is APIPA (Automatic Private Internet Protocol Addressing).
    3. We??ve installed a new Windows-based DHCP server, however, the users do not seem to be getting DHCP leases off of it. The server must be authorized first with the Active Directory.
    4. How can you force the client to give up the dhcp lease if you have access to the client PC? ipconfig /release
    5. What authentication options do Windows 2000 Servers have for remote clients? PAP, SPAP, CHAP, MS-CHAP and EAP.
    6. What are the networking protocol options for the Windows clients if for some reason you do not want to use TCP/IP? NWLink (Novell), NetBEUI, AppleTalk (Apple).
    7. What is data link layer in the OSI reference model responsible for? Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network layer will be responsible for addressing the frames, while the physical layer is reponsible for retrieving and sending raw data bits.
    8. What is binding order? The order by which the network protocols are used for client-server communications. The most frequently used protocols should be at the top.
    9. How do cryptography- based keys ensure the validity of data transferred across the network? Each IP packet is assigned a checksum, so if the checksums do not match on both receiving and transmitting ends, the data was modified or corrupted.
    10. Should we deploy IPSEC-based security or certificate- based security? They are really two different technologies. IPSec secures the TCP/IP communication and protects the integrity of the packets. Certificate- based security ensures the validity of authenticated clients and servers.
    11. What is LMHOSTS file? It??s a file stored on a host machine that is used to resolve NetBIOS to specific IP addresses.
    12. What??s the difference between forward lookup and reverse lookup in DNS? Forward lookup is name-to-
    address, the reverse lookup is address-to-name.
    13. How can you recover a file encrypted using EFS? Use the domain recovery agent.

    Network engineer/architect interview questions

    1. Explain how trace route, ping, and tcp dump work and what they are used for?
    2. Describe a case where you have used these tools to troubleshoot.
    3. What is the last major networking problem you troubleshot and solved on your own in the last year?
    4. What LAN analyzer tools are you familiar with and describe how you use them to troubleshoot and on what media and network types.
    5. Explain the contents of a routing table (default route, next hop, etc.)
    6. What routing protocols have you configured?
    7. Describe the commands to set up a route.
    8. What routing problems have you troubleshot?
    9. How do you display a routing table on a Cisco? On a host?
    10. How do you use a routing table and for what?
    11. What is a route flap?
    12. What is a metric?
    13. When do you use BGP, IGRP, OSPF, Static Routes?
    14. What do you see as current networking security issues (e.g. NFS mounting, spoofing, one time passwords,
    etc.)?
    15. Describe a routing filter and what it does.
    16. Describe an access list and what it does.
    17. What is a network management system?
    18. Describe how SNMP works.
    19. Describe the working environment you are currently in, e.g. frequent interruptions, frequent priority shifting,
    team or individual.
    20. What do you use to write documentation? Editor? Mail reader?
    21. What platform (s) do you currently work on at your desk?
    22. How do you manage multiple concurrent high level projects?
    23. Describe a recent short term stressful situation and how you managed it.
    24. How do you manage a long term demanding stressful work environment?
    25. Have you worked in an assignment based environment, e.g. work request/trouble ticket system, and if so, describe that environment.
    26. Describe what network statistics or measurement tools you are familiar with and how you have used them.
    27. Describe what a VPN is and how it works.
    28. Describe how VoIP works.
    29. Describe methods of QoS.
    30. How does ToS bit work?


    Wireless engineer interview questions


    A recruiter from Atlanta submitted this set of questions for interviewing at a wireless equipment company.
    1. Describe your home WLAN setup. (Pay attention to candidate??s confidence. Plus if the candidate built it himself. Plus if the network is secured additionally, regardless of the protocols used. Plus if the candidate fought poor coverage.)

