Oracle 1z0-876 Exam. Number: 1z0-876 Passing Score: 800 Time Limit: 120 min File Version: Oracle 1z0-876 Exam

Size: px
Start display at page:

Download "Oracle 1z0-876 Exam. Number: 1z0-876 Passing Score: 800 Time Limit: 120 min File Version: Oracle 1z0-876 Exam"

Transcription

1 Oracle 1z0-876 Exam Number: 1z0-876 Passing Score: 800 Time Limit: 120 min File Version: Oracle 1z0-876 Exam Exam Name: Oracle Solaris Certified Associate Exam

2 Actualanswers QUESTION 1 The exhibit shows information about data in Jane's home directory. Which answer describes where the directory named dir1 is stored within the file system. A. In the inode associated with directory dir1 B. In the directory file called dir1 C. In the ACL associated with dir1 D. In the directory file called widgets E. In the inode associated with directory widgets F. In the ACL associated with widgets Correct Answer: D /Reference: : QUESTION 2 Jane is trying to configure the swat utility. The software and man pages are located in the /usr/sfw directory. When Jane attempts to use the man command the following message appears: $ man swat No manual entry for swat. Choose the command that Jane can execute to display the man page. A. man /usr/sfw/swat B. man -f /usr/sfw/swat C. man -M /usr/sfw/man swat D. man -s 1M swat

3 /Reference: : QUESTION 3 Examine the exhibit. Choose the answer the best describes the 8th field of the output of an ls command. A. file creation time B. inode change time C. last access time D. last modify time Correct Answer: D /Reference: : QUESTION 4 Consider the following command: $ cal The cal command is followed by which one of the following choices? A. arguments B. options C. variables D. preferences Correct Answer: A /Reference: : QUESTION 5

4 Jane has listed the contents of her home directory as shown in the exhibit. Choose which command she would have entered to produce this output. A. ls -lr B. ls -llr C. ls -lr D. ls -LR * E. ls -lr * Correct Answer: A /Reference: : QUESTION 6

5 Your logging into the system as user Val, you are notified upon login that you must change your user password on the system. Your current password is 2co0lu! Choose the password that meets the requirements for a user changing the password on a Solaris 10 system. A. 2co0l4u B. valiscol C. 2C00L4u2 D ! /Reference: : QUESTION 7 The exhibit is a listing of your current directory. Based on the information shown, choose the file from the listing that is a regular file. A. acme B. instance C. screen D. door_pipe

6 Correct Answer: D /Reference: : QUESTION 8 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 9

7 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 10 Jane is about to edit a file with the vi editor. She executes the following command: $ vi./customer_sat.txt Choose the vi editor mode that Jane will be using when the file is opened.

8 A. command mode B. edit mode C. last line mode D. ex mode Correct Answer: A /Reference: : QUESTION 11 Val has gathered information about the data stored in her home directory using the following command line. $ du -sk * sort -n tail > file2 Which answer correctly describes what happens when the command is invoked? A. The tail command redirects stdin to file2 B. The sort command redirects stdout to the du command C. The stdout from the du command is sent to the sort command D. The stderr from the tail command will be sent to file2 /Reference: : QUESTION 12 The exhibit shows a listing of Jane's home directory. Jane wants to delete the directory dir1. Choose the command that would remove only the dir1 directory. A. rm./widgets/* B. rm./widgets/dir1 C. rm -r./widgets D. rmdir./widgets/dir1

9 Correct Answer: D /Reference: : QUESTION 13 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell E. Bash Shell Correct Answer: A /Reference: : QUESTION 14

10 Frank needs to add write access for the sales group, so he uses the following command: $ chmod g+w project543.dat Choose which answer reflects the result of this command. A. Only the sales group will be given write access to the file. B. Only the sales group and market group will have write access to the file. C. The sales group and market group and user jane will have write access to the file. D. The sales group and market group and user jane and others will have write access to the file. /Reference: : QUESTION 15 You have a default install of Solaris 10 on your desktop system. You are user tim. Examine the following command and output. $ ls -l project465.odt -rw-r--r-- 1 tim tim 394 Apr 9 15:29 project465.odt You need to allow another user access to write the file. You do not have access to the root account. Which command can be used to grant write access to the file? A. chown command B. chgrp command C. setfacl command D. nischown command /Reference: : QUESTION 16

11 Examine the exhibit. Based on the information in this exhibit, which files can user Jane delete? A. file1 file2 log B. file2 log C. file1 file3 log D. file1 file2 file3 log Correct Answer: D /Reference: : QUESTION 17 Frank executes the following single command line: $ ln /export/home/frank/audio_books/enders_game /export/home/frank/bookdata Choose the files that would result from executing this command. A. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 enders_game B. lrwxrwxrwx 1 frank frank 27 May 17 00:54 /export/home/frank/audio_books/enders_game -> /export/home/ frank/bookdata C. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 bookdata D. lrwxrwxrwx 1 frank frank 42 May 17 00:54 /export/home/frank/bookdata -> /export/home/frank/audio_books/ enders_game /Reference: : QUESTION 18 You have a file that contains a list of parts in a single column. You need to append the text string.ex2009 to each entry. You will use the vi editor and the last line mode to append this text to each entry. Which command will add the text correctly?

12 A. :%s/*/.ex2009/ B. :%s/.$/.ex2009/ C. :%s/$/.ex2009/ D. :%s/*$/.ex2009/ /Reference: : QUESTION 19 The exhibit shows a listing of Jane's directory. Consider the first entry buttons. Choose the commands that might have been used to create this file. A. cp snippets buttons B. ln gadget buttons C. ln snippets buttons D. ln search buttons E. cp gadget buttons F. ln -s snippets buttons

13 Correct Answer: B /Reference: : QUESTION 20 Jane has listed the files in her home directory as shown in the exhibit. Choose the answers that correctly describes the files in this directory. (Choose three.) A. The file fixit is a symbolic link to the file repair B. The file buttons can be executed by a user in the sales group C. The file gadget could be a hard link to the file buttons D. The file search can be modified by users in the sales group E. The file repair is a symbolic link to the file fixit F. Users in the sales group can enter the widgets directory EF

14 /Reference: : QUESTION 21 This user is using the Korn shell. Which command did the user execute to display the list shown in the exhibit? A. fc -l B. fc -l 122 C. fc -l D. history Correct Answer: D /Reference: : QUESTION 22 Wally created a new file named coursebook. The umask was set to the Solaris 10 default when the file was created. Wally used the following command to change the files permissions: $ chmod g+w./coursebook Which octal mode with the chmod command can Wally use to set these same permissions? A. chmod 662./coursebook B. chmod 660./coursebook C. chmod 664./coursebook D. chmod 442./coursebook

15 /Reference: : QUESTION 23 Tina has executed the following command: $ affiliate.sh >/dev/null 2>1 Choose the statement that is true concerning this command. A. stdin is redirected /dev/null, stderr is sent to the screen. B. stderr is redirected to /dev/null, stdout is sent to the screen. C. stdout is redirected to /dev/null, stderr is redirect to /dev/null D. stdin, stderr and stdout are sent to /dev/null /Reference: : QUESTION 24 Frank is trying to remove all files from a directory. The result of the rm command is shown: $ rm * rm: remove new_car_data (yes/no)? Choose the command that might allow Frank to use the rm command without being prompted for each file. A. unalias rm B. rm -i C. clear rm D. rm -a 'rm -i' Correct Answer: A /Reference: : QUESTION 25 Tina is using a Korn shell, and she wishes to set her prompt to the output of the host name on the system. Choose the command that Tina will use to change the prompt. A. set prompt=`uname -n`$ B. export PS1='`uname -n`$ ' C. export PROMPT=`uname -n`$ D. export PS1=`uname -n`$ E. prompt '`uname -n`$ ' Correct Answer: D

16 /Reference: : QUESTION 26 The vi editor can be configured interactively during use. As an option the editor can use a configuration file which users can configure specific to their needs when using vi. What is the name of the file used to configure the vi editor by a user? A..netrc B..virc C..edrc D..exrc Correct Answer: D /Reference: : QUESTION 27 Which answer describes the access control lists used with the Solaris 10 file system? A. Access Control Matrix B. Mandatory Access Control C. NFSv4 Access Control List D. POSIX Access Control Lists Correct Answer: D /Reference: : QUESTION 28

17 The exhibit shows a listing of Jane's directory. Consider the entry new_car_data. Choose the answer that best describes this entry. A. The file has a POSIX ACL. B. The file has a extended attribute. C. No group can access this file. D. This file is a symbolic link. E. This file is a hard link. Correct Answer: A /Reference: : QUESTION 29 Jane likes using the Korn shell, because one of the metacharacter's used by this shell will change directory to the previous directory. Choose the metacharacter that is designed to change the user's location in the file system to the previous directory. A. ~ B. * C.?

