The Linux Operating System and Linux-Related Issues



Similar documents
Unix the Bare Minimum

Lab 1: Introduction to C, ASCII ART and the Linux Command Line Environment

Command Line - Part 1

ICS 351: Today's plan

A Crash Course on UNIX

Introduction to the UNIX Operating System and Open Windows Desktop Environment

INASP: Effective Network Management Workshops

Command Line Crash Course For Unix

AN INTRODUCTION TO UNIX

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Unix Sampler. PEOPLE whoami id who

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

HP-UX Essentials and Shell Programming Course Summary

Introduction to the UNIX Operating System on IT Systems

Navigating the Rescue Mode for Linux

CMSC 216 UNIX tutorial Fall 2010

IMF Tune v7.0 Backup, Restore, Replication

Using the Command-Line Interface

Thirty Useful Unix Commands

Basic C Shell. helpdesk@stat.rice.edu. 11th August 2003

The Einstein Depot server

Tutorial Guide to the IS Unix Service

A UNIX/Linux in a nutshell

Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, Introduction 1. 2 Invoking Shell Scripts 2

Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

Web Hosting: Pipeline Program Technical Self Study Guide

UNIX: Introduction to TELNET and FTP on UNIX

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

An Introduction to the Linux Command Shell For Beginners

JUNOS Command Line Interface. Copyright 2003 Juniper Networks, Inc. 1

CS 2112 Lab: Version Control

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger

Hands-On UNIX Exercise:

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Sophos Anti-Virus for Linux configuration guide. Product version: 9

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Linux System Administration on Red Hat

IBM Sterling Control Center

Plesk 8.3 for Linux/Unix Acronis True Image Server Module Administrator's Guide

Introduction to Mac OS X

Linux Crontab: 15 Awesome Cron Job Examples

Sophos Anti-Virus for Linux configuration guide. Product version: 9

MUNIS Instructions for Logging into SaaS (ASP) Dashboard

NAS 253 Introduction to Backup Plan

Using Network Attached Storage with Linux. by Andy Pepperdine

CS 103 Lab Linux and Virtual Machines

L01 Introduction to the Unix OS

An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories

Higher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34

Sophos Anti-Virus for Linux user manual

IBM i Version 7.2. Systems management Advanced job scheduler

LECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics:

NetBackup Backup, Archive, and Restore Getting Started Guide

RemoteWare Software Manager

VERITAS NetBackup 6.0

University of Toronto

Tutorial 0A Programming on the command line

Command-Line Operations : The Shell. Don't fear the command line...

11. Oracle Recovery Manager Overview and Configuration.

New Lab Intro to KDE Terminal Konsole

A Brief Introduction to the Use of Shell Variables

Lab 1: Introduction to the network lab

FTP: Transferring Files to and from Home and UCS

Introduction to Unix Tutorial

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

List of FTP commands for the Microsoft command-line FTP client

Sendspace Wizard Desktop Tool Step-By-Step Guide

[HOW TO RECOVER AN INFINITI/EVOLUTION MODEM IDX ] 1

EMC Data Domain Operating System Retention Lock Software User s Guide

Week Overview. Running Live Linux Sending from command line scp and sftp utilities

RSA ACE/Agent 5.2 for UNIX Installation and Configuration Guide

MFCF Grad Session 2015

Unix Scripts and Job Scheduling

Dell NetVault Bare Metal Recovery for Dell NetVault Backup Server User s Guide

CSIL MiniCourses. Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith. Updated on:

Basic Linux and Unix commands, editing and transfering files

OneDrive for Business User Guide

WINDOWS INVENTORY General Procedures Guide

Stellar Phoenix Exchange Server Backup

GETTING STARTED TABLE OF CONTENTS

Agenda. Using HPC Wales 2

Kleine Linux-Tricks - schneller ohne Aufwand

Chapter 8 Operating Systems and Utility Programs

Instructions for update installation of ElsaWin 5.00

File Manager User Guide

UNIX / Linux commands Basic level. Magali COTTEVIEILLE - September 2009

SSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.

1. Installation Instructions - Unix & Linux

Installing Exceed. (Exceed Exceed 15 3D + SecureShell 15)

IBM Software Hadoop Fundamentals

ATS Advanced Terminal Software Version 1.9 Reference Guide for Controller-A

DiskPulse DISK CHANGE MONITOR

Cisco Setting Up PIX Syslog

Transcription:

Review Questions: The Linux Operating System and Linux-Related Issues 1. Explain what is meant by the term copyleft. 2. In what ways is the Linux operating system superior to the UNIX operating system that was its inspiration? 3. Define the term output redirection and give an example of its use. 4. What are pipes and filters? Give an example of each. 5. What are the principal duties of the System Administrator? 6. What is the Linux line kill command? 7. If you were to look at the VDT screen of a user logged in to Linux, how would you determine at a glance the user s probable shell (command line interpreter)? Why can the shell only be determined probabilistically at a quick glance, rather than definitively? 8. How do you log out from Linux? 9. What characters in Linux are used to signal character erasure, line kill, word kill, and abortion of program execution?

