Sunday, March 3, 2019

Beginner Essay

Is each of the avo reproduceion an absolute pathname, a relative pathname, or a simple file name? a) Mile_co b) Correspond/business/milk_co c) / plateful/max d) /home/max/ books/promo e) .. f) Letter. 0210 2. List the commands you can use to perform these operations a. Make your home directory the working directory b. Identify the working directory a. cd b. pwd 3. If your working directory is /home/alex with a subdirectory named literature, give three sets of commands that you can use to create a subdirectory named classics infra literature.Also give several sets of commands you can use to remove the classics directory and its contents. 4. The df service displays all mount file transcriptions along with information about each. Use the df public-service corporation with the h (human-readable) option to answer the following questions. $ df -h Filesystem Size Used returns Use% Mounted on /dev/hda1 1. 4G 242M 1. 1G 18% / /dev/hda3 23M 11M 10M 51% /boot /dev/hda4 1. 5G 1. 2G 222M 85 % /home /dev/hda7 564M 17M 518M 4% /tmp dev/hdc1 984M 92M 842M 10% /gc1 /dev/hdc2 16G 13G 1. 9G 87% /gc2 a. How many filesystems ar mounted on your Linux system? b. Which filesystem stores your home directory? c. Assuming that your answer to exercise 4a is cardinal or more, attempt to create a hard link to a file on another(prenominal) filesystem. What error message do you lose? What happens when you attempt to create a symbolic link to the file quite? Following atomic number 18 sample answers to these questions.Your answers will be different because your filesystems are different. . six b. /dev/hda4 c. ln creating hard link /tmp/xxx to xxx Invalid cross-device link. No problem creating a cross-device symbolic link. 2 Answers to Even-Numbered Exercises 5. Suppose that you have a file that is linked to a file owned by another drug user. How can you ensure that changes to the file are no longer divided? 6. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on your system. . Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on your system? d. How many different login shells are in use on your system? (Hint Look at the exsert field. ) e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, your system uses shadow passwords and stores the encoded passwords elsewhere.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.