18 D. - Correct Answer: D /Reference: : QUESTION 30 Which permission bit is required on a directory in order to list the files and directories that reside in the directory? A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: B /Reference: : QUESTION 31 You have received a file called data.tar.z Which command will cause the file to be uncompressed and the tar file extracted, while keeping the original file unchanged? A. uncompress data.tar.z;tar xvf data.tar B. gunzip data.tar.z;tar xvf data.tar C. unzip -c data.tar.z tar xvf - D. uncompress -c data.tar.z tar xvf - Correct Answer: D /Reference: : QUESTION 32 Jane needs to list a directory on a remote system named entropy. The system has been configured with a.rhosts file in Jane's home directory. Choose the command that will display the contents of a directory without Jane having to login to the remote system. A. rsh entropy ls /export/home/jane/scripts/* B. rcp entropy ls /export/home/jane/scripts/* C. ls -r entropy /export/home/jane/scripts/* D. rlogin entropy ls /export/home/jane/scripts/* Correct Answer: A /Reference:

19 : QUESTION 33 Frank has been sent a file named Interns.jar. He would like to examine the contents of the file without extracting the file. Choose the command that will allow him to examine the file. A. tar xvf./interns.jar B. jar tvf./interns.jar C. cat./interns.jar D../Interns.jar >> jar cvf - E. unzip./interns.jar Correct Answer: B /Reference: : QUESTION 34 The mt command is used to control a tape device. Which operation is NOT supported by the mt command? A. Move to a specific record location on a tape. B. Write a configuration file to the device. C. Display the current status of a tape device. D. Erase the entire contents of a tape. Correct Answer: B /Reference: : QUESTION 35 Which answer best describes this block of code? A. This is part of a for loop. B. This is a if/then/else command. C. This is part of a case statement. D. This is part of a while loop.

20 /Reference: : QUESTION 36 You have created a tar archive of a source code directory. You now want to compress the file using the gzip utility. Choose the command that you could use to compress the file. A. gzip -c source_code.tar B. gzip -d source_code.tar C. gzip source_code.tar D. gzip -cvf source_code.tar.gz source_code.tar /Reference: : QUESTION 37 Jim has a compressed text file named saved.zip Jim used the following command to create the file: zip -r saved plants adding: plants (deflated 94%) Jim wants to list the contents of the plants file, but not extract it. Which command will NOT list the contents of the file plants? A. gunzip -c saved.zip B. gzcat saved.zip C. unzip -c saved.zip D. unzip -l saved.zip Correct Answer: D /Reference: : QUESTION 38 Choose the answer that correctly describes the Java Archive tool. A. The jar tool creates archive compatible with the tar command. B. The jar tool use the zip command syntax to create archive files. C. The jar tool creates compressed archive files. D. The jar tool create archives compatible with the compress command.

21 /Reference: : QUESTION 39 Which command can NOT use the ~/.rhost for authentication? A. ftp B. rcp C. rlogin D. rsh E. rdist Correct Answer: A /Reference: : QUESTION 40 Wally is trying to execute commands from his host trisol on a remote host called urbank A. Urbanka has been configured with a.rhosts file. Choose the command that will NOT use the.rhost authentication. A. rcp B. rlogin C. telnet D. rsh /Reference: : QUESTION 41 Consider the following command: $ find. -name "*.txt" -print Choose the answer that best describes -name A. an argument B. an option C. a variable D. a preference Correct Answer: B /Reference: :

22 QUESTION 42 The user Frank displays a command history as seen in the exhibit. Choose the number that history assigned to the command in which Frank used an absolute path. A. 20 B. 19 C. 18 D. 16 E. 14 Correct Answer: B /Reference: : QUESTION 43 When a non-root user changes their password which of the following is true? A. The new password must contain all alphanumeric characters. B. The new password can NOT contain numbers. C. The password can contain spaces. D. The password can be the reverse of the users name. /Reference: : QUESTION 44

23 A user named Jim has just logged into the system and issued a command to list his home directory. Which of the following commands could be used to display the listing as shown in the exhibit? (Choose two.) A. ls -p -e * B. ls -a-l * C. ls -a -l D. ls -pe E. ls -al E /Reference: : QUESTION 45 While working in his home directory Jim lists the directory contents with the following result: $ ls -F affiliates* daily-report* fixes today appointment expenses/ phone-list@ windfil> year-report From this list of files, which file is executable? A. affiliates B. fixes

24 C. expenses D. phone-list E. windfil F. yearly-report Correct Answer: A /Reference: : QUESTION 46 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a case statement? A. case and esac B. do and done C. case and done D. [[ and ]] Correct Answer: A /Reference: : QUESTION 47

25 You are examining the /usr/sfw/share/man directory, and then issue a sequence of commands as shown in the exhibit. Which answer correctly displays the output of the pwd command? A. /usr/sfw B. /usr C. /usr/sfw/share D. / Correct Answer: A /Reference: : QUESTION 48 What are the minimum number of characters that a regular user must use when creating a password? A. 0 B. 2 C. 4 D. 6 E. 8 Correct Answer: D

26 /Reference: : QUESTION 49 What are the minimum number of characters that a regular user must use when creating a password? A. 0 B. 2 C. 4 D. 6 E. 8 Correct Answer: D /Reference: : QUESTION 50 Jane has two text files, file1 and file2. She wants to append the contents of file2 to the existing contents of file1. Choose the command that will achieve this goal. A. cat file1 >> file2 B. cat file1 file2 > file1 C. echo file2 >> file1 D. file1 << file2 E. >file2 >> file1 F. cat file2 file1 G. cat file2 >> file1 Correct Answer: G /Reference: : QUESTION 51 Wally wants to list all files in his current directory. Choose the command that will list all the files only in Wally's current directory. A. echo * B. strings. C. ls -a D. ls -l E. ls -R

27 /Reference: : QUESTION 52 While working in his home directory, Jim lists the contents of the directory with the following result: $ ls -F affiliates* daily-report* fixes today appointment expenses/ phone-list@ windfil> year-report This directory listing indicates that the phone-list file is what type of file? A. directory B. block special file C. executable file D. hard link E. symbolic link F. ordinary file Correct Answer: E /Reference: : QUESTION 53 Wally notices that the system seems to be running slower, and he wants to run a command to determine which process might be using the most system resources. Choose the command he might use for this purpose. A. pstack B. ps C. prstat D. prun /Reference: : QUESTION 54 Choose the answer that describes a process that runs in the background and provides a service. A. user process B. system daemon C. rouge process D. defunct process E. shell process