    2. Ad-hoc vs. infrastructure topology. Advantages and disadvantages. Ad-hoc networks are easy to set up. By definition ad-hoc WLANs do not require access point, so they are cheaper. With infrastructured WLANs one can connect to wired LAN, enable wireless roaming for office workers, centralize WLAN management, boost the range.
    3. Your preferred brand for wireless cards and access points. (An experienced candidate will be able to come up with strong argument to defend his preferences. He will point to the past projects as well.)
    4. Range and throughput of 802.11a, 802.11b and 802.11g networks. The official spec for 802.11a is 54 Mbps and 25-75 feet indoors. The official spec for 802.11b is 11 Mbps and 100-150 feet indoors. The official spec for 802.11g is 54 Mbps and 100-150 feet indoors. An experienced candidate will provide his own observations.
    5. How do you secure a wireless network? Forbid SSID broadcasting, enable MAC-level access where appropriate, enable WEP, enable 802.11i where available, enable firewalls, enable WPA.
    6. What does Wi-Fi stand for? Wireless Fidelity.
    7. What is 802.11i? It??s a new IEEE standard defining wireless network security.
    8. What are the recommended channels if you??re setting up three WLANs and want minimum interference? 1, 6 and 11 for the US , 1, 7 and 13 for Europe and 1, 7 and 14 for Japan .
    9. What are your preferred tools for wardriving? Somewhere the names Kismet, *stumbler or others should come up. Ask the

    candidate to describe his preferred configuration for wardriving.

    CCNA/Cisco admin interview questions

    1. You need to retrieve a file from the file server for your word processing application, which layer of the OSI model is responsible for this function?
    1. Presentation layer
    2. Application layer
    3. Session layer
    4. Transport layer
    5. Datalink layer
    2. You are working in a word processing program, which is run from the file server. Your data comes back to you in an unintelligible manner. Which layer of the OSI model would you investigate?
    1. Application layer
    2. Presentation layer
    3. Session layer
    4. Network layer
    5. Datalink layer
    3. The IEEE subdivided the datalink layer to provide for environments that need connectionless or connection-oriented services. What are the two layers called?
    1. Physical
    2. MAC
    3. LLC
    4. Session
    5. IP
    4. You are working with graphic translations. Which layer of the OSI model is responsible for code formatting and conversion and graphic standards.
    1. Network layer
    2. Session layer
    3. Transport layer
    4. Presentation layer
    5. Which is the best definition of encapsulation?
    1. Each layer of the OSI model uses encryption to put the PDU from the upper layer into its data field. It adds header and trailer info rmation that is available to its counterpart on the system that will receive it.
    2. Data always needs to be tunneled to its destination so encapsulation must be used.
    3. Each layer of the OSI model uses compression to put the PDU from the upper layer into its data field. It adds header and trailer info rmation that is available to its counterpart on the system that will receive it.
    4. Each layer of the OSI model uses encapsulation to put the PDU from the upper layer into its data field. It adds header and trailer info rmation that is available to its counterpart on the system that will receive it.
    6. Routers can be configured using several sources. Select which of the following sources can be used.
    1. Console Port
    2. Virtual Terminals
    3. TFTP Server
    4. Floppy disk
    5. Removable media
    7. Which memory component on a Cisco router contains the dynamic system configuration?
    1. ROM
    2. NVRAM
    3. Flash
    4. RAM/DRAM
    8. Which combination of keys will allow you to view the previous commands that you typed at the router?
    1. ESC-P
    2. Ctrl-P
    3. Shift-P
    4. Alt-P
    9. Which commands will display the active configuration parameters?
    1. show running-config
    2. write term
    3. show version
    4. display term
    10. You are configuring a router, which prompt tells you that you are in the privileged EXEC mode?
    1. @
    2. >
    3. !
    4. :
    5. #
    11. What does the command ??IP name-server 255.255.255. 255??accomplish?
    1. It disables domain name lookup.
    2. It sets the domain name lookup to be a local broadcast.
    3. This is an illegal command.
    4. The command is now defunct and has been replaced by ??IP server-name ip any??
    12. The following selections show the command prompt and the configuration of the IP network mask. Which two are correct?
    1. Router(config- if)#netmask- format { bitcount | decimal | hexadecimal }
    2. Router#term IP netmask-format { bitcount | decimal | hexadecimal }
    3. Router(config- if)#IP netmask-format { bitcount | decimal | hexadecimal }
    4. Router#ip netmask-format { bitcount | decimal | hexadecimal }
    13. Which layer is responsible for flow control with sliding windows and reliability with sequence numbers and acknowledgments?
    1. Transport
    2. Application
    3. Internet
    4. Network Interface
    14. Which processes does TCP, but not UDP, use?
    1. Windowing
    2. Acknowledgements
    3. Source Port
    4. Destination Port
    15. Select which protocols use distance vector routing?
    1. OSPF
    2. RIP
    3. IGRP
    4. PPP

    Networking and protocols interview questions

    Question 1: How does the race condition occur?

