1.Create user with specified Home directory ..?
12. How can I find out the source file of a hard link ?Ans. No, you can’t find out the source file of a hard link. Once hard link is created,
14. What is the use of initrd directory..?Ans. The Linux initial RAM disk (initrd) is a temporary root file system that is mounted
Ans: useradd -d "Directory Path" username
Ex: useradd -d /var/aravi aravi
2. Create new user, user should change password by first login..?
Ans: useradd <user name>
Ex: useradd aravi1; chage -d 0 aravi1; passwd aravi1
3. How to ditermine cronjob ran status..?
Ans:
<After the Cron Script> Add the $? > <Log File>
Ex: useradd -d /var/aravi aravi
Ans: useradd <user name>
Ex: useradd aravi1; chage -d 0 aravi1; passwd aravi1
Ans:
<After the Cron Script> Add the $? > <Log File>
Find the code below and its status
0 -- No problems.
1 -- An attempt has been made to start cron but there is already a /var/run/cron.pid file.
1 -- An attempt has been made to start cron but there is already a /var/run/cron.pid file.
If there really is no other cron daemon running (this does not include invokations of mcron) then
you should remove this file before attempting to run cron.
2 -- In parsing a guile configuration file, a job command has been seen but the second argument
2 -- In parsing a guile configuration file, a job command has been seen but the second argument
is neither a procedure, list or string. This argument is the job's action, and needs to
be specified in one of these forms.
3 -- In parsing a guile configuration file, a job command has been seen but the first
3 -- In parsing a guile configuration file, a job command has been seen but the first
argument is neither a procedure, list or string. This argument is the job's next-time specification,
and needs to be specified in one of these forms.
4 -- An attempt to run cron has been made by a user who does not have permission to access the
4 -- An attempt to run cron has been made by a user who does not have permission to access the
crontabs in /var/cron/tabs. These files should be readable only by root, and the cron
daemon must be run as root.
5 -- An attempt to run mcron has been made, but there are no jobs to schedule!
6 -- The system administrator has blocked this user from using crontab with the
5 -- An attempt to run mcron has been made, but there are no jobs to schedule!
6 -- The system administrator has blocked this user from using crontab with the
files /var/cron/allow and /var/cron/deny.
7 -- Crontab has been run with more than one of the arguments -l, -r, -e.
7 -- Crontab has been run with more than one of the arguments -l, -r, -e.
These are mutually exclusive options.
8 -- Crontab has been run with the -u option by a user other than root.
8 -- Crontab has been run with the -u option by a user other than root.
Only root is allowed to use this option.
9 -- An invalid vixie-style time specification has been supplied.
10 -- An invalid vixie-style job specification has been supplied.
11 -- A bad line has been seen in /etc/crontab.
12 -- The last component of the name of the program was not one of mcron, cron, crond or crontab.
13 -- Either the ~/.cron directory does not exist, or there is a problem reading the files there.
15 -- Crontab has been run without any arguments at all. There is no default behaviour in this case.
16 -- Cron has been run by a user other than root.
4. What is zombie process in Linux ..?
Ans: Zombie process is a process that has completed execution (via the exit system call)
but still has an entry in the process table: it is a process in the "Terminated state".
5. How to find and kill zombie process in Linux ..?Ans: To find zombie process in Linux use below command
$ ps axo stat,ppid,pid,comm | grep -w Z
$ kill -9 <PID>
6. How to find Linux system calls ..?
Ans: using $ strace command we can find system calls
7. What is the Difference between Hardlink and Softlink in Linux..?
Even if you change the name of the other file, a hardlink still points to the file. If you replace the
other file with a new version (by copying it), a hardlink will not point to the new file.
You can only have hardlinks within the same filesystem. With hardlinks you don't have
concept of the original files and links, all are equal (think of it as a reference to an object).
It's a very low level concept.
Soft Link:
A softlink is actually pointing to another path (a file name); it resolves the name of the file each time
9 -- An invalid vixie-style time specification has been supplied.
10 -- An invalid vixie-style job specification has been supplied.
11 -- A bad line has been seen in /etc/crontab.
12 -- The last component of the name of the program was not one of mcron, cron, crond or crontab.
13 -- Either the ~/.cron directory does not exist, or there is a problem reading the files there.
