Free Essay

Guide to Unix Using Linux

In:

Submitted By hsa8275
Words 1150
Pages 5
Review Questions
1. b cat > Meeting

2. a cal

3. a Ctrl + b

4. d passwd

5. c man cat

6. d System V

7. a Bash shell

8. c cat >> Annual_Report

9. b log in remotely to another computer on a network

10. d the administrative account that has complete access to a UNIX/Linux system

11. c tail –n 2 project

12. a q

13 A SUSE Linux Enterprise B Mandriva C Fedora D Red Hat Enterprise Linux

14. a less b cat

15. a the users on the local system C a listing of all authorized users on a system, regardless of whether or not they are logged in

16 d clear

17. d Use the shut Down option even though your coworker may want to access the computer after you, becuase this is the best way to fully reinitialize security for the next user session

18. b a peer-to-peer network

19. a a mainframe computer
B a desktop pc
C a sever
D a workstation used for scientific research

20. c press the up arrow key one time

21. b date -u

22번. 스크롤을 아래로 내려 파일의 내용을 볼 수 있습니다
23번. Telnet은 원격 컴퓨터, UNIX, 리눅스, 또는 Windows PC를 연결하는데 사용될 수 있다.
24번. 유닉스와 리눅스는 예민하다, 그러므로 달력을 표시하기 위해서 cal명령과 not cal명령을 사용해야만 한다.
25번. 한줄에 한 개이상의 명령을 실행시키기 위해서는 :세미콜론을 사용하여 각각의 명령을 구분시킨다.

1장 DISCOVERY EXERCISES 1. 현재 파일목록확인을 할 때 사용하는 명령어이다. 현재디렉토리의 파일 목록뿐만 아니라 원하는 파일이 어느 디렉토리에있는지도 확인가능하다.

2. –R 옵션을 찾을 수가 없습니다.

3. 알아볼것 없음

4. 저는 1995년 8월 20일 생입니다. 확인 결과 일요일입니다.

4. 2008년 2012년

6.
화면에 clear를 입력 후 화면을 정리하고 ..

7.
Date –u로 출력합니다.

8. cal > month를 입력하여 파일은 만들었다.

9.파일을 열어보니 2015년 3월 달력이 적혀있었습니다.
1 2015년 3월 2 일 월 화 수 목 금 토 3 1 2 3 4 5 6 7 4 8 9 10 11 12 13 14 5 15 16 17 18 19 20 21 6 22 23 24 25 26 27 28 7 29 30 31 8

10.

11.

12.

13.

14. vi favorite_food 입력 후 음식을 적어 나열하였습니다. 그다음 ESC를 누르고 :wq 를 입력 후 나갔다가 다시 vi favorite_food를 입력하여 파일에 들어갔습니다. 그다음 i를 누른후 엔터를치고 제입력하였습니다.

15. who 와 w 의 비슷한점은 사용자,터미널, 로그인시간이 나오는 것이 비슷합니다.
16.