    It occurs when two or more processes are reading or writing some shared data and the final result depends on who runs precisely when.


    Question 2: What is multiprogramming?

    Multiprogramming is a rapid switching of the CPU back and forth between processes.


    Question 3: Name the seven layers of the OSI Model and describe them briefly.

    Physical Layer - covers the physical interface between devices and the rules by which bits are passed from one to another.
    Data Link Layer - attempts o make the physical link reliable and provides the means to activate, maintain, and deactivate the link.
    Network Layer - provides for the transfer of info rmation between end systems across
    some sort communications network.
    Transport Layer - provides a mechanism for the exchange of data between end system.
    Session Layer - provides the mechanism for controlling the dialogue between applications
    in end systems.
    Presentation Layer - defines the format of the data to be exchanged between applications
    and offers application programs a set of data transformation services.
    Application Layer - provides a means for application programs to access the OSI environment.


    Question 4: What is the difference between TCP and UDP?

    TCP and UDP are both transport-level protocols. TCP is designed to provide reliable
    communication across a variety of reliable and unreliable networks and internets.
    UDP provides a connectionless service for application- level procedures. Thus, UDP is basically
    an unreliable service; delivery and duplicate protection are not guareented.


    Question 5: What does a socket consists of?

    The combination of an IP address and a port number is called a socket.

    Networking and Unix interview questions

    What is UTP?

    UTP – Unshielded twisted pair 10BASE-T is the preferred Ethernet medium of the 90s. It is based on a star topology and provides a number of advantages over coaxial media:
    It uses inexpensive, readily available copper phone wire. UTP wire is much easier to install and debug than coax. UTP uses RG-45 connectors, which are cheap and reliable.
    What is a router? What is a gateway?
    Routers are machines that direct a packet through the maze of etworks that stand between its source and destination. Normally a router is used for internal networks while a gateway acts a door for the packet to reach the ??outside?? of the internal network


    What is Semaphore? What is deadlock?

    Semaphore is a synchronization tool to solve critical-section problem, can be used to control access to the critical section for a process or thread. The main disadvantage (same of mutual-exclusion) is require busy waiting. It will create problems in a multiprogramming system, where a single CPU is shared among many processes.
    Busy waiting wastes CPU cycles.
    Deadlock is a situation when two or more processes are waiting indefinitely for an event that can be caused by only one of the waiting processes. The implementation of a semaphore with a waiting queue may result in this situation.


    What is Virtual Memory?

    Virtual memory is a technique that allows the execution of processes that may not be completely in memory. A separation of user logical memory from physical memory allows an extremely large virtual memory to be provided for programmers when only a smaller physical memory is available. It is commonly implemented by demand paging. A demand paging system is similar to a paging system with swapping. Processes reside on secondary memory (which is usually a disk). When we want to execute a process, we swap it into memory.