28 Correct Answer: B /Reference: : QUESTION 55 Wally has a file with data about various coffee plants, the data is stored in a file named plants, the file is in the coffee directory of Wally's home directory. He wants to find the number of entries that are NOT the plant "Gallienii" or "gallienii". Choose the command that Wally might use to extract the information from the file. A. grep -v Gallienii./coffee/plants wc -l B. grep -nv Gallienii./coffee/plants wc -l C. find./coffee/plants (!G* -o!g* ) wc -l D. grep -ivn Gallienii./coffee/plants wc -l E. grep -vc Gallienii./coffee/plants wc -l Correct Answer: D /Reference: : QUESTION 56 Wally is logged into a system and is searching in a file using the following command. $ grep -i "$LOGNAME" weekly-reports.txt What is Wally searching for in this file? A. The string wally, upper or lower case. B. The string LOGNAME, upper or lower case. C. The string LOGNAME at the end of a line, upper or lower case. D. The string $LOGNAME upper or lower case. Correct Answer: A /Reference: : QUESTION 57 Choose the command that will display a list of process signals. A. signal -l B. ps -s C. psig D. kill -l Correct Answer: D

29 /Reference: : QUESTION 58 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a while loop? A. Using { and } B. Using [ and ] C. Using do and done D. Using if and fi /Reference: : QUESTION 59 You have a directory named images, this directory contains various digital images of various file format types. You need to list all of the.gif and.jpg files. You decide to use a find command to gather this information. Choose the command that will display these files correctly. A. find./images -type f \( -name \*.gif -o -name \*.jpg \) '{}' B. find./images -type f \( -name '*.gif' -a -name '*.jpg' \) -print C. find./images -type f \( -name \*.gif -o -name \*.jpg \) D. find./images -type f -name "*.gif" -name "*.jpg" -print E. grep ash userdata ; grep ksh userdata /Reference: : QUESTION 60 Jane executes the following command: $ alais search='grep -i >The > is defined by setting which shell variable? A. PS1 B. PS2 C. PS3 D. PS4 Correct Answer: B /Reference:

30 : QUESTION 61 The exhibit shows the first few lines of a system run control script. What is the meaning of the -d in the test expression? A. If the first expression is true. B. If the /usr/bin directory exists. C. If the first expression evaluates to false. D. If /usr/bin contains the exit command. Correct Answer: B /Reference: : QUESTION 62 Wally is using a Korn shell, and is writing a report for his customers. The report contains instructions on how to use a set of scripts that he has created for the customers to use. The scripts are all interactive. Wally is running the scripts while creating the report so he can cut and paste the user prompts into his document. Wally executes the following command: $ fg

31 Which job will be placed in the foreground of the shell? A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: B /Reference: : QUESTION 63 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell E. Bash Shell Correct Answer: A /Reference: :

32 QUESTION 64 Which positional parameter holds the value of the number of positional parameters? A. $0 B. $* C. $# D. /Reference: : QUESTION 65 Wally created the following aliases. printall='pr * lpr' pa=printall Choose the answer that best describes what the result will be when Wally uses the pa alias. A. The string printall will be displayed. B. The command not found error message will be displayed. C. The value of the printall alias will be displayed. D. The printall alias will execute. Correct Answer: D /Reference: : QUESTION 66 Jim wants to alias the grep command to the string search. Choose the command that Jim should add to his. kshrc file to accomplish this alias. A. alias search = 'grep -i' B. alias search='grep -i' C. alias search ='grep -i' D. alias search=`grep -i` Correct Answer: B /Reference: : QUESTION 67

33 While working in his home directory, Wally executes the commands shown in the exhibit. Wally needs to execute a find command that he had previously executed. He is using a ksh shell. Choose the command which will execute the find command again. A. r 163 B.!find C.!!find D. r -f Correct Answer: A /Reference: : QUESTION 68 Wally wants to quickly create a file that stores some information about a upcoming meeting. Wally is on the phone with his customer and doesn't want to interrupt the conversation to find a pen or pencil. Choose the command sequence that Wally might use on his system to store this information. A. cat < meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + d> B. cat > meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + c> C. cat < meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + c> D. cat > meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + d> Correct Answer: D /Reference: : QUESTION 69

34 The exhibit is a listing of your current directory. You need to place the file sonic into the directory dir1 and rename the file to game, while removing the original file. Choose the commands that will accomplish this task. (Choose two.) A. cp./sonic /widgets/dir1/game ; rm sonic B. mv /sonic widgets/dir1/game C. cp /sonic widgets/dir1/game ; rm /sonic D. mv sonic widgets/dir1/game E. cp./widgets/dir1/sonic /game; rm -r sonic F. mv sonic./dir1/game G. cp./sonic./widgets/dir1/game ; rm./sonic H. mv /sonic /widgets/dir1/ ; rm./sonic Correct Answer: DG /Reference: : QUESTION 70 While working in his home directory Jim lists the directory contents with the following result: From this list of files, which file is executable? A. affiliates B. fixes C. expenses D. phone-list E. windfil F. yearly-report

35 Correct Answer: A /Reference: : QUESTION 71 You have a file named customer1 and you need to examine the file in read only mode using the vi editor. Which two commands will open the file in the vi editor as read only? (Choose two.) A. view customer1 B. vi -ro customer1 C. vi -RO customer1 D. view -ro customer1 E. vi -R customer1 F. vi -r customer1 Correct Answer: AE /Reference: : QUESTION 72 Val wants to change the permissions on a file to remove access for all user that are not in the file's group. She also wants the group permissions to allow the file to have read and write access. Val can currently read and write the file. Which octal mode with the chmod command will set those permissions? A. chmod 664./data B. chmod 660./data C. chmod 775./data D. chmod 550./data Correct Answer: B /Reference: : QUESTION 73 You have a file that contains a list of parts in a single column. You need to append the text string.ex2009 to each entry. You will use the vi editor and the last line mode to append this text to each entry. Which command will add the text correctly? A. :%s/*/.ex2009/ B. :%s/.$/.ex2009/ C. :%s/$/.ex2009/ D. :%s/*$/.ex2009/

36 /Reference: : QUESTION 74 The exhibit shows information about data in Jane's home directory. Jane wants to delete, from her home directory, the directory named widgets and this directory's contents. Select the command that would best work to achieve Jane's goal. A. rm -r./widgets B. rmdir./widgets C. rm *./widgets D. rmdir -r * E. rmdir -r./widgets F. rm -r * Correct Answer: A /Reference: : QUESTION 75 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to give write access on the file for a contractor not in the webdev group. You do not have root access. Which method describes how you can grant write permissions to the contractor's user ID? A. Edit the /etc/group file and add the contractor's user ID to the group. B. Create a owner ACL for the contractor's user ID. C. Add a mandatory access control for the contractor's user ID. D. The world or group permissions must be modified by root. Correct Answer: B

37 /Reference: : QUESTION 76 Jane is about to edit a file with the vi editor. She executes the following command: $ vi./customer_sat.txt Choose the vi editor mode that Jane will be using when the file is opened. A. command mode B. edit mode C. last line mode D. ex mode Correct Answer: A /Reference: : QUESTION 77 Val wants to copy the customer data files from the data directory, to a directory called customer. The new customer directory will be in Val's home directory. Choose the command that Val will use to accomplish this task. A. touch $HOME/customer ; cp customer-local customer-region customer-state $HOME/customer B. mkdir $HOME/customer ; mv customer-local customer-region customer-state $HOME/customer C. mkdir../customer ; cp customer-local customer-region customer-state../customer D. cp customer-local customer-region customer-state mkdir $HOME/customer /Reference: : QUESTION 78

38 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 79 Jim is considering using a different shell. One of the shell features that Jim would like to use is the tilde (~) metacharacter, used to move to the user's home directory. Choose the shell that does NOT support the tilde (~) metacharacter. A. Korn Shell (ksh)

39 B. TC Shell (tcsh) C. C Shell (csh) D. Z shell (zsh) E. Bourne Shell (sh) Correct Answer: E /Reference: : QUESTION 80 You have a directory that contains more than 30 files. You need to remove a number of these files, but each of the files you need to remove is uniquely named. Choose the command that might best help you to remove these dissimilar files. A. rm -? * B. rm -? C. rm -i D. rm -i * E. rm * F. rm -r * Correct Answer: D /Reference: : QUESTION 81 Wally has two files with data about dark and light coffee beans. The data is stored in the files named dark_beans and light_beans. The files are in the coffee directory of Wally's home directory. Wally would like to display a sorted list of all of the words from both lists that start with the letter "g" or "G". The files contain mixed case names. Which command line can Wally use to display the data? A. sort./coffee/dark_beans./coffee/light_beans grep ^[Gg] B. cat./coffee/dark_beans./coffee/light_beans grep -i G sort C. sort -f./coffee/dark_beans./coffee/light_beans grep g D. sort./coffee/dark_beans./coffee/light_beans grep -i g Correct Answer: A /Reference: : QUESTION 82 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to deny write access to the file for two members of the webdev group, but allow write access for the rest of the webdev group. You do not have root access. Which method can be used to configure this access?