who –uH 입력시
이름 행 시간 유휴 개인 번호 주석 hyunjun1015 pts/2 3월 9일 15:44 . 5440 (172.16.239.29) herb1208 pts/26 3월 9일 16:04 . 7102 (172.16.239.11) oo015220012 pts/37 3월 9일 16:47 . 11079 (172.16.239.35) sk2yang pts/4 3월 9일 16:04 . 6998 (172.16.239.14) cjsdmlsks pts/27 3월 9일 16:44 . 10751 (172.16.239.24) dc9008 pts/6 3월 9일 17:07 . 13078 (172.16.239.17) phanton pts/7 3월 9일 16:56 . 12081 (172.16.239.16) lms0609 pts/8 3월 9일 15:43 0:02 5303 (172.16.239.34) hsa8275 pts/9 3월 9일 15:43 . 5333 (172.16.239.33) tlatkddn4890 pts/10 3월 9일 17:03 0:02 12732 (172.16.239.9) mjh0328s pts/11 3월 9일 16:34 . 9557 (172.16.239.23) tmd9212 pts/12 3월 9일 16:21 . 8287 (172.16.239.41) rocjf168 pts/13 3월 9일 16:47 . 11052 (172.16.239.22) steam012 pts/14 3월 9일 15:44 . 5507 (172.16.239.30) aspira2771 pts/15 3월 9일 15:44 0:01 5529 (172.16.239.2) dlwldus1929 pts/16 3월 9일 15:44 1:29 5549 (172.16.239.1) mshayoon pts/18 3월 9일 17:07 0:02 13201 (172.16.239.32) phanton pts/19 3월 9일 15:44 0:16 5586 (172.16.239.16) walrus11 pts/21 3월 9일 17:07 0:02 13131 (172.16.239.3) t12007 pts/22 3월 9일 16:07 . 7336 (172.16.239.10) mykms03 pts/23 3월 9일 15:59 . 6688 (172.16.239.27) ldm3792 pts/24 3월 9일 17:12 . 13752 (172.16.239.9) lll99lll pts/25 3월 9일 15:50 1:23 6163 (172.16.239.38) hamks pts/29 3월 9일 16:11 0:29 7567 (203.247.239.220) wlgns707 pts/30 3월 9일 16:19 0:02 8143 (172.16.239.4) cccf896 pts/35 3월 9일 16:38 0:35 9967 (172.16.239.13) hhb0811 pts/28 3월 9일 16:30 . 9187 (172.16.239.15) sonfong pts/31 3월 9일 17:02 . 12593 (172.16.239.25) dlwldus1929 pts/32 3월 9일 16:28 . 8862 (172.16.239.1) cha935 pts/33 3월 9일 16:31 0:06 9254 (172.16.239.234) wjdals95 pts/34 3월 9일 16:33 0:01 9417 (172.16.239.36) swwking92 pts/38 3월 9일 16:34 0:01 9593 (172.16.239.42) hiysung pts/39 3월 9일 17:08 0:02 13341 (172.16.239.7) gfd1213 pts/40 3월 9일 17:05 0:07 12885 (172.16.239.19) choi6543 pts/41 3월 9일 16:40 0:28 10246 (172.16.239.31)

w입력시

5시14분오후 현재 가동중 4일, 14:56, 34 사용자, 로드 평균: 0.03, 0.03, 0.03
사용자 터미늘 로그인시간 휴지 JCPU PCPU 활동 hyunjun1 pts/2 3시44분오후 1 2 2 /usr/local/bin/vim month herb1208 pts/26 4시04분오후 cat oo015220 pts/37 4시47분오후 1 -csh sk2yang pts/4 4시04분오후 -csh dc9008 pts/6 5시07분오후 -csh phanton pts/7 4시56분오후 -csh lms0609 pts/8 3시43분오후 3 more -s /tmp/mpkwaGCx hsa8275 pts/9 3시43분오후 1 w tlatkddn pts/10 5시03분오후 3 -csh mjh0328s pts/11 4시34분오후 1 -csh tmd9212 pts/12 4시21분오후 1 -csh rocjf168 pts/13 4시47분오후 1 -csh steam012 pts/14 3시44분오후 1 /usr/local/bin/vim month aspira27 pts/15 3시44분오후 more -s /tmp/mptyaa4z dlwldus1 pts/16 3시44분오후 1:30 -csh mshayoon pts/18 5시07분오후 3 -csh phanton pts/19 3시44분오후 17 cat walrus11 pts/21 5시07분오후 3 more -s /tmp/mpdGaiLA t12007 pts/22 4시07분오후 1 -csh mykms03 pts/23 3시59분오후 1 -csh ldm3792 pts/24 5시12분오후 -csh lll99lll pts/25 3시50분오후 1:24 -csh hamks pts/29 4시11분오후 30 -csh wlgns707 pts/30 4시19분오후 -csh cccf896 pts/35 4시38분오후 36 -csh hhb0811 pts/28 4시30분오후 1 -csh sonfong pts/31 5시02분오후 1 -csh dlwldus1 pts/32 4시28분오후 -csh cha935 pts/33 4시31분오후 7 more -s /tmp/mpbZaWSz wjdals95 pts/34 4시33분오후 2 -csh swwking9 pts/38 4시34분오후 -csh hiysung pts/39 5시08분오후 -csh gfd1213 pts/40 5시05분오후 9 -csh choi6543 pts/41 4시40분오후 30 cat
17. who -b
. system boot 3월 5일 02:18

