answersLogoWhite

0

📱

Unix

Unix is a family of operating systems primarily designed for servers, mainframes, and high-end workstations. First created in 1969, Unix systems are renowned for their security and stability.

1,127 Questions

What is kourn shell?

The Korn shell is a command interpretor that combines the syntax and abilities of the csh shell and the sh (Bourne) shell. It was designed by David Korn of Bell Labs.

Who owns the UNIX trademark today?

The UNIX trademark is owned by The Open Group.

What is a dirty page in Unix?

A dirty page is one that has been modified and does not exist in its current state in the paging file, so it has to be written out to replace the page in the disk.

What is the administrator's prompt in the command line on unix?

The usual indication of running as the administrator in Unix is show a prompt that contains the '#' character as either the prompt or part of the prompt.

IF we r terminated at the middle of the program execution in UNIX what will happen to the program it will continue running or terminate or the op will be send to your mail?

It depends on whether the program responds to a hangup signal or not. If you start the program with a 'nohup' command then it will continue to execute.

Does MySQL run on both Unix and Windows?

Yes. There are versions of MySQL for most Unix products, including Mac OS X, as well as Linux and Windows.

What are the backup commands in Unix?

Hi, You can try one of the following commands: 1) tar 2) cpio 3) dd Do a "man" of the command to get the usage syntax and options from the online man pages (e.g. "man tar") Hope this helps. - Ramki.

What is the relationship of IBM and REDHAT between GUI?

It is a very complex relationship that cannot be shared with the un-initiated. You must first learn to do search and replaces on arbitrary line ranges on files being edited within 'vi' before such secrets are shared.

What are the advantages of AIX?

AIX is a mature, stable, secure version of Unix that is backed by and supported by a large organization (IBM).

It runs on entry level servers all the way up to enterprise scalable processors. The advantages of AIX over other versions of Unix is somewhat debatable, depending on whom you talk to.

Can you dual-boot Windows and Unix?

Yes. Some versions of Unix are capable of running on the same hardware as Windows. Mac OS X, a certified version of UNIX, includes a utility known as "Boot camp" to install Windows in a dual-boot setup easily. Solaris 10 can also be used in a dual-boot setup by carefully partitioning the drive and setting up GRUB.

How do you find which unix flavor we are using?

Use the 'uname -a' command. It reports on the Unix system, version, machine name, amongst other things.

Which operating system is developed first unix or Linux?

Definitely not. Unix was developed around 1969 - 1972, and Operating Systems have been available since the very late 1940's, early 50's.

What are the uses of the endosperm portion of the wheat kernel?

White flour is made only with the endosperm portion of the wheat kernel. Farina is also made from the endosperm, but it is ground to produce a granular product.

What is the function of PS system call in unix?

I don't believe there is a PS system call; however, there is a 'ps' command that is commonly used to show all (or a select few) processes running on the system and their resource utilization.

It is also used so that users can terminate disconnected processes when they don't want them to run anymore.

Is UNIX time shearing operating system?

We are not sure what you mean by "shearing", it is men that "shear" sheep in timed competitions, not operating systems.

What are the advantages and disadvantages of using the root login account in unix?

It is never a good idea to log in to the system as root, unless it must fixed in administrative mode. The disadvantage is that you have to be very careful because you are operating at the root account level, which lets you do anything you want without checking for safety.

The only advantage is that you are running under a privileged program and can anything you want on the system.