40 A. chgrp command B. chown command C. chmod command D. setfacl command Correct Answer: D /Reference: : QUESTION 83 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 84 You are using the Korn shell, and would like to change the number of commands displayed by the history command. Choose which variable you will need to set. A. HISTFILE B. HISTFILESIZE C. HISTSIZE D. HISTLIMIT /Reference: : QUESTION 85 Wally has just edited a file with the vi editor, he saves the new file with the name newdata. The following is a listing of that file: Based on the information provided, what is the value of the umask setting?

41 A B C D /Reference: : QUESTION 86 Jane has listed information about directories under her home directory. Choose which statement is true concerning the file finder. A. finder is a symbolic link B. finder has a hard link C. finder is writable D. finder has a ACL Correct Answer: B /Reference: : QUESTION 87

42 Frank is attempting to cat a file in a subdirectory. He is returned a error that indicates he cannot open the file. The exhibit shows Frank's command, the results, and the file's permissions. Choose the permission bits on a directory that might allow Frank to cat the file. A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: A /Reference: : QUESTION 88 Which answer describes the access control lists used with the Solaris 10 file system? A. Access Control Matrix B. Mandatory Access Control C. NFSv4 Access Control List D. POSIX Access Control Lists Correct Answer: D /Reference: : QUESTION 89 Val has invoked the following command, to gather information about the data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer is correct concerning this command line? A. The sort filter takes stdin from the tail filter. B. The file called file2 must exist for the command to work. C. The sort filter uses stdout from the du command. D. The stdout from the tail filter will be appended to file2.

43 /Reference: : QUESTION 90 You have created a tar archive of a source code directory. You now want to compress the file using the gzip utility. Choose the command that you could use to compress the file. A. gzip -c source_code.tar B. gzip -d source_code.tar C. gzip source_code.tar D. gzip -cvf source_code.tar.gz source_code.tar /Reference: : QUESTION 91 Val is copying files named daily.rpt from a directory called reports into her home directory on host users1 over to /var/tmp/val on host datastor. Choose the command that Val might use to copy the files. A. ftp user1:~val/reports/daily.rpt datastor:/var/tmp/val B. rcp cp user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt C. rcp user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt D. rcp datastor:/var/tmp/val/daily.rpt user1:~val/reports/daily.rpt E. rsh user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt /Reference: : QUESTION 92 Your logging into the system as user Val, you are notified upon login that you must change your user password on the system. Your current password is 2co0lu! Choose the password that meets the requirements for a user changing the password on a Solaris 10 system. A. 2co0l4u B. valiscol C. 2C00L4u2 D ! /Reference: : QUESTION 93 A user is creating an archive using the zip utility. The user executes the following sequence of commands.

44 $ zip -rm archive.zip /data/dir1 $ zip -rm archive.zip /product/dir1 $ zip -rm archive.zip /data/dir2 What will be the result of running this sequence of commands? A. An archive.zip file will be created and the contents will be the three directories. B. An archive.zip file will be created the contents will be /data/dir2 C. An archive.zip file will be created the contents will be /data/dir1 D. The three directories will be removed from the archive.zip Correct Answer: A /Reference: : QUESTION 94 Frank has a archive named data-1-4.tar and he needs to recover the contents of the archive. Which command will restore the contents of the archive to disk? A. tar xvf data-1-4.tar B. tar uvf data-1-4.tar C. tar cvf data-1-4.tar D. tar rvf data-1-4.tar E. tar tvf data-1-4.tar Correct Answer: A /Reference: : QUESTION 95 Frank is going to add four files to a tar archive. The files are called data1, data2, etc. These files will be stored in a new archive called data-1-4.tar Which command will correctly create this archive? A. tar xvf data-1-4.tar data1 data2 data3 data4 B. tar uvf data-1-4.tar data1 data2 data3 data4 C. tar cvf data-1-4.tar data1 data2 data3 data4 D. tar rvf data-1-4.tar data1 data2 data3 data4 E. tar tvf data-1-4.tar data1 data2 data3 data4 /Reference: : QUESTION 96 Frank wants to login to a remote system named proteus and edit multiple files. The remote host proteus has

45 been configured with a.rhosts file in Frank's home directory. Choose the command that will allow Frank to login without entering a password. A. telnet B. ftp C. rcp D. dtlogin E. rlogin Correct Answer: E /Reference: : QUESTION 97 You have a compressed file named meeting-agenda.gz. You would like to examine the content of this compressed file. Choose the command that will display the files content to the screen. A. unzip -c meeting-agenda.gz B. gzip -c meeting-agenda.gz C. zcat meeting-agenda.gz D. gzcat meeting-agenda,gz Correct Answer: D /Reference: : QUESTION 98 Choose the answer that correctly describes the Java Archive tool. A. The jar tool creates archive compatible with the tar command. B. The jar tool use the zip command syntax to create archive files. C. The jar tool creates compressed archive files. D. The jar tool create archives compatible with the compress command. /Reference: : QUESTION 99 Val needs to transfer multiple files from a remote system to her local system. She has established an ftp session with the remote system. When multiple files are transferred with ftp the system will prompt you to determine if you want each file transferred. Choose the ftp command that will disable this ftp prompt when transferring multiple files. A. mget

46 B. mput C. prompt D. noprompt E. recv /Reference: : QUESTION 100 Wally is searching for the PID of the syslog process on his system. He uses the following command: $ pgrep syslogd Choose the answer that describes the outcome of this command. A. The PIDs of all syslogd processes are displayed. B. The PID and full path of the first syslogd process is displayed. C. The PIDs and name of each syslogd process is displayed. D. The PIDs and full path of all syslogd processes is displayed. Correct Answer: A /Reference: : QUESTION 101 Wally has a file with data about various coffee plants, the data is stored in a file named plants, the file is in the coffee directory of Wally's home directory. He wants to find the number of entries that are NOT the plant "Gallienii" or "gallienii". Choose the command that Wally might use to extract the information from the file. A. grep -v Gallienii./coffee/plants wc -l B. grep -nv Gallienii./coffee/plants wc -l C. find./coffee/plants (!G* -o!g* ) wc -l D. grep -ivn Gallienii./coffee/plants wc -l E. grep -vc Gallienii./coffee/plants wc -l Correct Answer: D /Reference: : QUESTION 102 Jane is writing a shell script. While testing the script, she finds that the script is in a infinite loop. She issues the following command: $ kill `pgrep affiliate.sh` Which signal does this command send to the process?

47 A. SIGHUP B. SIGKILL C. SIGINT D. SIGTERM Correct Answer: D /Reference: : QUESTION 103 The exhibit shows both the data from Jane's home directory and a command. Based on the data shown, choose the command that would move Jane into the directory named things. A. mv../.. B. cd./things C. cd./../../things D. chdir../../things E. cd /../../things /Reference: : QUESTION 104 Wally notices that the system seems to be running slower, and he wants to run a command to determine which process might be using the most system resources. Choose the command he might use for this purpose.