15 -- Crontab has been run without any arguments at all. There is no default behaviour in this case.
16 -- Cron has been run by a user other than root.
Ans: Zombie process is a process that has completed execution (via the exit system call)
but still has an entry in the process table: it is a process in the "Terminated state".
$ ps axo stat,ppid,pid,comm | grep -w Z
$ kill -9 <PID>
6. How to find Linux system calls ..?
Ans: using $ strace command we can find system calls
Ans:
Hard Link:
A hardlink isn't a pointer to a file, it's a directory entry (a file) pointing to the same inode.Even if you change the name of the other file, a hardlink still points to the file. If you replace the
other file with a new version (by copying it), a hardlink will not point to the new file.
You can only have hardlinks within the same filesystem. With hardlinks you don't have
concept of the original files and links, all are equal (think of it as a reference to an object).
It's a very low level concept.
Soft Link:
A softlink is actually pointing to another path (a file name); it resolves the name of the file each time
you access it through the symlink. If you move the file, the symlink will not follow. If you replace
the file with another one, keeping the name, the symlink will point to the new file. Symlinks can
span filesystems. With symlinks you have very clear distinction between the actual file and symlink,
which stores no info beside the path about the file it points to.
8. How can I find all the Soft Links in my system ?Ans. Use this command for the same “find /etc -type l -exec ls -li {} \;”
8. How can I find all the Soft Links in my system ?Ans. Use this command for the same “find /etc -type l -exec ls -li {} \;”
9. How can I find all the files having Hard Links in my system ?Ans. Use this command for the same “find / -links +2 -type f -exec ls -li {} \;”
10. How to find whether a file is a softlink ?Ans.
10. How to find whether a file is a softlink ?Ans.
Simply using this command “ls -l” will tell you whether a file is pointing to some other file or not.
11. How to check whether a file have any softlink pointing to it ?Ans.Till now, I am not aware of any way to do that. If I will find any, I will surely update my post.
11. How to check whether a file have any softlink pointing to it ?Ans.Till now, I am not aware of any way to do that. If I will find any, I will surely update my post.
12. How can I find out the source file of a hard link ?Ans. No, you can’t find out the source file of a hard link. Once hard link is created,
there is no way to tell which was the first file created.
13. Can I make a Soft link to a Hard link and Vice Versa ?Ans. Yes, both soft links and hard links acts as normal files of the file system, so you can do both.
13. Can I make a Soft link to a Hard link and Vice Versa ?Ans. Yes, both soft links and hard links acts as normal files of the file system, so you can do both.
14. What is the use of initrd directory..?Ans. The Linux initial RAM disk (initrd) is a temporary root file system that is mounted
during system boot to support the two-state boot process. The initrd contains various
executables and drivers that permit the real root file system to be mounted
15. RHEL version comparison..?
Ans.
16. What is MYSQL query cache..?Ans: The query cache stores the text of a SELECT statement together with the corresponding
Ans.
result that was sent to the client. If an identical statement is received later, the server retrieves
the results from the query cache rather than parsing and executing the statement again.
17. What is Difference between Swap and Pagefile ..?Ans: SWAPFILES operate by swapping entire processes from system memory into the swapfile.
17. What is Difference between Swap and Pagefile ..?Ans: SWAPFILES operate by swapping entire processes from system memory into the swapfile.
This immediately frees up memory for other applications to use.
PAGING FILES function by moving "pages: of a program from system memory into the paging file.
These pages are 4KB in size. The entire program does not get swapped wholesale into the paging file,
when next application is requested this paging file not immediately freedup.
18. How to check the MYSQL running processes ..?Ans: You can run the MySQL command SHOW PROCESSLIST to see what queries are
18. How to check the MYSQL running processes ..?Ans: You can run the MySQL command SHOW PROCESSLIST to see what queries are
being processed.
19. How to identify which processes are taking more memory..?
OR
use below command to see top 5 processes
19. TCP vs UDP ..?
20. what is the difference between bash & ksh..?
19. How to identify which processes are taking more memory..?
Ans: Enter Command "top"
Press SHIFT+F
Press n (* N: %MEM = Memory usage (RES))
Press ENTER
use below command to see top 5 processes
$ ps -eo pmem,pcpu,vsize,pid,cmd | sort -k 1 -nr | head -5
Ans :
TCP -
Transmission Control Protocol.