18. history 입력후 확인된 내용 139 man history 140 history

19. who –H는 who 명령어와 같이 지금 로그인 되있는 사람들의 아이디, 터미널 날짜,시간 아이피를 나타내고 CAL 2009는 2009년도의 달력을 출력해주었습니다. 마지막으로 clear 는 화면에 출력된 내용들을 삭제 시켜주었습니다.

Similar Documents

Free Essay

Linux Chapter 1

...Chapter 1 Introduction to Linux At a Glance Class Notes Table of Contents • Overview • Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms • Technical Notes for Hands-On Projects Lecture Notes Overview Linux technical expertise is essential in today’s computer workplace as more and more companies switch to Linux to meet their computing needs. Thus, it is important to understand how Linux can be used, what benefits Linux offers to a company, and how Linux has developed and continues to develop. In the first half of this chapter, you will learn about operating system terminology and features of the Linux operating system, as well as the history and development of Linux. Later in this chapter, you will learn about the various types of Linux and situations in which Linux is used. Chapter Objectives In this chapter, you will learn to: • Understand the purpose of an operating system • Outline the key features of the Linux operating system • Describe the origins of the Linux operating system • Identify the characteristics of various Linux distributions and where to find them • Explain the common uses of Linux in industry today Quick Quiz 1 1. What term is used to describe a running program on Linux? a. Application b. Process c. Runtime d. Project 2. What is represented...

Words: 3777 - Pages: 16

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

Pos/ Final Paper Compare Windows Linux Unix and Mac

...UNIX®/Linux® versus Mac® versus Windows® POS/355 October 29, 2012 Carol S. Eichling UNIX®/Linux® versus Mac® versus Windows® There are several computer operating systems available on the market, and it is sometimes difficult to choose. Therefore, it is important to compare the system capabilities to make the decision easier. The three biggest players in the operating systems market are UNIX®/Linux®, Mac®, and Microsoft® Windows® with Windows® holding the largest market share (Boitor & Brătucu, 2011). These three operating systems are capable of multi-processing and have similar capabilities; however, and it is important to compare and contrast how they handle memory management, process management, file management, and security, which are critical system functions. Discussing memory management, which is a vital component in operating systems, is first. Memory Management Memory management refers to the way a system makes use of the computer’s RAM (Random Access Memory). Many of the operating systems in use on computer systems have positives and negatives in their use of memory attributes. “Memory management is usually divided into three areas: hardware, operating system, and application…although the distinctions are a little fuzzy. In most computer systems, all three are present to some extent, forming layers between the user's program and the actual memory hardware” (Ravenbrook Limited, 2001, p. 1). There are several types of memory, including main memory, file system...

Words: 2974 - Pages: 12

Premium Essay

Evolution of the Universe

...UNIX, Linux, Mac, and Windows OS Comparison Paper B. James Bryant UNIX, Linux, Mac, and Windows OS Comparison In 1956, General Motors produced the first OS for its IBM 704 series mainframe. Since then companies around the world, both big and small, have been tirelessly researched, testing, and releasing newer and faster operating systems for the world to use. Among these are systems developed by/for UNIX, Linux, Microsoft, and Apple. In fact, it’s safe to say that these four companies have a monopoly on all current technology used in both the military, corporate, and private sectors all around the world. UNIX Operating System Unix operating systems have the ability to be multi-user, multi-tasking and portable. Multi-user capabilities are accomplished through time sharing which means the processor allocates slices of time to first one process and then the next, sharing the available time in sequence with waiting processes (Nagpal, 2009). Unix can run in either command line interface, CLI, or graphic user interface or GUI mode. A key and unique feature of Unix is that it has a modular design which allows parts of the system to be added or removed without affecting performance of the other parts making Unix systems highly customizable. Unix operating systems have four core components, (1) the kernel, (2) the shell, (3) the file system, and (4) the utilities or tools and applications (Love et al, 2005). The kernel is the lowest layer of the operating system that...