48 A. pstack B. ps C. prstat D. prun /Reference: : QUESTION 105 You have a parts list, and you need to search it for all parts that contain the string V1 or the string R3. You decide to use a grep utility to search the file. Which grep command will you use? A. grep -F 'V1 R3'./parts_list B. fgrep 'V1 R3'./parts_list C. egrep 'V1 R3'./parts_list D. grep 'V1 R3'./parts_list /Reference: : QUESTION 106 You need to find all files in your home directory hierarchy that contain the string sample in the file name. You want a relative path to each file so you can easily retrieve it. Choose the command that will find these files. A. ls -l * grep -v sample B. find. -print grep sample C. ls -Rl grep -i sample D. grep sample < find. -print Correct Answer: B /Reference: : QUESTION 107 Wally is searching for the PID of the syslog process on his system. He uses the following command: $ pgrep syslogd Choose the answer that describes the outcome of this command. A. The PIDs of all syslogd processes are displayed. B. The PID and full path of the first syslogd process is displayed.

49 C. The PIDs and name of each syslogd process is displayed. D. The PIDs and full path of all syslogd processes is displayed. Correct Answer: A /Reference: : QUESTION 108 Which grep program is used to search for literal strings and does not interrupt regular expressions? A. grep B. lgrep C. egrep D. fgrep Correct Answer: D /Reference: : QUESTION 109 Frank is the administrator of the site where you work. You notice Frank issues the following command: # kill -HUP `cat /usr/local/apache2/logs/httpd.pid` Choose the answer that best describes what this command will do. A. Terminate the httpd process and all the child processes. B. Restart the httpd process and all child processes. C. Force the httpd process to reread it's configuration file. D. Terminate the httpd process but not the children. /Reference: : QUESTION 110 Val is searching through a file using the following egrep command: $ egrep '3+'./customer-data Choose the answer that best describes what the result of this search will be. A. Find all lines with '3+' in the line. B. Find all lines with one or more '+' characters. C. Find all lines with three '+' characters. D. Find all lines with one or more 3's.

50 E. Find all lines with more than three 3's. Correct Answer: D /Reference: : QUESTION 111 Choose the command that is used to display a process and all the parent processes. A. pgrep B. ptree C. pmap D. kstat Correct Answer: B /Reference: : QUESTION 112 Within the exhibit, "Listing 1" displays the original files contents, and "Listing 2" is the result from one of the following commands. Select the command that produced this output. A. grep [ak]sh$ userdata B. grep [akak]sh userdata C. grep (a k)sh userdata D. grep [^ak]sh$ userdata E. grep ash userdata ; grep ksh userdata Correct Answer: A

51 /Reference: : QUESTION 113 Jim has moved around the file system. He wants to return to his home directory. Which command short cut will take Jim back to his home directory? A. cd. B. cd C. cd - D. cd HOME Correct Answer: B /Reference: : QUESTION 114 A user named Frank issues the following command: % cal Choose the answer that best describes the number 9 as used in this command line. A. first argument B. second argument C. second option D. first option Correct Answer: A /Reference: : QUESTION 115

52 The exhibit shows a listing of Jane's directory. Consider the entry new_car_data. Choose the answer that best describes this entry. A. The file has a POSIX ACL. B. The file has a extended attribute. C. No group can access this file. D. This file is a symbolic link. E. This file is a hard link. Correct Answer: A /Reference: : QUESTION 116 Val has invoked the following command, to gather information about the data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer is correct concerning this command line? A. The sort filter takes stdin from the tail filter.

53 B. The file called file2 must exist for the command to work. C. The sort filter uses stdout from the du command. D. The stdout from the tail filter will be appended to file2. /Reference: : QUESTION 117 The vi editor can be configured interactively during use. As an option the editor can use a configuration file which users can configure specific to their needs when using vi. What is the name of the file used to configure the vi editor by a user? A..netrc B..virc C..edrc D..exrc Correct Answer: D /Reference: : QUESTION 118 Val is using the du command to gather information about data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer correctly describes the output of this command line? A. The 10 largest files will be listed by size and written to file2 B. The 10 smallest files will be listed by size and written to file2 C. The oldest 10 files will be listed by date and written to file2 D. The 10 most recent files will be listed by date and written to file2 Correct Answer: A /Reference: : QUESTION 119 Frank wants to examine the file car-data but not edit the file. He only needs to scroll through the file and search for data. Choose the command that would open the file car-data for reading only. A. vi -r car-data B. vi -R car-data C. vi -ro car-data D. ex car-data

54 Correct Answer: B /Reference: : QUESTION 120 You have a file that contains confidential customer data called customer489.dat. You need to make this file available to the sales group but protect the data from other users. You are not a member of the sales group and you do not have root access. -rw-r--r-- 1 tbussart staff Apr 1 15:20 customer489.dat $ getent group sales sales::1034:tom,dick,harry Which command will configure the file for the described access? A. chgrp sales /export/home/tbussart/customer489.dat B. groupadd sales /export/home/tbussart/customer489.dat C. setfacl -m g:sales:rw-,m:rw- /export/home/tbussart/customer489.dat D. chmod +w /export/home/tbussart/customer489.dat /Reference: : QUESTION 121 Wally created a new file named coursebook. The umask was set to the Solaris 10 default when the file was created. Wally used the following command to change the files permissions: $ chmod g+w./coursebook Which octal mode with the chmod command can Wally use to set these same permissions? A. chmod 662./coursebook B. chmod 660./coursebook C. chmod 664./coursebook D. chmod 442./coursebook /Reference: : QUESTION 122 Tina has executed the following command: $ affiliate.sh >/dev/null 2>1 Choose the statement that is true concerning this command.

55 A. stdin is redirected /dev/null, stderr is sent to the screen. B. stderr is redirected to /dev/null, stdout is sent to the screen. C. stdout is redirected to /dev/null, stderr is redirect to /dev/null D. stdin, stderr and stdout are sent to /dev/null /Reference: : QUESTION 123 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair

56 E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 124 You are using the vi editor to edit the file displayed in the exhibit. You are in command mode and the cursor is on the first letter of the word oriented on line four. You need to delete two words: oriented and interactive. Choose the commands that will complete this task. (Choose two.) A. dw B. 2dw C. d2w D. 2d$ E. 2D$ F. 2wd Correct Answer: BC /Reference: : QUESTION 125 You attempt to login using the Solaris Login Graphical User Interface (GUI), however an error message is displayed. After closing the error message you are returned to the Login Screen. How would you login to read the log files that were indicated in the error message. Which of the following describes how you can login to read these log files? A. At the Login Screen select the Options, then Sessions, then Fail Safe Session and login. B. Reboot the system, login to the CDE Desktop session with your user name and password. C. From a different system at the login screen select Options, Remote Login and select your system, login to the session with your user name and password. D. At the Login Screen select the Options, select Reset Login Screen, login to the session with your user name and password. Correct Answer: A /Reference:

57 : QUESTION 126 Wally is using a Korn shell. He uses the escape key followed by the backslash key for file name completion in this shell. Which of the following commands did Wally use to configure file name completion? A. set filec B. set -o emacs C. set -o vi D. fc -l /Reference: : QUESTION 127 Jane is attempting to create a directory in which to store scripts. The exhibit shows the sequence of commands used by Jane and the resulting error that has occurred. Which command or sequence of commands would have created the directory correctly? (Choose two.) A. touch mydir; mkdir scripts B. mkdir -p./mydir/scripts C. md./mydir/scripts D. make -dir mydir/scripts E. mkdir./mydir; mkdir./mydir/scripts F. mkdir mydir; mkdir scripts Correct Answer: BE

58 /Reference: : QUESTION 128 Wally has just edited a file with the vi editor, he saves the new file with the name newdata. The following is a listing of that file: -rw-r wally other May 27 19:10 newdata Based on the information provided, what is the value of the umask setting? A B C D /Reference: : QUESTION 129 Jane has listed information about directories under her home directory. Choose which statement is true concerning the file finder. A. finder is a symbolic link B. finder has a hard link C. finder is writable D. finder has a ACL Correct Answer: B