10. What commands do you use in Linux to perform each of the following operations: a. List the contents of the current working directory. b. Display the contents of a text file. c. Delete a file. d. Copy a file. e. Rename a file or move it to another directory. Page 2 of 5

Answers to Selected Questions: 1. Explain what is meant by the term copyleft. Answer: The term copyleft refers to the copyright provisions of the Linux software distribution, which, although tehnically compliant with the features of copyright law, are nevertheless the opposite of the normal intention of copyright, which is to restrict the rights of users of published information. In software, copyright restrictions usually take the form of restricting the ability of the recipient or purchaser to make copies of the copyright-protected software, to disassemble it, to use it on more than a small numb er of machines (typically one), to pass it on to anyone else, or to make derivative works. In the case of the Linux copyright agreement, the user is specifically allowed to make as many copies as he/she likes, is not only allowed but actively encouraged to understand the software (no need to disassemble it; the source code is furnished to aid in understanding), is encouraged to use it on an unlimited number of machines, as well as to pass it on to as many others as he chooses, and to produce his own code based upon that which was supplied, as well as anyeas of his own. Furthermore, if passing on the materials to someone else, he is required to incorporate the same software agreement. Because these features of the copyright and licensing agreement are so unusual, it has been referred to as copyleft. 2. In what ways is the Linux operating system superior to the UNIX operating system that was its inspiration? Answer: There are several important considerations that make Linux superior to UNIX. First of all, Linux comes in only one flavor, whereas the UNIX community is split up into a variety of flavors, some public and others proprietary. Secondly, the source code for Linux is open source. Thus, individuals can modify the source code individually for their own purposes. Third, there is a growing group of Linux devotees who contribute to the body of source and are continually improving the many modular software components that comprise the total Linux distribution. Fourth, Linux comes with a well-thought-out group of utility programs. Several proprietary vendors are now supporting Linux, most notably Sun Microsystems. 3. Define the term output redirection and give an example of its use. Page 3 of 5

Answer: The term output redirection refers to the ability of a Linux user to specify that the output of a particular program, which is normally directed to a particular destination, instead be routed to an alternative destination of his/her choice. For example, the cat utility normally takes the contents of a file and displays them on the Video Display Tube (VDT) screen. With output redirection, it is possible to send the file contents to a file instead of to the VDT. 4. What are pipes and filters? Give an example of each. Answer: A pipe is a means for sending the output of one program to become the input for another program. A filter modifies the output of a program, typically in preparation for sending it to become the input of a second program. For example, the output of the cat program can be redirected via a pipe from the VDT, to which it is normally sent, and sent instead to the sort utility, which is a filter. Sort reorders the data, after which they may be redirected once again via a pipe to the VDT. 5. What are the principal duties of the System Administrator? Answer: The Systems Administrator is responsible for a variety of duties. He/she installs software (downloading it whenever necessary), upgrades the operating system, sets up accounts for new users and deletes users as appropriate. He also boots up the system and brings it down whenever necessary, manages system facilities, such as disk drives and printers, performs regular file and system backups, and also effects file restoration on as-needed basis. 6. What is the Linux line kill command? Answer: CTRL-H 7. If you were to look at the VDT screen of a user logged in to Linux, how would you determine at a glance the user s probable shell (command line interpreter)? Why can the shell only be determined probabilistically at a quick glance, rather than definitively? Answer: The shell prompts can be presumed not to have been interchanged by the user from the default values. The defaults are: Shell Prompt bourne again shell (bash) $ c shell (tcsh) > z shell (zsh) % Page 4 of 5

Use of these default prompts to identify the user s shell is likely to be sufficient. However, the user has control over the prompt from whichever shell he is in. Therefore, it is possible that, for whatever reason of his own, he might be using one of the three most common Linux shells, but might have changed the prompt to that normally used by a different shell. 8. How do you log out from Linux? Answer: Logout procedure differs slightly among command interpreters or shells. From tcsh, issue the command logout. From bash or zsh, the appropriate command is exit. The keyboard shortcut is CTRL-D for all three shells. 9. What characters in Linux are used to signal character erasure, line kill, word kill, and abortion of program execution? Answer Character erasure: BACKSPACE or CTRL-H. Line kill: CTRL-U. Word kill: CTRL-W. Abortion of program execution: CTRL-C 10. What commands do you use in Linux to perform each of the following operations: f. List the contents of the current working directory. g. Display the contents of a text file. h. Delete a file. i. Copy a file. j. Rename a file or move it to another directory. Answer: a. ls b. cat filename or, alternatively, more filename or, alternatively, less filename c. rm filename d. cp original-filename filename-of-copy e. mv original-filename new-filename or cp original-filename new-path-andfilename Page 5 of 5