Words: 5010 - Pages: 21

Free Essay

The History of Unix

...The Development of UNIX that prompted the creation of the GNU Operating System and the Linux Kernel Kyle Smoot Composition 1 Ms. Christine Kirsch 11/11/2010 The Development of UNIX that prompted the creation of the GNU Operating System and the Linux Kernel Without the Massachusetts Institute of Technology (MIT), the field of Information Technology would have never seen the development of UNIX, the GNU Operating System, or the Linux Kernel. The Development of UNIX The late 1950’s saw the rapid improvement of electronics. With this, it became apparent that computers would soon be able to time-share by switching back and forth between multiple users quickly. Fernando Corbato at the Massachusetts Institute of Technology (MIT) Computation Center led a team that created one of the first multi-user operating systems called the Compatible Time-Sharing System (CTSS) which was highly influential to the development of UNIX. (Diaz, Christopher, © 2007 ) In the 1960’s, AT&T Bell Labs, General Electric, and MIT conducted a joint research effort to build a next generation multi-user operating system called the Multiplexed Information and Computing System (MULTICS). The Bell Labs staff involved with MULTICS, including Ken Thompson, Dennis Ritchie, Joe Ossanna, and M. D. McIlroy, saw great potential in a communal environment enabled by a multi-user computer system, and they started looking for a way to preserve capability. In 1969, Thompson wrote a game on MULTICS called Space...

Words: 1468 - Pages: 6

Premium Essay

Unix

...| UNIX Performance Monitoring | My Research Paper | Student: Dwayne Blanchard Instructor: Professor Cliff KrahenbillAdvanced UNIX AdministrationMarch 3, 2012 | | | | | | The topic of my research paper will be on UNIX performance monitoring. The reason for choosing this topic is for personal understanding on how much UNIX performance monitoring differs from the monitoring of Windows based computers. This research paper is not to compare the two systems but to gain an understanding of how UNIX monitors performance. I don’t have any personal experience with working with UNIX systems, but as always eager to gain insight of different operating systems. The first thing I would like to discover is some of the common performance problems encountered caused by software, hardware and the combination of the two, the different terminologies associated with the processes via hardware or software, and finally what different utilities are used for monitoring these problems. We all know that UNIX has been around since the early 1970’s and the developments of performance tools have been around for a long time to enable system administrators in tuning systems for optimal performance. Operating systems performance problems normally involves process management, memory management, and scheduling. The object of performance on UNIX based systems is to determine the amount of time the operating system spends during scheduling...

Words: 1293 - Pages: 6

Free Essay

A History of Modern

...Guide to Computer Forensics and Investigations Fourth Edition Chapter 7 Current Computer Forensics Tools Objectives • Explain how to evaluate needs for computer forensics tools • Describe available computer forensics software tools • List some considerations for computer forensics hardware tools • Describe methods for validating and testing computer forensics tools Guide to Computer Forensics and Investigations 2 Evaluating Computer Forensics Tool Needs • Look for versatility, flexibility, and robustness – – – – – OS File system Script capabilities Automated features Vendor’s reputation • Keep in mind what application files you will be analyzing Guide to Computer Forensics and Investigations 3 Types of Computer Forensics Tools • Hardware forensic tools – Range from single-purpose components to complete computer systems and servers • Software forensic tools – Types • Command-line applications • GUI applications – Commonly used to copy data from a suspect’s disk drive to an image file Guide to Computer Forensics and Investigations 4 Tasks Performed by Computer Forensics Tools • Five major categories: – – – – – Acquisition Validation and discrimination Extraction Reconstruction Reporting Guide to Computer Forensics and Investigations 5 Tasks Performed by Computer Forensics Tools (continued) • Acquisition – Making a copy of the original drive • Acquisition subfunctions: – – – – – – – Physical data copy Logical data copy...