59 /Reference: : QUESTION 130 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to give write access on the file for a contractor not in the webdev group. You do not have root access. Which method describes how you can grant write permissions to the contractor's user ID? A. Edit the /etc/group file and add the contractor's user ID to the group. B. Create a owner ACL for the contractor's user ID. C. Add a mandatory access control for the contractor's user ID. D. The world or group permissions must be modified by root. Correct Answer: B /Reference: : QUESTION 131 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 132

60 Frank needs to add write access for the sales group, so he uses the following command: $ chmod g+w project543.dat Choose which answer reflects the result of this command. A. Only the sales group will be given write access to the file. B. Only the sales group and market group will have write access to the file. C. The sales group and market group and user jane will have write access to the file. D. The sales group and market group and user jane and others will have write access to the file. /Reference: : QUESTION 133

61 Jane has discovered that the file bluetooth is corrupted. She wants to remove all instances of this file from the system. What command should Jane use to remove all instances of bluetooth? A. rm blue* B. rm bluetooth cellphone C. rm keyboard bluetooth quarters D. rm bluetooth cellphone keyboard quarters Correct Answer: B /Reference: : QUESTION 134

62 The exhibit is a listing of Jane's directory. Choose which file is linked to the file keyboard. A. bluetooth B. cellphone C. mouse D. quarters Correct Answer: D /Reference: : QUESTION 135 Which permission bit is required on a directory in order to list the files and directories that reside in the directory? A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: B /Reference:

63 QUESTION 136 The user named Val issued a sequence of commands, as shown in the exhibit. Which of the following choices describes the results of the last command executed by Val? A. Changes directory to Val's home directory. B. -: does not exist is displayed. C. -: No such file or directory is displayed. D. Changes directory to the previous directory. E. Changes to the first directory listed in the current directory. Correct Answer: D /Reference: : QUESTION 137 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell

64 E. Bash Shell Correct Answer: A /Reference: : QUESTION 138 Wally is using a Korn shell, and is writing a report for a customer. The report contains instructions on how to use a set of scripts that he has created for this customer. The scripts are all interactive. Wally is running the scripts while creating the report, so he can cut and paste the user prompts into his document. From the information in the exhibit, choose the script that was last running in the foreground. A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: B /Reference: : QUESTION 139 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a case statement? A. case and esac B. do and done C. case and done D. [[ and ]] Correct Answer: A /Reference: : QUESTION 140

65 Wally is using a Korn shell, and is writing a report for a customer. The report contains instructions on how to use a set of scripts that Wally has created for this customer's use. The scripts are all interactive so Wally is running the scripts while creating the report to cut and paste the user prompts into his document. Examine the exhibit. Which command will Wally use to continue working in the cust-report file? A. kill -THAW 1854 B. fg %+ C. fg %- D. fg %1 E. fg Correct Answer: D /Reference: : QUESTION 141 Wally created the following aliases. printall='pr * lpr' pa=printall Choose the answer that best describes what the result will be when Wally uses the pa alias. A. The string printall will be displayed. B. The command not found error message will be displayed. C. The value of the printall alias will be displayed. D. The printall alias will execute. Correct Answer: D /Reference: : QUESTION 142

66 Wally is using a Korn shell, and is writing a report for his customers. The report contains instructions on how to use a set of scripts that he has created for the customers to use. The scripts are all interactive. Wally is running the scripts while creating the report so he can cut and paste the user prompts into his document. From the information in the exhibit, choose the script that was last executed in the shell. A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: A /Reference: : QUESTION 143 Dave has a compressed tar archive named pics.tar.z Dave needs to uncompress and extract the data from this file. Which command will extract and uncompress the file? A. uncompress pics.tar.z;tar xvf pics.tar B. zcat -c pics.tar.z tar xvf - C. bunzip2 pics.tar.z;tar xvf pics.tar D. bzcat pics.tar.z tar xvf - Correct Answer: A /Reference: : QUESTION 144 Val wants to backup her home directory to a tape device. Choose the command she might use to create the backup. A. tape B. mt C. compress D. tar Correct Answer: D

Oracle EXAM - 1Z Oracle Solaris Certified Associate Exam. Buy Full Product.

Oracle EXAM - 1Z Oracle Solaris Certified Associate Exam. Buy Full Product. Oracle EXAM - 1Z0-876 Oracle Solaris Certified Associate Exam Buy Full Product http://www.examskey.com/1z0-876.html Examskey Oracle 1Z0-876 exam demo product is here for you to test the quality of the

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Introduction to UNIX Stephen Pauwels University of Antwerp October 2, 2015 Outline What is Unix? Getting started Streams Exercises UNIX Operating system Servers, desktops,

More information

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing

More information

Introduction to Linux Organizing Files

Introduction to Linux Organizing Files Introduction to Linux Organizing Files Computational Science and Engineering North Carolina A&T State University Instructor: Dr. K. M. Flurchick Email: kmflurch@ncat.edu Arranging, Organizing, Packing

More information

UNIX and Linux Essentials Student Guide

UNIX and Linux Essentials Student Guide UNIX and Linux Essentials Student Guide D76989GC10 Edition 1.0 June 2012 D77816 Authors Uma Sannasi Pardeep Sharma Technical Contributor and Reviewer Harald van Breederode Editors Anwesha Ray Raj Kumar

More information

Computer Systems and Architecture

Computer Systems and Architecture Computer Systems and Architecture Stephen Pauwels Computer Systems Academic Year 2018-2019 Overview of the Semester UNIX Introductie Regular Expressions Scripting Data Representation Integers, Fixed point,

More information

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal.

Read the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02 Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services

More information

UNIX Essentials Featuring Solaris 10 Op System

UNIX Essentials Featuring Solaris 10 Op System A Active Window... 7:11 Application Development Tools... 7:7 Application Manager... 7:4 Architectures - Supported - UNIX... 1:13 Arithmetic Expansion... 9:10 B Background Processing... 3:14 Background

More information

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2)

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2) BANK ON & SHELL PROGRAMMING-502 (CORE PAPER-2) TOPIC 1: VI-EDITOR MARKS YEAR 1. Explain set command of vi editor 2 2011oct 2. Explain the modes of vi editor. 7 2013mar/ 2013 oct 3. Explain vi editor 5

More information

BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description:

BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description: BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description: This course provides Bioinformatics students with the

More information

for more :-

for more :- JNTU ONLINE EXAMINATIONS [Mid 1 - UNIX] 1. C programmers in the unix environment has complete access to the entire system call library as well as the a. static library functions b. dynamic library functions

More information

UNIX Quick Reference

UNIX Quick Reference UNIX Quick Reference This card represents a brief summary of some of the more frequently used UNIX commands that all users should be at least somewhat familiar with. Some commands listed have much more

More information

acmteam/unix.pdf How to manage your account (user ID, password, shell); How to compile C, C++, and Java programs;

acmteam/unix.pdf How to manage your account (user ID, password, shell); How to compile C, C++, and Java programs; Note: you can find this file under: http://www.cs.queensu.ca/ acmteam/unix.pdf Introduction to Unix Tutorial In this tutorial, you will learn: How to manage your account (user ID, password, shell); Navigating

More information

Command-line interpreters

Command-line interpreters Command-line interpreters shell Wiki: A command-line interface (CLI) is a means of interaction with a computer program where the user (or client) issues commands to the program in the form of successive

More information

Lecture # 2 Introduction to UNIX (Part 2)

Lecture # 2 Introduction to UNIX (Part 2) CS390 UNIX Programming Spring 2009 Page 1 Lecture # 2 Introduction to UNIX (Part 2) UNIX is case sensitive (lowercase, lowercase, lowercase) Logging in (Terminal Method) Two basic techniques: 1. Network

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )

More information

Useful Unix Commands Cheat Sheet

Useful Unix Commands Cheat Sheet Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List

More information

List of Linux Commands in an IPm

List of Linux Commands in an IPm List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir

More information

UNIX Basics. UNIX Basics CIS 218 Oakton Community College

UNIX Basics. UNIX Basics CIS 218 Oakton Community College UNIX Basics UNIX Basics CIS 218 Oakton Community College History UNIX was invented in 1969 at AT&T Bell Labs Ken Thompson and Dennis Ritchie are credited as the original architects and developers of C.