TCP is a connection-oriented protocol.
Use by other protocols HTTP, HTTPs, FTP, SMTP, Telnet.
The speed for TCP is slower than UDP.
TCP header size is 20 bytes
TCP does error checking
Acknowledgement segments
UDP -
User Datagram Protocol or Universal Datagram Protocol
UDP is a connectionless protocol.
Use by other protocols DNS, DHCP, TFTP, SNMP, RIP, VOIP.
UDP is faster because there is no error-checking for packets.
UDP Header size is 8 bytes.
UDP does error checking, but no recovery options.
No Acknowledgment
Ans:
Y Feature can be done using this shell.
N Feature is not present in the shell.
F Feature can only be done by using the shells function mechanism.
L The readline library must be linked into the shell to enable this Feature
Description | sh | csh | ksh | bash | tcsh | zsh | rc | es |
Job control | N | Y | Y | Y | Y | Y | N | N |
Aliases | N | Y | Y | Y | Y | Y | N | N |
Shell functions | Y(1) | N | Y | Y | N | Y | Y | Y |
Sensible Input/Output redirection | Y | N | Y | Y | N | Y | Y | Y |
Directory stack | N | Y | Y | Y | Y | Y | F | F |
Command history | N | Y | Y | Y | Y | Y | L | L |
Command line editing | N | N | Y | Y | Y | Y | L | L |
Vi Command line editing | N | N | Y | Y | Y(3) | Y | L | L |
Emacs Command line editing | N | N | Y | Y | Y | Y | L | L |
Rebindable Command line editing | N | N | N | Y | Y | Y | L | L |
User name look up | N | Y | Y | Y | Y | Y | L | L |
Login/Logout watching | N | N | N | N | Y | Y | F | F |
Filename completion | N | Y(1) | Y | Y | Y | Y | L | L |
Username completion | N | Y(2) | Y | Y | Y | Y | L | L |
Hostname completion | N | Y(2) | Y | Y | Y | Y | L | L |
History completion | N | N | N | Y | Y | Y | L | L |
Fully programmable Completion | N | N | N | N | Y | Y | N | N |
Mh Mailbox completion | N | N | N | N(4) | N(6) | N(6) | N | N |
Co Processes | N | N | Y | N | N | Y | N | N |
Builtin artithmetic evaluation | N | Y | Y | Y | Y | Y | N | N |
Can follow symbolic links invisibly | N | N | Y | Y | Y | Y | N | N |
Periodic command execution | N | N | N | N | Y | Y | N | N |
Custom Prompt (easily) | N | N | Y | Y | Y | Y | Y | Y |
Sun Keyboard Hack | N | N | N | N | N | Y | N | N |
Spelling Correction | N | N | N | N | Y | Y | N | N |
Process Substitution | N | N | N | Y(2) | N | Y | Y | Y |
Freely Available | N | N | N(5) | Y | Y | Y | Y | Y |
Checks Mailbox | N | Y | Y | Y | Y | Y | F | F |
Tty Sanity Checking | N | N | N | N | Y | Y | N | N |
Can cope with large argument lists | Y | N | Y | Y | Y | Y | Y | Y |
Has non-interactive startup file | N | Y | Y(7) | Y(7) | Y | Y | N | N |
Has non-login startup file | N | Y | Y(7) | Y | Y | Y | N | N |
Can avoid user startup files | N | Y | N | Y | N | Y | Y | Y |
Can specify startup file | N | N | Y | Y | N | N | N | N |
Low level command redefinition | N | N | N | N | N | N | N | Y |
Has anonymous functions | N | N | N | N | N | N | Y | Y |
List Variables | N | Y | Y | N | Y | Y | Y | Y |
Full signal trap handling | Y | N | Y | Y | N | Y | Y | Y |
File no clobber ability | N | Y | Y | Y | Y | Y | N | F |
Local variables | N | N | Y | Y | N | Y | Y | Y |
Lexically scoped variables | N | N | N | N | N | N | N | Y |
Exceptions | N | N | N | N | N | N | N | Y |
No comments:
Post a Comment