Words: 2076 - Pages: 9

Premium Essay

Kohls Manager

...UNIX/Linux versus Mac versus Windows Rough Draft Annette Freshwater, POS355 November 4, 2013 Alicia Pearlman UNIX/Linux versus Mac versus Windows Final In today’s world of technology creation, development, and enhancement there are key factors to take into consideration. The choice of operating systems can determine the software and hardware utilized, the applications of the devices or programs, and determines the demographic, which will use the products. However the ever-changing field of technology has become more user-friendly, compatible, and more accepted in main stream than before. The main operating systems employed today are as follows: UNIX/Linux, Mac, and Windows. We will explore the various aspects of key components in these operating systems, memory, process, and file management along with the security of each system. The comparison of each system will determine the operating system best suited for the needs of our creations, projects, and improvements to the technology of the past, present, and future. MEMORY MANAGEMENT Memory management in multiprocessor systems is essential in executing several processes simultaneously. The multitasking of a system aids the user in accomplishing his or her task more efficiently than with a single processor system, which is important in the current climate of today’s multifaceted mix of professional and personal world. Why choose UNIX/Linux, Mac, or Windows to develop a device, product, or program? The...

Words: 2557 - Pages: 11

Free Essay

Management

...|[pic] |Syllabus | | |College of Information Systems & Technology | | |POS/355 Version 9 | | |MU12BIT08 | | |Introduction to Operational Systems | | |Wk 1 June 10 | | |Wk 2 June 17 | | |Wk 3 June 24 | | |Wk 4 July 01 | | |Wk 5 July 08 ...

Words: 2247 - Pages: 9

Free Essay

Test

...NT1430 Linux Networking: Study Guide Wed 21-November-2012 Linux Commands: Know these commands and what they do: • Directory and list commands o ls, ls –l o pwd o cd / o cd and cd~ (hint: both take you to your home directory) o cd .. (takes you up one directory • Know what cp and mv do and how to use them • File viewing commands: o cat o less and more (one page at atime) o vi and view o tail (shows the last 10 lines of a file) o head (shows the top 10 lines) • chmod for changing permissions on files and directories • know the differences in read write and execute for owner group and all • > to redirect output to a file (overwrites if file exists) • >> appends to a file • & puts a process in the background while fg brings it to the foreground. • ps –ef | grep programname locates a running process for you • grep is a program that searches for a string within a directory or command output • The pipe symbol ( | ) sends output from one command to the input of another. • Know what a Linux shell script is. Direcories and file systems • / is the root of the entire file system • /usr stores program files • /home stores user home directories • /etc stores Linux configuration files • /var stores various miscellaneous files • /proc is a virtual directory that stores system performance metrics...

Words: 1137 - Pages: 5

Premium Essay

Mac vs Microsoft vs

...operating system is the ability to manage its memory. It is crucial for the operating system to be able to handle large amounts of information at the same time by using the processor, the RAM and the Hard Drive. Operating systems need a way to be able to allocate and de-allocate memory within the sectors of the RAM using the Kernel. However, every operating system handles this very differently. Let’s take a look at the differences between the three major operating systems and how they each manage its memory. We begin by analyzing UNIX/Linux. Linux, a form of UNIX, is very different in how it manages its memory to the other operating systems. Linux uses a tree like structure for memory management, and also using a numeric algorithm to make the best use of its valuable memory. The memory it manages is maintained in structures which enable protection of them by converting the list into the tree like structure. The tree is also balanced and not too much in depth. This helps for the information to be reached much more easily because it is closer for the processor to grab and use. It also cuts the time it takes for the processor to reach the data that would otherwise take longer to reach. The Virtual Address Descriptors marks the nodes within the tree as reserved, committed, or free. MAX OS works in a similar fashion to UNIX. Each task created within the MAC operating system has its own memory map. Within the operating system, the memory map mentioned before takes a form in to what...

Words: 2337 - Pages: 10

Free Essay

Hacking Tips

...Number 1 Internet for Dummies -- skip this if you are a Unix wizard. But if you read on you’ll get some more kewl hacking instructions. ____________________________________________________________ The six Guides to (mostly) Harmless Hacking of Vol. 1 jumped immediately into how-to hacking tricks. But if you are like me, all those details of probing ports and playing with hypotheses and pinging down hosts gets a little dizzying. So how about catching our breath, standing back and reviewing what the heck it is that we are playing with? Once we get the basics under control, we then can move on to serious hacking. Also, I have been wrestling with my conscience over whether to start giving you step-by-step instructions on how to gain root access to other peoples’ computers. The little angel on my right shoulder whispers, “Gaining root without permission on other people’s computers is not nice. So don’t tell people how to do it.” The little devil on my left shoulder says, “Carolyn, all these hackers think you don’t know nothin’! PROOVE to them you know how to crack!” The little angel says, “If anyone reading Guide to (mostly) Harmless Hacking tries out this trick, you might get in trouble with the law for conspiracy to damage other peoples’ computers.” The little devil says, “But, Carolyn, tell people how to crack into root and they will think you are KEWL!” So here’s the deal. In this and the next few issues of Guide to (mostly) Harmless Hacking I’ll tell you several ways...

Words: 13749 - Pages: 55

Free Essay

Nt1430 Week 1 Assignment

...Chapter 1 Exercise 1 Free software is software which is not charged for; as such you can share it with whoever you want, as many times as you want. You can also install it on as many of your home computers as you wish. Chapter 1 Exercise 4 GNU a group dedicated to creating an operating system compatible with the Unix software system. Linux is based off the original Unix operating software. Unix provided the kernel, while Linux provided the interface that people used in place of another operating system like windows or apples own software. Linus Torvalds developed the Linux kernel, and Richard Stallman created the GNU Project Chapter 2 Exercise 1 Depending on the installation being done, Fedora/RHEL either overwrites all the files on the hard drive, or updates the software that has new versions Chapter 3 Exercise 1 A live system is where you have a linux running on top of another operating system like windows. The advantages are that none of the changes you make are kept, as it doesn’t write to the hard drive Chapter 3 Exercise 4 I honestly could not find the answer to this question Chapter 3 Exercise 8 Disk Druid is a GUI program that allows users to add, delete or modify partitions on a hard disk Chapter 11 Exercise 1 Single user mode is where only the system console is enabled, you can run programs from the console, so long as they are not graphical programs (Text only). Multi user Mode is where you have a graphical interface to use. Chapter 11 Exercise 3 SU...

Words: 464 - Pages: 2

Free Essay

Linux

...NT1430 Linux Networking: Study Guide Wed 21-November-2012 Linux Commands: Know these commands and what they do: • Directory and list commands o ls, ls –l o pwd o cd / o cd and cd~ (hint: both take you to your home directory) o cd .. (takes you up one directory • Know what cp and mv do and how to use them • File viewing commands: o cat o less and more (one page at atime) o vi and view o tail (shows the last 10 lines of a file) o head (shows the top 10 lines) • chmod for changing permissions on files and directories • know the differences in read write and execute for owner group and all • > to redirect output to a file (overwrites if file exists) • >> appends to a file • & puts a process in the background while fg brings it to the foreground. • ps –ef | grep programname locates a running process for you • grep is a program that searches for a string within a directory or command output • The pipe symbol ( | ) sends output from one command to the input of another. • Know what a Linux shell script is. Direcories and file systems • / is the root of the entire file system • /usr stores program files • /home stores user home directories • /etc stores Linux configuration files • /var stores various miscellaneous files • /proc is a virtual directory that stores system performance metrics...

Words: 1137 - Pages: 5