More information

Outline. Structure of a UNIX command

Outline. Structure of a UNIX command Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory

More information

IMPORTANT: Logging Off LOGGING IN

IMPORTANT: Logging Off LOGGING IN These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this

More information

Introduction to Unix The Windows User perspective. Wes Frisby Kyle Horne Todd Johansen

Introduction to Unix The Windows User perspective. Wes Frisby Kyle Horne Todd Johansen Introduction to Unix The Windows User perspective Wes Frisby Kyle Horne Todd Johansen What is Unix? Portable, multi-tasking, and multi-user operating system Software development environment Hardware independent

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

LOG ON TO LINUX AND LOG OFF

LOG ON TO LINUX AND LOG OFF EXPNO:1A LOG ON TO LINUX AND LOG OFF AIM: To know how to logon to Linux and logoff. PROCEDURE: Logon: To logon to the Linux system, we have to enter the correct username and password details, when asked,

More information

Set 1 MCQ Which command is used to sort the lines of data in a file in reverse order A) sort B) sh C) st D) sort -r

Set 1 MCQ Which command is used to sort the lines of data in a file in reverse order A) sort B) sh C) st D) sort -r 1. Which symbol will be used with grep command to match the pattern pat at the beginning of a line? A) ^pat B) $pat C) pat$ D) pat^ 2. Which command is used to sort the lines of data in a file in reverse

More information

Unix Handouts. Shantanu N Kulkarni

Unix Handouts. Shantanu N Kulkarni Unix Handouts Shantanu N Kulkarni Abstract These handouts are meant to be used as a study aid during my class. They are neither complete nor sincerely accurate. The idea is that the participants should

More information

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12.

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12. CIE- 25 Marks Government of Karnataka Department of Technical Education Bengaluru Course Title: Linux Lab Scheme (L:T:P) : 0:2:4 Total Contact Hours: 78 Type of Course: Tutorial, Practical s & Student

More information

CST Algonquin College 2

CST Algonquin College 2 The Shell Kernel (briefly) Shell What happens when you hit [ENTER]? Output redirection and pipes Noclobber (not a typo) Shell prompts Aliases Filespecs History Displaying file contents CST8207 - Algonquin

More information

Processes. Shell Commands. a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms:

Processes. Shell Commands. a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms: Processes The Operating System, Shells, and Python Shell Commands a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms: - Command prompt - Shell - CLI Shell commands

More information

CSC UNIX System, Spring 2015

CSC UNIX System, Spring 2015 CSC 352 - UNIX System, Spring 2015 Study guide for the CSC352 midterm exam (20% of grade). Dr. Dale E. Parson, http://faculty.kutztown.edu/parson We will have a midterm on March 19 on material we have

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

UNIX COMMANDS AND SHELLS. UNIX Programming 2015 Fall by Euiseong Seo

UNIX COMMANDS AND SHELLS. UNIX Programming 2015 Fall by Euiseong Seo UNIX COMMANDS AND SHELLS UNIX Programming 2015 Fall by Euiseong Seo What is a Shell? A system program that allows a user to execute Shell functions (internal commands) Other programs (external commands)

More information

1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions

1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions 1Z0-409 Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-409 Exam on Oracle Linux Fundamentals (Oracle Partner Network)... 2 Oracle

More information

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.

Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview

More information

Introduction to Linux

Introduction to Linux Introduction to Linux January 2011 Don Bahls User Consultant (Group Leader) bahls@arsc.edu (907) 450-8674 Overview The shell Common Commands File System Organization Permissions Environment Variables I/O

More information

Introduction to UNIX Shell Exercises

Introduction to UNIX Shell Exercises Introduction to UNIX Shell Exercises Determining Your Shell Open a new window or use an existing window for this exercise. Observe your shell prompt - is it a $ or %? What does this tell you? Find out

More information

Appendix B WORKSHOP. SYS-ED/ Computer Education Techniques, Inc.

Appendix B WORKSHOP. SYS-ED/ Computer Education Techniques, Inc. Appendix B WORKSHOP SYS-ED/ Computer Education Techniques, Inc. 1 Introduction There are no workshops for this chapter. The instructor will provide demonstrations and examples. SYS-ED/COMPUTER EDUCATION

More information

System Administration

System Administration Süsteemihaldus MTAT.08.021 System Administration UNIX shell basics Name service DNS 1/69 Command Line Read detailed manual for specific command using UNIX online documentation or so called manual (man)

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

Introduction to UNIX Command Line

Introduction to UNIX Command Line Introduction to UNIX Command Line Files and directories Some useful commands (echo, cat, grep, find, diff, tar) Redirection Pipes Variables Background processes Remote connections (e.g. ssh, curl) Scripts

More information

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza Sommario Shell command language Introduction A

More information

Introduction to remote command line Linux. Research Computing Team University of Birmingham

Introduction to remote command line Linux. Research Computing Team University of Birmingham Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments

More information

3/8/2017. Unix/Linux Introduction. In this part, we introduce. What does an OS do? Examples

3/8/2017. Unix/Linux Introduction. In this part, we introduce. What does an OS do? Examples EECS2301 Title Unix/Linux Introduction These slides are based on slides by Prof. Wolfgang Stuerzlinger at York University Warning: These notes are not complete, it is a Skelton that will be modified/add-to

More information

Lab 2: Linux/Unix shell

Lab 2: Linux/Unix shell Lab 2: Linux/Unix shell Comp Sci 1585 Data Structures Lab: Tools for Computer Scientists Outline 1 2 3 4 5 6 7 What is a shell? What is a shell? login is a program that logs users in to a computer. When

More information

Crash Course in Unix. For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix. -or- Unix in a Nutshell (an O Reilly book).

Crash Course in Unix. For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix. -or- Unix in a Nutshell (an O Reilly book). Crash Course in Unix For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix -or- Unix in a Nutshell (an O Reilly book). 1 Unix Accounts To access a Unix system you need to have

More information

Lab Week02 - Part I. Shell Commands. Professional Training Academy Linux Series

Lab Week02 - Part I. Shell Commands. Professional Training Academy Linux Series Lab Week02 - Part I Shell Commands Professional Training Academy Linux Series Commands: Manipulation cp : copy a file To copy a file you need to give a source and then a destination e.g. to copy the file

More information

Basic Linux (Bash) Commands

Basic Linux (Bash) Commands Basic Linux (Bash) Commands Hint: Run commands in the emacs shell (emacs -nw, then M-x shell) instead of the terminal. It eases searching for and revising commands and navigating and copying-and-pasting

More information

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Warnings Linux Commands 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material

More information

UNIX. Basic UNIX Command

UNIX. Basic UNIX Command UNIX Basic UNIX Command Command List ls mkdir mv chmod groupadd hostname kill head top compress/ uncompress pwd Cat find chown useradd id ioscan pdf sar cd more grep chgrp passwd mount dmesg netstat tar

More information

CS4350 Unix Programming. Outline

CS4350 Unix Programming. Outline Outline Unix Management Files and file systems Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell

Lezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Esercitazione Introduzione al linguaggio di shell Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza

More information

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command. Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,

More information

UNIX. The Very 10 Short Howto for beginners. Soon-Hyung Yook. March 27, Soon-Hyung Yook UNIX March 27, / 29

UNIX. The Very 10 Short Howto for beginners. Soon-Hyung Yook. March 27, Soon-Hyung Yook UNIX March 27, / 29 UNIX The Very 10 Short Howto for beginners Soon-Hyung Yook March 27, 2015 Soon-Hyung Yook UNIX March 27, 2015 1 / 29 Table of Contents 1 History of Unix 2 What is UNIX? 3 What is Linux? 4 How does Unix

More information

Introduction to UNIX command-line

Introduction to UNIX command-line Introduction to UNIX command-line Boyce Thompson Institute March 17, 2015 Lukas Mueller & Noe Fernandez Class Content Terminal file system navigation Wildcards, shortcuts and special characters File permissions

More information

Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX

Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX 15th Jan. 2000 / 3:55 am Part 1: Working with files and rights ------------------------------------- cp

More information

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

CSCI 2132 Software Development. Lecture 4: Files and Directories

CSCI 2132 Software Development. Lecture 4: Files and Directories CSCI 2132 Software Development Lecture 4: Files and Directories Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 12-Sep-2018 (4) CSCI 2132 1 Previous Lecture Some hardware concepts

More information

Introduction to Unix: Fundamental Commands

Introduction to Unix: Fundamental Commands Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating

More information

Files

Files http://www.cs.fsu.edu/~langley/cop3353-2013-1/reveal.js-2013-02-11/02.html?print-pdf 02/11/2013 10:55 AM Files A normal "flat" file is a collection of information. It's usually stored somewhere reasonably

More information

Shell Scripting. With Applications to HPC. Edmund Sumbar Copyright 2007 University of Alberta. All rights reserved

Shell Scripting. With Applications to HPC. Edmund Sumbar Copyright 2007 University of Alberta. All rights reserved AICT High Performance Computing Workshop With Applications to HPC Edmund Sumbar research.support@ualberta.ca Copyright 2007 University of Alberta. All rights reserved High performance computing environment

More information

Getting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers

Getting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers Chapter 2 Unix Utilities for non-programmers Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, 2003. Original Notes by Raj Sunderraman Converted to presentation

More information

Mills HPC Tutorial Series. Linux Basics I

Mills HPC Tutorial Series. Linux Basics I Mills HPC Tutorial Series Linux Basics I Objectives Command Line Window Anatomy Command Structure Command Examples Help Files and Directories Permissions Wildcards and Home (~) Redirection and Pipe Create

More information

5/8/2012. Creating and Changing Directories Chapter 7

5/8/2012. Creating and Changing Directories Chapter 7 Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing

More information

Unix/Linux Operating System. Introduction to Computational Statistics STAT 598G, Fall 2011

Unix/Linux Operating System. Introduction to Computational Statistics STAT 598G, Fall 2011 Unix/Linux Operating System Introduction to Computational Statistics STAT 598G, Fall 2011 Sergey Kirshner Department of Statistics, Purdue University September 7, 2011 Sergey Kirshner (Purdue University)

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Review of Fundamentals

Review of Fundamentals Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log

More information

CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 2

CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 2 CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 2 Prof. Michael J. Reale Fall 2014 COMMAND KATA 7: VARIABLES Command Kata 7: Preparation First, go to ~/cs307 cd ~/cs307 Make directory dkata7 and go

More information

SIEMENS UserAdmin Workshop TELEPERM XP Version 4 Chapter 1

SIEMENS UserAdmin Workshop TELEPERM XP Version 4 Chapter 1 1 UNIX... 1-2 1.1 USER-ENVIRONMENT... 1-2 1.1.1 User-environment... 1-3 1.1.2 Basic commands... 1-3 1.1.3 SCO Unix specific commands... 1-4 1.1.4 HP Unix specific commands... 1-4 1.2 FILE SYSTEM... 1-5

More information

Files and Directories

Files and Directories CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on

More information

Introduction to Linux Basics Part II. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala

Introduction to Linux Basics Part II. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala Introduction to Linux Basics Part II 1 Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala pakala@uga.edu 2 Variables in Shell HOW DOES LINUX WORK? Shell Arithmetic I/O and

More information

Virtual Machine. Linux flavor : Debian. Everything (except slides) preinstalled for you. https://www.virtualbox.org/

Virtual Machine. Linux flavor : Debian. Everything (except slides) preinstalled for you. https://www.virtualbox.org/ Virtual Machine Anyone have problems installing it? VM: Virtual Box - allows you to run a different operating system within the current operating system of your machine. https://www.virtualbox.org/ Linux

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

CS246 Spring14 Programming Paradigm Notes on Linux

CS246 Spring14 Programming Paradigm Notes on Linux 1 Unix History 1965: Researchers from Bell Labs and other organizations begin work on Multics, a state-of-the-art interactive, multi-user operating system. 1969: Bell Labs researchers, losing hope for

More information

FREEENGINEER.ORG. 1 of 6 11/5/15 8:31 PM. Learn UNIX in 10 minutes. Version 1.3. Preface

FREEENGINEER.ORG. 1 of 6 11/5/15 8:31 PM. Learn UNIX in 10 minutes. Version 1.3. Preface FREEENGINEER.ORG Learn UNIX in 10 minutes. Version 1.3 Preface This is something that I had given out to students (CAD user training) in years past. The purpose was to have on one page the basics commands

More information

Self-test Linux/UNIX fundamentals

Self-test Linux/UNIX fundamentals Self-test Linux/UNIX fundamentals Document: e0829test.fm 16 January 2018 ABIS Training & Consulting Diestsevest 32 / 4b B-3000 Leuven Belgium TRAINING & CONSULTING INTRODUCTION TO THE SELF-TEST LINUX/UNIX

More information

RH033 Red Hat Linux Essentials

RH033 Red Hat Linux Essentials RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to

More information

What is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell.

What is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. What is the Shell Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. The shell is your interface to the operating system. It acts

More information

CSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80

CSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80 CSE 303 Lecture 2 Introduction to bash shell read Linux Pocket Guide pp. 37-46, 58-59, 60, 65-70, 71-72, 77-80 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Unix file system structure

More information

EECS2301. Lab 1 Winter 2016

EECS2301. Lab 1 Winter 2016 EECS2301 Lab 1 Winter 2016 Lab Objectives In this lab, you will be introduced to the Linux operating system. The basic commands will be presented in this lab. By the end of you alb, you will be asked to

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

Shell Programming Systems Skills in C and Unix

Shell Programming Systems Skills in C and Unix Shell Programming 15-123 Systems Skills in C and Unix The Shell A command line interpreter that provides the interface to Unix OS. What Shell are we on? echo $SHELL Most unix systems have Bourne shell

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Unix as a Platform Exercises + Solutions. Course Code: OS 01 UNXPLAT

Unix as a Platform Exercises + Solutions. Course Code: OS 01 UNXPLAT Unix as a Platform Exercises + Solutions Course Code: OS 01 UNXPLAT Working with Unix Most if not all of these will require some investigation in the man pages. That's the idea, to get them used to looking

More information

Shells. A shell is a command line interpreter that is the interface between the user and the OS. The shell:

Shells. A shell is a command line interpreter that is the interface between the user and the OS. The shell: Shells A shell is a command line interpreter that is the interface between the user and the OS. The shell: analyzes each command determines what actions are to be performed performs the actions Example:

More information

CSC209H Lecture 1. Dan Zingaro. January 7, 2015

CSC209H Lecture 1. Dan Zingaro. January 7, 2015 CSC209H Lecture 1 Dan Zingaro January 7, 2015 Welcome! Welcome to CSC209 Comments or questions during class? Let me know! Topics: shell and Unix, pipes and filters, C programming, processes, system calls,

More information

Assignment clarifications

Assignment clarifications Assignment clarifications How many errors to print? at most 1 per token. Interpretation of white space in { } treat as a valid extension, involving white space characters. Assignment FAQs have been updated.

More information

CSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts

CSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts CSCI 2132 Software Development Lecture 3: Unix Shells and Other Basic Concepts Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 10-Sep-2018 (3) CSCI 2132 1 Introduction to UNIX

More information

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1

Review of Fundamentals. Todd Kelley CST8207 Todd Kelley 1 Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on

More information

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,

More information