    Interview questions for Linux admin

    1. Advantages/disadvan tages of script vs compiled program.
    2. Name a replacement for PHP/Perl/MySQL/ Linux/Apache and show main differences.
    3. Why have you choosen such a combination of products?
    4. Differences between two last MySQL versions. Which one would you choose and when/why?
    5. Main differences between Apache 1.x and 2.x. Why is 2.x not so popular? Which one would you choose and when/why?
    6. Which Linux distros do you have experience with?
    7. Which distro you prefer? Why?
    8. Which tool would you use to update Debian / Slackware / RedHat / Mandrake / SuSE ?
    9. You??re asked to write an Apache module. What would you do?
    10. Which tool do you prefer for Apache log reports?
    11. Your portfolio. (even a PHP guest book may work well)
    12. What does ??route?? command do?
    13. Differences between ipchains and iptables.
    14. What??s eth0, ppp0, wlan0, ttyS0, etc.
    15. What are different directories in / for?
    16. Partitioning scheme for new webserver. Why?
    17. How do you list the files in an UNIX directory while also showing hidden files? ls -ltra
    18. How do you execute a UNIX command in the background? Use the ??&".
    19. What UNIX command will control the default file permissions when files are created? umask
    20. Explain the read, write, and execute permissions on a UNIX directory. Read allows you to see and list the directory contents. Write allows you to create, edit and delete files and subdirectories in the directory. Execute gives you the permissions to run programs or shells from the directory.
    21. What is the difference between a soft link and a hard link? A symbolic (soft) linked file and the targeted file can be located on the same or different file system while for a hard link they must be located on the same file system.
    22. Give the command to display space usage on the UNIX file system. df -lk
    23. Explain iostat, vmstat and netstat. iostat reports on terminal, disk and tape I/O activity. vmstat reports on virtual memory statistics for processes, disk, tape and CPU activity. netstat reports on the contents of network data structures.
    24. How would you change all occurrences of a value using VI? %s/(old value)/(new value)/g
    25. Give two UNIX kernel parameters that effect an Oracle install. SHMMAX & SHMMNI
    26. Briefly, how do you install Oracle software on UNIX? Basically, set up disks, kernel parameters, and run orainst.
    Explain the layered aspect of a UNIX system. What are the layers? What does it mean to say they are layers?
    A UNIX system has essentially three main layers:
    ? The hardware
    ? The operating system kernel
    ? The user-level programs
    The kernel hides the system??s hardware underneath an abstract, high-level programming interface. It is responsible for implementing many of the facilities that users and user-level programs take for granted.
    The kernel assembles all of the following UNIX concepts from lower-level hardware features:
    ? Processes (time-sharing, protected address space)
    ? Signals and semaphores
    ? Virtual Memory (swapping, paging, and mapping)
    ? The filesystem (files, directories, namespace)
    ? Pipes and network connections (inter-process communication)


    Have a nice day,Take care...


    MYK
    MYK
    www.enjoymenttube.blogspot.com
    www.facebook.com/pages/Enjoyment-Tube/227697370623550?ref=hl
    [SIGPIC][/SIGPIC]

  2. #2
    Hi Guys & Girls ,Hope u like these Some ,...have a nice day ,Take care...

    MYK
    MYK
    www.enjoymenttube.blogspot.com
    www.facebook.com/pages/Enjoyment-Tube/227697370623550?ref=hl
    [SIGPIC][/SIGPIC]

  3. #3
    oh great..thanks 4 this..
    but i waz wondering...where are the answers for majority of the questions...if u could give those...it had be kind of you...



  4. #4
    When i m fre i read it again and give answers.Good day..Thanks for pointing thating my attension...

    Myk
    MYK
    www.enjoymenttube.blogspot.com
    www.facebook.com/pages/Enjoyment-Tube/227697370623550?ref=hl
    [SIGPIC][/SIGPIC]

  5. #5
    What is this? I seriously do not/can not see the reason behind this topic. I felt like reporting this but held back; just cuz' may be you can justify this. Are you trying to seek help or are you trying to create content for your *new* site by asking the experts in here? Please elaborate what are your intentions as I can clearly see its a Copy & Paste job!
    aye dil tu tanhaiyon main rehne ka AaDi hoja.. jinhein tu yaad karta hai wo bare masroof rehte hain..

  6. #6
    HI

    Quote Originally Posted by AaDi, post: 352897
    What is this? I seriously do not/can not see the reason behind this topic. I felt like reporting this but held back; just cuz' may be you can justify this. Are you trying to seek help or are you trying to create content for your *new* site by asking the experts in here? Please elaborate what are your intentions as I can clearly see its a Copy & Paste job!
    Dear if u want report Then Go on ,I have no problem and i dont know y u have problem ..

    This is not a topic keh app iss py bala balaa batain kro ,this is only simple question,Answers post only to help and share with the friends here,,,May be the information will help soem one or even a 1 person get benefited with it...definately copy past hi hy,MAin ny kub kaha i wrote it...
    So dont be angry...Stay COOOOOOOOOOL

    Good day
    MYK
    www.enjoymenttube.blogspot.com
    www.facebook.com/pages/Enjoyment-Tube/227697370623550?ref=hl
    [SIGPIC][/SIGPIC]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •