Oracle 1z0-876 Exam. Number: 1z0-876 Passing Score: 800 Time Limit: 120 min File Version: Oracle 1z0-876 Exam
|
|
- Owen Williamson
- 6 years ago
- Views:
Transcription
1 Oracle 1z0-876 Exam Number: 1z0-876 Passing Score: 800 Time Limit: 120 min File Version: Oracle 1z0-876 Exam Exam Name: Oracle Solaris Certified Associate Exam
2 Actualanswers QUESTION 1 The exhibit shows information about data in Jane's home directory. Which answer describes where the directory named dir1 is stored within the file system. A. In the inode associated with directory dir1 B. In the directory file called dir1 C. In the ACL associated with dir1 D. In the directory file called widgets E. In the inode associated with directory widgets F. In the ACL associated with widgets Correct Answer: D /Reference: : QUESTION 2 Jane is trying to configure the swat utility. The software and man pages are located in the /usr/sfw directory. When Jane attempts to use the man command the following message appears: $ man swat No manual entry for swat. Choose the command that Jane can execute to display the man page. A. man /usr/sfw/swat B. man -f /usr/sfw/swat C. man -M /usr/sfw/man swat D. man -s 1M swat
3 /Reference: : QUESTION 3 Examine the exhibit. Choose the answer the best describes the 8th field of the output of an ls command. A. file creation time B. inode change time C. last access time D. last modify time Correct Answer: D /Reference: : QUESTION 4 Consider the following command: $ cal The cal command is followed by which one of the following choices? A. arguments B. options C. variables D. preferences Correct Answer: A /Reference: : QUESTION 5
4 Jane has listed the contents of her home directory as shown in the exhibit. Choose which command she would have entered to produce this output. A. ls -lr B. ls -llr C. ls -lr D. ls -LR * E. ls -lr * Correct Answer: A /Reference: : QUESTION 6
5 Your logging into the system as user Val, you are notified upon login that you must change your user password on the system. Your current password is 2co0lu! Choose the password that meets the requirements for a user changing the password on a Solaris 10 system. A. 2co0l4u B. valiscol C. 2C00L4u2 D ! /Reference: : QUESTION 7 The exhibit is a listing of your current directory. Based on the information shown, choose the file from the listing that is a regular file. A. acme B. instance C. screen D. door_pipe
6 Correct Answer: D /Reference: : QUESTION 8 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 9
7 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 10 Jane is about to edit a file with the vi editor. She executes the following command: $ vi./customer_sat.txt Choose the vi editor mode that Jane will be using when the file is opened.
8 A. command mode B. edit mode C. last line mode D. ex mode Correct Answer: A /Reference: : QUESTION 11 Val has gathered information about the data stored in her home directory using the following command line. $ du -sk * sort -n tail > file2 Which answer correctly describes what happens when the command is invoked? A. The tail command redirects stdin to file2 B. The sort command redirects stdout to the du command C. The stdout from the du command is sent to the sort command D. The stderr from the tail command will be sent to file2 /Reference: : QUESTION 12 The exhibit shows a listing of Jane's home directory. Jane wants to delete the directory dir1. Choose the command that would remove only the dir1 directory. A. rm./widgets/* B. rm./widgets/dir1 C. rm -r./widgets D. rmdir./widgets/dir1
9 Correct Answer: D /Reference: : QUESTION 13 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell E. Bash Shell Correct Answer: A /Reference: : QUESTION 14
10 Frank needs to add write access for the sales group, so he uses the following command: $ chmod g+w project543.dat Choose which answer reflects the result of this command. A. Only the sales group will be given write access to the file. B. Only the sales group and market group will have write access to the file. C. The sales group and market group and user jane will have write access to the file. D. The sales group and market group and user jane and others will have write access to the file. /Reference: : QUESTION 15 You have a default install of Solaris 10 on your desktop system. You are user tim. Examine the following command and output. $ ls -l project465.odt -rw-r--r-- 1 tim tim 394 Apr 9 15:29 project465.odt You need to allow another user access to write the file. You do not have access to the root account. Which command can be used to grant write access to the file? A. chown command B. chgrp command C. setfacl command D. nischown command /Reference: : QUESTION 16
11 Examine the exhibit. Based on the information in this exhibit, which files can user Jane delete? A. file1 file2 log B. file2 log C. file1 file3 log D. file1 file2 file3 log Correct Answer: D /Reference: : QUESTION 17 Frank executes the following single command line: $ ln /export/home/frank/audio_books/enders_game /export/home/frank/bookdata Choose the files that would result from executing this command. A. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 enders_game B. lrwxrwxrwx 1 frank frank 27 May 17 00:54 /export/home/frank/audio_books/enders_game -> /export/home/ frank/bookdata C. -rw-r--r-- 2 frank frank 1699 Oct 29 00:51 bookdata D. lrwxrwxrwx 1 frank frank 42 May 17 00:54 /export/home/frank/bookdata -> /export/home/frank/audio_books/ enders_game /Reference: : QUESTION 18 You have a file that contains a list of parts in a single column. You need to append the text string.ex2009 to each entry. You will use the vi editor and the last line mode to append this text to each entry. Which command will add the text correctly?
12 A. :%s/*/.ex2009/ B. :%s/.$/.ex2009/ C. :%s/$/.ex2009/ D. :%s/*$/.ex2009/ /Reference: : QUESTION 19 The exhibit shows a listing of Jane's directory. Consider the first entry buttons. Choose the commands that might have been used to create this file. A. cp snippets buttons B. ln gadget buttons C. ln snippets buttons D. ln search buttons E. cp gadget buttons F. ln -s snippets buttons
13 Correct Answer: B /Reference: : QUESTION 20 Jane has listed the files in her home directory as shown in the exhibit. Choose the answers that correctly describes the files in this directory. (Choose three.) A. The file fixit is a symbolic link to the file repair B. The file buttons can be executed by a user in the sales group C. The file gadget could be a hard link to the file buttons D. The file search can be modified by users in the sales group E. The file repair is a symbolic link to the file fixit F. Users in the sales group can enter the widgets directory EF
14 /Reference: : QUESTION 21 This user is using the Korn shell. Which command did the user execute to display the list shown in the exhibit? A. fc -l B. fc -l 122 C. fc -l D. history Correct Answer: D /Reference: : QUESTION 22 Wally created a new file named coursebook. The umask was set to the Solaris 10 default when the file was created. Wally used the following command to change the files permissions: $ chmod g+w./coursebook Which octal mode with the chmod command can Wally use to set these same permissions? A. chmod 662./coursebook B. chmod 660./coursebook C. chmod 664./coursebook D. chmod 442./coursebook
15 /Reference: : QUESTION 23 Tina has executed the following command: $ affiliate.sh >/dev/null 2>1 Choose the statement that is true concerning this command. A. stdin is redirected /dev/null, stderr is sent to the screen. B. stderr is redirected to /dev/null, stdout is sent to the screen. C. stdout is redirected to /dev/null, stderr is redirect to /dev/null D. stdin, stderr and stdout are sent to /dev/null /Reference: : QUESTION 24 Frank is trying to remove all files from a directory. The result of the rm command is shown: $ rm * rm: remove new_car_data (yes/no)? Choose the command that might allow Frank to use the rm command without being prompted for each file. A. unalias rm B. rm -i C. clear rm D. rm -a 'rm -i' Correct Answer: A /Reference: : QUESTION 25 Tina is using a Korn shell, and she wishes to set her prompt to the output of the host name on the system. Choose the command that Tina will use to change the prompt. A. set prompt=`uname -n`$ B. export PS1='`uname -n`$ ' C. export PROMPT=`uname -n`$ D. export PS1=`uname -n`$ E. prompt '`uname -n`$ ' Correct Answer: D
16 /Reference: : QUESTION 26 The vi editor can be configured interactively during use. As an option the editor can use a configuration file which users can configure specific to their needs when using vi. What is the name of the file used to configure the vi editor by a user? A..netrc B..virc C..edrc D..exrc Correct Answer: D /Reference: : QUESTION 27 Which answer describes the access control lists used with the Solaris 10 file system? A. Access Control Matrix B. Mandatory Access Control C. NFSv4 Access Control List D. POSIX Access Control Lists Correct Answer: D /Reference: : QUESTION 28
17 The exhibit shows a listing of Jane's directory. Consider the entry new_car_data. Choose the answer that best describes this entry. A. The file has a POSIX ACL. B. The file has a extended attribute. C. No group can access this file. D. This file is a symbolic link. E. This file is a hard link. Correct Answer: A /Reference: : QUESTION 29 Jane likes using the Korn shell, because one of the metacharacter's used by this shell will change directory to the previous directory. Choose the metacharacter that is designed to change the user's location in the file system to the previous directory. A. ~ B. * C.?
18 D. - Correct Answer: D /Reference: : QUESTION 30 Which permission bit is required on a directory in order to list the files and directories that reside in the directory? A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: B /Reference: : QUESTION 31 You have received a file called data.tar.z Which command will cause the file to be uncompressed and the tar file extracted, while keeping the original file unchanged? A. uncompress data.tar.z;tar xvf data.tar B. gunzip data.tar.z;tar xvf data.tar C. unzip -c data.tar.z tar xvf - D. uncompress -c data.tar.z tar xvf - Correct Answer: D /Reference: : QUESTION 32 Jane needs to list a directory on a remote system named entropy. The system has been configured with a.rhosts file in Jane's home directory. Choose the command that will display the contents of a directory without Jane having to login to the remote system. A. rsh entropy ls /export/home/jane/scripts/* B. rcp entropy ls /export/home/jane/scripts/* C. ls -r entropy /export/home/jane/scripts/* D. rlogin entropy ls /export/home/jane/scripts/* Correct Answer: A /Reference:
19 : QUESTION 33 Frank has been sent a file named Interns.jar. He would like to examine the contents of the file without extracting the file. Choose the command that will allow him to examine the file. A. tar xvf./interns.jar B. jar tvf./interns.jar C. cat./interns.jar D../Interns.jar >> jar cvf - E. unzip./interns.jar Correct Answer: B /Reference: : QUESTION 34 The mt command is used to control a tape device. Which operation is NOT supported by the mt command? A. Move to a specific record location on a tape. B. Write a configuration file to the device. C. Display the current status of a tape device. D. Erase the entire contents of a tape. Correct Answer: B /Reference: : QUESTION 35 Which answer best describes this block of code? A. This is part of a for loop. B. This is a if/then/else command. C. This is part of a case statement. D. This is part of a while loop.
20 /Reference: : QUESTION 36 You have created a tar archive of a source code directory. You now want to compress the file using the gzip utility. Choose the command that you could use to compress the file. A. gzip -c source_code.tar B. gzip -d source_code.tar C. gzip source_code.tar D. gzip -cvf source_code.tar.gz source_code.tar /Reference: : QUESTION 37 Jim has a compressed text file named saved.zip Jim used the following command to create the file: zip -r saved plants adding: plants (deflated 94%) Jim wants to list the contents of the plants file, but not extract it. Which command will NOT list the contents of the file plants? A. gunzip -c saved.zip B. gzcat saved.zip C. unzip -c saved.zip D. unzip -l saved.zip Correct Answer: D /Reference: : QUESTION 38 Choose the answer that correctly describes the Java Archive tool. A. The jar tool creates archive compatible with the tar command. B. The jar tool use the zip command syntax to create archive files. C. The jar tool creates compressed archive files. D. The jar tool create archives compatible with the compress command.
21 /Reference: : QUESTION 39 Which command can NOT use the ~/.rhost for authentication? A. ftp B. rcp C. rlogin D. rsh E. rdist Correct Answer: A /Reference: : QUESTION 40 Wally is trying to execute commands from his host trisol on a remote host called urbank A. Urbanka has been configured with a.rhosts file. Choose the command that will NOT use the.rhost authentication. A. rcp B. rlogin C. telnet D. rsh /Reference: : QUESTION 41 Consider the following command: $ find. -name "*.txt" -print Choose the answer that best describes -name A. an argument B. an option C. a variable D. a preference Correct Answer: B /Reference: :
22 QUESTION 42 The user Frank displays a command history as seen in the exhibit. Choose the number that history assigned to the command in which Frank used an absolute path. A. 20 B. 19 C. 18 D. 16 E. 14 Correct Answer: B /Reference: : QUESTION 43 When a non-root user changes their password which of the following is true? A. The new password must contain all alphanumeric characters. B. The new password can NOT contain numbers. C. The password can contain spaces. D. The password can be the reverse of the users name. /Reference: : QUESTION 44
23 A user named Jim has just logged into the system and issued a command to list his home directory. Which of the following commands could be used to display the listing as shown in the exhibit? (Choose two.) A. ls -p -e * B. ls -a-l * C. ls -a -l D. ls -pe E. ls -al E /Reference: : QUESTION 45 While working in his home directory Jim lists the directory contents with the following result: $ ls -F affiliates* daily-report* fixes today appointment expenses/ phone-list@ windfil> year-report From this list of files, which file is executable? A. affiliates B. fixes
24 C. expenses D. phone-list E. windfil F. yearly-report Correct Answer: A /Reference: : QUESTION 46 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a case statement? A. case and esac B. do and done C. case and done D. [[ and ]] Correct Answer: A /Reference: : QUESTION 47
25 You are examining the /usr/sfw/share/man directory, and then issue a sequence of commands as shown in the exhibit. Which answer correctly displays the output of the pwd command? A. /usr/sfw B. /usr C. /usr/sfw/share D. / Correct Answer: A /Reference: : QUESTION 48 What are the minimum number of characters that a regular user must use when creating a password? A. 0 B. 2 C. 4 D. 6 E. 8 Correct Answer: D
26 /Reference: : QUESTION 49 What are the minimum number of characters that a regular user must use when creating a password? A. 0 B. 2 C. 4 D. 6 E. 8 Correct Answer: D /Reference: : QUESTION 50 Jane has two text files, file1 and file2. She wants to append the contents of file2 to the existing contents of file1. Choose the command that will achieve this goal. A. cat file1 >> file2 B. cat file1 file2 > file1 C. echo file2 >> file1 D. file1 << file2 E. >file2 >> file1 F. cat file2 file1 G. cat file2 >> file1 Correct Answer: G /Reference: : QUESTION 51 Wally wants to list all files in his current directory. Choose the command that will list all the files only in Wally's current directory. A. echo * B. strings. C. ls -a D. ls -l E. ls -R
27 /Reference: : QUESTION 52 While working in his home directory, Jim lists the contents of the directory with the following result: $ ls -F affiliates* daily-report* fixes today appointment expenses/ phone-list@ windfil> year-report This directory listing indicates that the phone-list file is what type of file? A. directory B. block special file C. executable file D. hard link E. symbolic link F. ordinary file Correct Answer: E /Reference: : QUESTION 53 Wally notices that the system seems to be running slower, and he wants to run a command to determine which process might be using the most system resources. Choose the command he might use for this purpose. A. pstack B. ps C. prstat D. prun /Reference: : QUESTION 54 Choose the answer that describes a process that runs in the background and provides a service. A. user process B. system daemon C. rouge process D. defunct process E. shell process
28 Correct Answer: B /Reference: : QUESTION 55 Wally has a file with data about various coffee plants, the data is stored in a file named plants, the file is in the coffee directory of Wally's home directory. He wants to find the number of entries that are NOT the plant "Gallienii" or "gallienii". Choose the command that Wally might use to extract the information from the file. A. grep -v Gallienii./coffee/plants wc -l B. grep -nv Gallienii./coffee/plants wc -l C. find./coffee/plants (!G* -o!g* ) wc -l D. grep -ivn Gallienii./coffee/plants wc -l E. grep -vc Gallienii./coffee/plants wc -l Correct Answer: D /Reference: : QUESTION 56 Wally is logged into a system and is searching in a file using the following command. $ grep -i "$LOGNAME" weekly-reports.txt What is Wally searching for in this file? A. The string wally, upper or lower case. B. The string LOGNAME, upper or lower case. C. The string LOGNAME at the end of a line, upper or lower case. D. The string $LOGNAME upper or lower case. Correct Answer: A /Reference: : QUESTION 57 Choose the command that will display a list of process signals. A. signal -l B. ps -s C. psig D. kill -l Correct Answer: D
29 /Reference: : QUESTION 58 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a while loop? A. Using { and } B. Using [ and ] C. Using do and done D. Using if and fi /Reference: : QUESTION 59 You have a directory named images, this directory contains various digital images of various file format types. You need to list all of the.gif and.jpg files. You decide to use a find command to gather this information. Choose the command that will display these files correctly. A. find./images -type f \( -name \*.gif -o -name \*.jpg \) '{}' B. find./images -type f \( -name '*.gif' -a -name '*.jpg' \) -print C. find./images -type f \( -name \*.gif -o -name \*.jpg \) D. find./images -type f -name "*.gif" -name "*.jpg" -print E. grep ash userdata ; grep ksh userdata /Reference: : QUESTION 60 Jane executes the following command: $ alais search='grep -i >The > is defined by setting which shell variable? A. PS1 B. PS2 C. PS3 D. PS4 Correct Answer: B /Reference:
30 : QUESTION 61 The exhibit shows the first few lines of a system run control script. What is the meaning of the -d in the test expression? A. If the first expression is true. B. If the /usr/bin directory exists. C. If the first expression evaluates to false. D. If /usr/bin contains the exit command. Correct Answer: B /Reference: : QUESTION 62 Wally is using a Korn shell, and is writing a report for his customers. The report contains instructions on how to use a set of scripts that he has created for the customers to use. The scripts are all interactive. Wally is running the scripts while creating the report so he can cut and paste the user prompts into his document. Wally executes the following command: $ fg
31 Which job will be placed in the foreground of the shell? A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: B /Reference: : QUESTION 63 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell E. Bash Shell Correct Answer: A /Reference: :
32 QUESTION 64 Which positional parameter holds the value of the number of positional parameters? A. $0 B. $* C. $# D. /Reference: : QUESTION 65 Wally created the following aliases. printall='pr * lpr' pa=printall Choose the answer that best describes what the result will be when Wally uses the pa alias. A. The string printall will be displayed. B. The command not found error message will be displayed. C. The value of the printall alias will be displayed. D. The printall alias will execute. Correct Answer: D /Reference: : QUESTION 66 Jim wants to alias the grep command to the string search. Choose the command that Jim should add to his. kshrc file to accomplish this alias. A. alias search = 'grep -i' B. alias search='grep -i' C. alias search ='grep -i' D. alias search=`grep -i` Correct Answer: B /Reference: : QUESTION 67
33 While working in his home directory, Wally executes the commands shown in the exhibit. Wally needs to execute a find command that he had previously executed. He is using a ksh shell. Choose the command which will execute the find command again. A. r 163 B.!find C.!!find D. r -f Correct Answer: A /Reference: : QUESTION 68 Wally wants to quickly create a file that stores some information about a upcoming meeting. Wally is on the phone with his customer and doesn't want to interrupt the conversation to find a pen or pencil. Choose the command sequence that Wally might use on his system to store this information. A. cat < meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + d> B. cat > meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + c> C. cat < meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + c> D. cat > meeting.txt <return>monday, the 23rd, 10:00 AM <return><crtl + d> Correct Answer: D /Reference: : QUESTION 69
34 The exhibit is a listing of your current directory. You need to place the file sonic into the directory dir1 and rename the file to game, while removing the original file. Choose the commands that will accomplish this task. (Choose two.) A. cp./sonic /widgets/dir1/game ; rm sonic B. mv /sonic widgets/dir1/game C. cp /sonic widgets/dir1/game ; rm /sonic D. mv sonic widgets/dir1/game E. cp./widgets/dir1/sonic /game; rm -r sonic F. mv sonic./dir1/game G. cp./sonic./widgets/dir1/game ; rm./sonic H. mv /sonic /widgets/dir1/ ; rm./sonic Correct Answer: DG /Reference: : QUESTION 70 While working in his home directory Jim lists the directory contents with the following result: From this list of files, which file is executable? A. affiliates B. fixes C. expenses D. phone-list E. windfil F. yearly-report
35 Correct Answer: A /Reference: : QUESTION 71 You have a file named customer1 and you need to examine the file in read only mode using the vi editor. Which two commands will open the file in the vi editor as read only? (Choose two.) A. view customer1 B. vi -ro customer1 C. vi -RO customer1 D. view -ro customer1 E. vi -R customer1 F. vi -r customer1 Correct Answer: AE /Reference: : QUESTION 72 Val wants to change the permissions on a file to remove access for all user that are not in the file's group. She also wants the group permissions to allow the file to have read and write access. Val can currently read and write the file. Which octal mode with the chmod command will set those permissions? A. chmod 664./data B. chmod 660./data C. chmod 775./data D. chmod 550./data Correct Answer: B /Reference: : QUESTION 73 You have a file that contains a list of parts in a single column. You need to append the text string.ex2009 to each entry. You will use the vi editor and the last line mode to append this text to each entry. Which command will add the text correctly? A. :%s/*/.ex2009/ B. :%s/.$/.ex2009/ C. :%s/$/.ex2009/ D. :%s/*$/.ex2009/
36 /Reference: : QUESTION 74 The exhibit shows information about data in Jane's home directory. Jane wants to delete, from her home directory, the directory named widgets and this directory's contents. Select the command that would best work to achieve Jane's goal. A. rm -r./widgets B. rmdir./widgets C. rm *./widgets D. rmdir -r * E. rmdir -r./widgets F. rm -r * Correct Answer: A /Reference: : QUESTION 75 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to give write access on the file for a contractor not in the webdev group. You do not have root access. Which method describes how you can grant write permissions to the contractor's user ID? A. Edit the /etc/group file and add the contractor's user ID to the group. B. Create a owner ACL for the contractor's user ID. C. Add a mandatory access control for the contractor's user ID. D. The world or group permissions must be modified by root. Correct Answer: B
37 /Reference: : QUESTION 76 Jane is about to edit a file with the vi editor. She executes the following command: $ vi./customer_sat.txt Choose the vi editor mode that Jane will be using when the file is opened. A. command mode B. edit mode C. last line mode D. ex mode Correct Answer: A /Reference: : QUESTION 77 Val wants to copy the customer data files from the data directory, to a directory called customer. The new customer directory will be in Val's home directory. Choose the command that Val will use to accomplish this task. A. touch $HOME/customer ; cp customer-local customer-region customer-state $HOME/customer B. mkdir $HOME/customer ; mv customer-local customer-region customer-state $HOME/customer C. mkdir../customer ; cp customer-local customer-region customer-state../customer D. cp customer-local customer-region customer-state mkdir $HOME/customer /Reference: : QUESTION 78
38 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 79 Jim is considering using a different shell. One of the shell features that Jim would like to use is the tilde (~) metacharacter, used to move to the user's home directory. Choose the shell that does NOT support the tilde (~) metacharacter. A. Korn Shell (ksh)
39 B. TC Shell (tcsh) C. C Shell (csh) D. Z shell (zsh) E. Bourne Shell (sh) Correct Answer: E /Reference: : QUESTION 80 You have a directory that contains more than 30 files. You need to remove a number of these files, but each of the files you need to remove is uniquely named. Choose the command that might best help you to remove these dissimilar files. A. rm -? * B. rm -? C. rm -i D. rm -i * E. rm * F. rm -r * Correct Answer: D /Reference: : QUESTION 81 Wally has two files with data about dark and light coffee beans. The data is stored in the files named dark_beans and light_beans. The files are in the coffee directory of Wally's home directory. Wally would like to display a sorted list of all of the words from both lists that start with the letter "g" or "G". The files contain mixed case names. Which command line can Wally use to display the data? A. sort./coffee/dark_beans./coffee/light_beans grep ^[Gg] B. cat./coffee/dark_beans./coffee/light_beans grep -i G sort C. sort -f./coffee/dark_beans./coffee/light_beans grep g D. sort./coffee/dark_beans./coffee/light_beans grep -i g Correct Answer: A /Reference: : QUESTION 82 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to deny write access to the file for two members of the webdev group, but allow write access for the rest of the webdev group. You do not have root access. Which method can be used to configure this access?
40 A. chgrp command B. chown command C. chmod command D. setfacl command Correct Answer: D /Reference: : QUESTION 83 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 84 You are using the Korn shell, and would like to change the number of commands displayed by the history command. Choose which variable you will need to set. A. HISTFILE B. HISTFILESIZE C. HISTSIZE D. HISTLIMIT /Reference: : QUESTION 85 Wally has just edited a file with the vi editor, he saves the new file with the name newdata. The following is a listing of that file: Based on the information provided, what is the value of the umask setting?
41 A B C D /Reference: : QUESTION 86 Jane has listed information about directories under her home directory. Choose which statement is true concerning the file finder. A. finder is a symbolic link B. finder has a hard link C. finder is writable D. finder has a ACL Correct Answer: B /Reference: : QUESTION 87
42 Frank is attempting to cat a file in a subdirectory. He is returned a error that indicates he cannot open the file. The exhibit shows Frank's command, the results, and the file's permissions. Choose the permission bits on a directory that might allow Frank to cat the file. A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: A /Reference: : QUESTION 88 Which answer describes the access control lists used with the Solaris 10 file system? A. Access Control Matrix B. Mandatory Access Control C. NFSv4 Access Control List D. POSIX Access Control Lists Correct Answer: D /Reference: : QUESTION 89 Val has invoked the following command, to gather information about the data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer is correct concerning this command line? A. The sort filter takes stdin from the tail filter. B. The file called file2 must exist for the command to work. C. The sort filter uses stdout from the du command. D. The stdout from the tail filter will be appended to file2.
43 /Reference: : QUESTION 90 You have created a tar archive of a source code directory. You now want to compress the file using the gzip utility. Choose the command that you could use to compress the file. A. gzip -c source_code.tar B. gzip -d source_code.tar C. gzip source_code.tar D. gzip -cvf source_code.tar.gz source_code.tar /Reference: : QUESTION 91 Val is copying files named daily.rpt from a directory called reports into her home directory on host users1 over to /var/tmp/val on host datastor. Choose the command that Val might use to copy the files. A. ftp user1:~val/reports/daily.rpt datastor:/var/tmp/val B. rcp cp user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt C. rcp user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt D. rcp datastor:/var/tmp/val/daily.rpt user1:~val/reports/daily.rpt E. rsh user1:~val/reports/daily.rpt datastor:/var/tmp/val/daily.rpt /Reference: : QUESTION 92 Your logging into the system as user Val, you are notified upon login that you must change your user password on the system. Your current password is 2co0lu! Choose the password that meets the requirements for a user changing the password on a Solaris 10 system. A. 2co0l4u B. valiscol C. 2C00L4u2 D ! /Reference: : QUESTION 93 A user is creating an archive using the zip utility. The user executes the following sequence of commands.
44 $ zip -rm archive.zip /data/dir1 $ zip -rm archive.zip /product/dir1 $ zip -rm archive.zip /data/dir2 What will be the result of running this sequence of commands? A. An archive.zip file will be created and the contents will be the three directories. B. An archive.zip file will be created the contents will be /data/dir2 C. An archive.zip file will be created the contents will be /data/dir1 D. The three directories will be removed from the archive.zip Correct Answer: A /Reference: : QUESTION 94 Frank has a archive named data-1-4.tar and he needs to recover the contents of the archive. Which command will restore the contents of the archive to disk? A. tar xvf data-1-4.tar B. tar uvf data-1-4.tar C. tar cvf data-1-4.tar D. tar rvf data-1-4.tar E. tar tvf data-1-4.tar Correct Answer: A /Reference: : QUESTION 95 Frank is going to add four files to a tar archive. The files are called data1, data2, etc. These files will be stored in a new archive called data-1-4.tar Which command will correctly create this archive? A. tar xvf data-1-4.tar data1 data2 data3 data4 B. tar uvf data-1-4.tar data1 data2 data3 data4 C. tar cvf data-1-4.tar data1 data2 data3 data4 D. tar rvf data-1-4.tar data1 data2 data3 data4 E. tar tvf data-1-4.tar data1 data2 data3 data4 /Reference: : QUESTION 96 Frank wants to login to a remote system named proteus and edit multiple files. The remote host proteus has
45 been configured with a.rhosts file in Frank's home directory. Choose the command that will allow Frank to login without entering a password. A. telnet B. ftp C. rcp D. dtlogin E. rlogin Correct Answer: E /Reference: : QUESTION 97 You have a compressed file named meeting-agenda.gz. You would like to examine the content of this compressed file. Choose the command that will display the files content to the screen. A. unzip -c meeting-agenda.gz B. gzip -c meeting-agenda.gz C. zcat meeting-agenda.gz D. gzcat meeting-agenda,gz Correct Answer: D /Reference: : QUESTION 98 Choose the answer that correctly describes the Java Archive tool. A. The jar tool creates archive compatible with the tar command. B. The jar tool use the zip command syntax to create archive files. C. The jar tool creates compressed archive files. D. The jar tool create archives compatible with the compress command. /Reference: : QUESTION 99 Val needs to transfer multiple files from a remote system to her local system. She has established an ftp session with the remote system. When multiple files are transferred with ftp the system will prompt you to determine if you want each file transferred. Choose the ftp command that will disable this ftp prompt when transferring multiple files. A. mget
46 B. mput C. prompt D. noprompt E. recv /Reference: : QUESTION 100 Wally is searching for the PID of the syslog process on his system. He uses the following command: $ pgrep syslogd Choose the answer that describes the outcome of this command. A. The PIDs of all syslogd processes are displayed. B. The PID and full path of the first syslogd process is displayed. C. The PIDs and name of each syslogd process is displayed. D. The PIDs and full path of all syslogd processes is displayed. Correct Answer: A /Reference: : QUESTION 101 Wally has a file with data about various coffee plants, the data is stored in a file named plants, the file is in the coffee directory of Wally's home directory. He wants to find the number of entries that are NOT the plant "Gallienii" or "gallienii". Choose the command that Wally might use to extract the information from the file. A. grep -v Gallienii./coffee/plants wc -l B. grep -nv Gallienii./coffee/plants wc -l C. find./coffee/plants (!G* -o!g* ) wc -l D. grep -ivn Gallienii./coffee/plants wc -l E. grep -vc Gallienii./coffee/plants wc -l Correct Answer: D /Reference: : QUESTION 102 Jane is writing a shell script. While testing the script, she finds that the script is in a infinite loop. She issues the following command: $ kill `pgrep affiliate.sh` Which signal does this command send to the process?
47 A. SIGHUP B. SIGKILL C. SIGINT D. SIGTERM Correct Answer: D /Reference: : QUESTION 103 The exhibit shows both the data from Jane's home directory and a command. Based on the data shown, choose the command that would move Jane into the directory named things. A. mv../.. B. cd./things C. cd./../../things D. chdir../../things E. cd /../../things /Reference: : QUESTION 104 Wally notices that the system seems to be running slower, and he wants to run a command to determine which process might be using the most system resources. Choose the command he might use for this purpose.
48 A. pstack B. ps C. prstat D. prun /Reference: : QUESTION 105 You have a parts list, and you need to search it for all parts that contain the string V1 or the string R3. You decide to use a grep utility to search the file. Which grep command will you use? A. grep -F 'V1 R3'./parts_list B. fgrep 'V1 R3'./parts_list C. egrep 'V1 R3'./parts_list D. grep 'V1 R3'./parts_list /Reference: : QUESTION 106 You need to find all files in your home directory hierarchy that contain the string sample in the file name. You want a relative path to each file so you can easily retrieve it. Choose the command that will find these files. A. ls -l * grep -v sample B. find. -print grep sample C. ls -Rl grep -i sample D. grep sample < find. -print Correct Answer: B /Reference: : QUESTION 107 Wally is searching for the PID of the syslog process on his system. He uses the following command: $ pgrep syslogd Choose the answer that describes the outcome of this command. A. The PIDs of all syslogd processes are displayed. B. The PID and full path of the first syslogd process is displayed.
49 C. The PIDs and name of each syslogd process is displayed. D. The PIDs and full path of all syslogd processes is displayed. Correct Answer: A /Reference: : QUESTION 108 Which grep program is used to search for literal strings and does not interrupt regular expressions? A. grep B. lgrep C. egrep D. fgrep Correct Answer: D /Reference: : QUESTION 109 Frank is the administrator of the site where you work. You notice Frank issues the following command: # kill -HUP `cat /usr/local/apache2/logs/httpd.pid` Choose the answer that best describes what this command will do. A. Terminate the httpd process and all the child processes. B. Restart the httpd process and all child processes. C. Force the httpd process to reread it's configuration file. D. Terminate the httpd process but not the children. /Reference: : QUESTION 110 Val is searching through a file using the following egrep command: $ egrep '3+'./customer-data Choose the answer that best describes what the result of this search will be. A. Find all lines with '3+' in the line. B. Find all lines with one or more '+' characters. C. Find all lines with three '+' characters. D. Find all lines with one or more 3's.
50 E. Find all lines with more than three 3's. Correct Answer: D /Reference: : QUESTION 111 Choose the command that is used to display a process and all the parent processes. A. pgrep B. ptree C. pmap D. kstat Correct Answer: B /Reference: : QUESTION 112 Within the exhibit, "Listing 1" displays the original files contents, and "Listing 2" is the result from one of the following commands. Select the command that produced this output. A. grep [ak]sh$ userdata B. grep [akak]sh userdata C. grep (a k)sh userdata D. grep [^ak]sh$ userdata E. grep ash userdata ; grep ksh userdata Correct Answer: A
51 /Reference: : QUESTION 113 Jim has moved around the file system. He wants to return to his home directory. Which command short cut will take Jim back to his home directory? A. cd. B. cd C. cd - D. cd HOME Correct Answer: B /Reference: : QUESTION 114 A user named Frank issues the following command: % cal Choose the answer that best describes the number 9 as used in this command line. A. first argument B. second argument C. second option D. first option Correct Answer: A /Reference: : QUESTION 115
52 The exhibit shows a listing of Jane's directory. Consider the entry new_car_data. Choose the answer that best describes this entry. A. The file has a POSIX ACL. B. The file has a extended attribute. C. No group can access this file. D. This file is a symbolic link. E. This file is a hard link. Correct Answer: A /Reference: : QUESTION 116 Val has invoked the following command, to gather information about the data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer is correct concerning this command line? A. The sort filter takes stdin from the tail filter.
53 B. The file called file2 must exist for the command to work. C. The sort filter uses stdout from the du command. D. The stdout from the tail filter will be appended to file2. /Reference: : QUESTION 117 The vi editor can be configured interactively during use. As an option the editor can use a configuration file which users can configure specific to their needs when using vi. What is the name of the file used to configure the vi editor by a user? A..netrc B..virc C..edrc D..exrc Correct Answer: D /Reference: : QUESTION 118 Val is using the du command to gather information about data stored in her home directory. $ du -sk * sort -n tail > file2 Which answer correctly describes the output of this command line? A. The 10 largest files will be listed by size and written to file2 B. The 10 smallest files will be listed by size and written to file2 C. The oldest 10 files will be listed by date and written to file2 D. The 10 most recent files will be listed by date and written to file2 Correct Answer: A /Reference: : QUESTION 119 Frank wants to examine the file car-data but not edit the file. He only needs to scroll through the file and search for data. Choose the command that would open the file car-data for reading only. A. vi -r car-data B. vi -R car-data C. vi -ro car-data D. ex car-data
54 Correct Answer: B /Reference: : QUESTION 120 You have a file that contains confidential customer data called customer489.dat. You need to make this file available to the sales group but protect the data from other users. You are not a member of the sales group and you do not have root access. -rw-r--r-- 1 tbussart staff Apr 1 15:20 customer489.dat $ getent group sales sales::1034:tom,dick,harry Which command will configure the file for the described access? A. chgrp sales /export/home/tbussart/customer489.dat B. groupadd sales /export/home/tbussart/customer489.dat C. setfacl -m g:sales:rw-,m:rw- /export/home/tbussart/customer489.dat D. chmod +w /export/home/tbussart/customer489.dat /Reference: : QUESTION 121 Wally created a new file named coursebook. The umask was set to the Solaris 10 default when the file was created. Wally used the following command to change the files permissions: $ chmod g+w./coursebook Which octal mode with the chmod command can Wally use to set these same permissions? A. chmod 662./coursebook B. chmod 660./coursebook C. chmod 664./coursebook D. chmod 442./coursebook /Reference: : QUESTION 122 Tina has executed the following command: $ affiliate.sh >/dev/null 2>1 Choose the statement that is true concerning this command.
55 A. stdin is redirected /dev/null, stderr is sent to the screen. B. stderr is redirected to /dev/null, stdout is sent to the screen. C. stdout is redirected to /dev/null, stderr is redirect to /dev/null D. stdin, stderr and stdout are sent to /dev/null /Reference: : QUESTION 123 The exhibit shows a listing of Jane's directory. Consider the entry repair. Choose the commands that might have been used to create this file. A. cp /export/home/jane/things/fixit /export/home/jane/repair B. ln /export/home/jane/repair /export/home/jane/things/fixit C. ln /export/home/jane/things/fixit /export/home/jane/repair D. mkfile 32b /export/home/jane/repair
56 E. ln -s /export/home/jane/things/fixit /export/home/jane/repair F. ln -s /export/home/jane/repair /export/home/jane/things/fixit Correct Answer: E /Reference: : QUESTION 124 You are using the vi editor to edit the file displayed in the exhibit. You are in command mode and the cursor is on the first letter of the word oriented on line four. You need to delete two words: oriented and interactive. Choose the commands that will complete this task. (Choose two.) A. dw B. 2dw C. d2w D. 2d$ E. 2D$ F. 2wd Correct Answer: BC /Reference: : QUESTION 125 You attempt to login using the Solaris Login Graphical User Interface (GUI), however an error message is displayed. After closing the error message you are returned to the Login Screen. How would you login to read the log files that were indicated in the error message. Which of the following describes how you can login to read these log files? A. At the Login Screen select the Options, then Sessions, then Fail Safe Session and login. B. Reboot the system, login to the CDE Desktop session with your user name and password. C. From a different system at the login screen select Options, Remote Login and select your system, login to the session with your user name and password. D. At the Login Screen select the Options, select Reset Login Screen, login to the session with your user name and password. Correct Answer: A /Reference:
57 : QUESTION 126 Wally is using a Korn shell. He uses the escape key followed by the backslash key for file name completion in this shell. Which of the following commands did Wally use to configure file name completion? A. set filec B. set -o emacs C. set -o vi D. fc -l /Reference: : QUESTION 127 Jane is attempting to create a directory in which to store scripts. The exhibit shows the sequence of commands used by Jane and the resulting error that has occurred. Which command or sequence of commands would have created the directory correctly? (Choose two.) A. touch mydir; mkdir scripts B. mkdir -p./mydir/scripts C. md./mydir/scripts D. make -dir mydir/scripts E. mkdir./mydir; mkdir./mydir/scripts F. mkdir mydir; mkdir scripts Correct Answer: BE
58 /Reference: : QUESTION 128 Wally has just edited a file with the vi editor, he saves the new file with the name newdata. The following is a listing of that file: -rw-r wally other May 27 19:10 newdata Based on the information provided, what is the value of the umask setting? A B C D /Reference: : QUESTION 129 Jane has listed information about directories under her home directory. Choose which statement is true concerning the file finder. A. finder is a symbolic link B. finder has a hard link C. finder is writable D. finder has a ACL Correct Answer: B
59 /Reference: : QUESTION 130 You own a file that is part of a web development project. This file is shared by the group permission among the members of the web development group called webdev. The world permissions for the file are set to read only for security reasons. You wish to give write access on the file for a contractor not in the webdev group. You do not have root access. Which method describes how you can grant write permissions to the contractor's user ID? A. Edit the /etc/group file and add the contractor's user ID to the group. B. Create a owner ACL for the contractor's user ID. C. Add a mandatory access control for the contractor's user ID. D. The world or group permissions must be modified by root. Correct Answer: B /Reference: : QUESTION 131 Tina has executed the following command: $ affiliate.sh 2>>/var/log/worklog Choose the statement that is true concerning this command. A. stdin is redirected to a file. B. stderr is redirected to a file. C. stdout is redirected to a file. D. all output from the script is redirected to a file. Correct Answer: B /Reference: : QUESTION 132
60 Frank needs to add write access for the sales group, so he uses the following command: $ chmod g+w project543.dat Choose which answer reflects the result of this command. A. Only the sales group will be given write access to the file. B. Only the sales group and market group will have write access to the file. C. The sales group and market group and user jane will have write access to the file. D. The sales group and market group and user jane and others will have write access to the file. /Reference: : QUESTION 133
61 Jane has discovered that the file bluetooth is corrupted. She wants to remove all instances of this file from the system. What command should Jane use to remove all instances of bluetooth? A. rm blue* B. rm bluetooth cellphone C. rm keyboard bluetooth quarters D. rm bluetooth cellphone keyboard quarters Correct Answer: B /Reference: : QUESTION 134
62 The exhibit is a listing of Jane's directory. Choose which file is linked to the file keyboard. A. bluetooth B. cellphone C. mouse D. quarters Correct Answer: D /Reference: : QUESTION 135 Which permission bit is required on a directory in order to list the files and directories that reside in the directory? A. execute bit B. read bit C. write bit D. read and write bit Correct Answer: B /Reference:
63 QUESTION 136 The user named Val issued a sequence of commands, as shown in the exhibit. Which of the following choices describes the results of the last command executed by Val? A. Changes directory to Val's home directory. B. -: does not exist is displayed. C. -: No such file or directory is displayed. D. Changes directory to the previous directory. E. Changes to the first directory listed in the current directory. Correct Answer: D /Reference: : QUESTION 137 The exhibit shows the first few lines of a system run control script. In which shell is this script executed? A. Bourne Shell B. Z Shell C. C Shell D. Korn Shell
64 E. Bash Shell Correct Answer: A /Reference: : QUESTION 138 Wally is using a Korn shell, and is writing a report for a customer. The report contains instructions on how to use a set of scripts that he has created for this customer. The scripts are all interactive. Wally is running the scripts while creating the report, so he can cut and paste the user prompts into his document. From the information in the exhibit, choose the script that was last running in the foreground. A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: B /Reference: : QUESTION 139 Frank is writing a ksh script. How does he indicate the beginning and end of a block of statements in a case statement? A. case and esac B. do and done C. case and done D. [[ and ]] Correct Answer: A /Reference: : QUESTION 140
65 Wally is using a Korn shell, and is writing a report for a customer. The report contains instructions on how to use a set of scripts that Wally has created for this customer's use. The scripts are all interactive so Wally is running the scripts while creating the report to cut and paste the user prompts into his document. Examine the exhibit. Which command will Wally use to continue working in the cust-report file? A. kill -THAW 1854 B. fg %+ C. fg %- D. fg %1 E. fg Correct Answer: D /Reference: : QUESTION 141 Wally created the following aliases. printall='pr * lpr' pa=printall Choose the answer that best describes what the result will be when Wally uses the pa alias. A. The string printall will be displayed. B. The command not found error message will be displayed. C. The value of the printall alias will be displayed. D. The printall alias will execute. Correct Answer: D /Reference: : QUESTION 142
66 Wally is using a Korn shell, and is writing a report for his customers. The report contains instructions on how to use a set of scripts that he has created for the customers to use. The scripts are all interactive. Wally is running the scripts while creating the report so he can cut and paste the user prompts into his document. From the information in the exhibit, choose the script that was last executed in the shell. A../makecert B../crypttool.sh confidential-report C../affiliate D. vi cust-report Correct Answer: A /Reference: : QUESTION 143 Dave has a compressed tar archive named pics.tar.z Dave needs to uncompress and extract the data from this file. Which command will extract and uncompress the file? A. uncompress pics.tar.z;tar xvf pics.tar B. zcat -c pics.tar.z tar xvf - C. bunzip2 pics.tar.z;tar xvf pics.tar D. bzcat pics.tar.z tar xvf - Correct Answer: A /Reference: : QUESTION 144 Val wants to backup her home directory to a tape device. Choose the command she might use to create the backup. A. tape B. mt C. compress D. tar Correct Answer: D
Oracle EXAM - 1Z Oracle Solaris Certified Associate Exam. Buy Full Product.
Oracle EXAM - 1Z0-876 Oracle Solaris Certified Associate Exam Buy Full Product http://www.examskey.com/1z0-876.html Examskey Oracle 1Z0-876 exam demo product is here for you to test the quality of the
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More informationComputer Systems and Architecture
Computer Systems and Architecture Introduction to UNIX Stephen Pauwels University of Antwerp October 2, 2015 Outline What is Unix? Getting started Streams Exercises UNIX Operating system Servers, desktops,
More informationTable of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs
Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing
More informationIntroduction to Linux Organizing Files
Introduction to Linux Organizing Files Computational Science and Engineering North Carolina A&T State University Instructor: Dr. K. M. Flurchick Email: kmflurch@ncat.edu Arranging, Organizing, Packing
More informationUNIX and Linux Essentials Student Guide
UNIX and Linux Essentials Student Guide D76989GC10 Edition 1.0 June 2012 D77816 Authors Uma Sannasi Pardeep Sharma Technical Contributor and Reviewer Harald van Breederode Editors Anwesha Ray Raj Kumar
More informationComputer Systems and Architecture
Computer Systems and Architecture Stephen Pauwels Computer Systems Academic Year 2018-2019 Overview of the Semester UNIX Introductie Regular Expressions Scripting Data Representation Integers, Fixed point,
More informationRead the relevant material in Sobell! If you want to follow along with the examples that follow, and you do, open a Linux terminal.
Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If
More informationFirst of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.
Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationEssential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02
Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services
More informationUNIX Essentials Featuring Solaris 10 Op System
A Active Window... 7:11 Application Development Tools... 7:7 Application Manager... 7:4 Architectures - Supported - UNIX... 1:13 Arithmetic Expansion... 9:10 B Background Processing... 3:14 Background
More informationQUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2)
BANK ON & SHELL PROGRAMMING-502 (CORE PAPER-2) TOPIC 1: VI-EDITOR MARKS YEAR 1. Explain set command of vi editor 2 2011oct 2. Explain the modes of vi editor. 7 2013mar/ 2013 oct 3. Explain vi editor 5
More informationBIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description:
BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description: This course provides Bioinformatics students with the
More informationfor more :-
JNTU ONLINE EXAMINATIONS [Mid 1 - UNIX] 1. C programmers in the unix environment has complete access to the entire system call library as well as the a. static library functions b. dynamic library functions
More informationUNIX Quick Reference
UNIX Quick Reference This card represents a brief summary of some of the more frequently used UNIX commands that all users should be at least somewhat familiar with. Some commands listed have much more
More informationacmteam/unix.pdf How to manage your account (user ID, password, shell); How to compile C, C++, and Java programs;
Note: you can find this file under: http://www.cs.queensu.ca/ acmteam/unix.pdf Introduction to Unix Tutorial In this tutorial, you will learn: How to manage your account (user ID, password, shell); Navigating
More informationCommand-line interpreters
Command-line interpreters shell Wiki: A command-line interface (CLI) is a means of interaction with a computer program where the user (or client) issues commands to the program in the form of successive
More informationLecture # 2 Introduction to UNIX (Part 2)
CS390 UNIX Programming Spring 2009 Page 1 Lecture # 2 Introduction to UNIX (Part 2) UNIX is case sensitive (lowercase, lowercase, lowercase) Logging in (Terminal Method) Two basic techniques: 1. Network
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More information5/20/2007. Touring Essential Programs
Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.
More informationUnix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University
Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )
More informationUseful Unix Commands Cheat Sheet
Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List
More informationList of Linux Commands in an IPm
List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir
More informationUNIX Basics. UNIX Basics CIS 218 Oakton Community College
UNIX Basics UNIX Basics CIS 218 Oakton Community College History UNIX was invented in 1969 at AT&T Bell Labs Ken Thompson and Dennis Ritchie are credited as the original architects and developers of C.
More informationOutline. Structure of a UNIX command
Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory
More informationIMPORTANT: Logging Off LOGGING IN
These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this
More informationIntroduction to Unix The Windows User perspective. Wes Frisby Kyle Horne Todd Johansen
Introduction to Unix The Windows User perspective Wes Frisby Kyle Horne Todd Johansen What is Unix? Portable, multi-tasking, and multi-user operating system Software development environment Hardware independent
More informationIntroduction: What is Unix?
Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix
More informationLOG ON TO LINUX AND LOG OFF
EXPNO:1A LOG ON TO LINUX AND LOG OFF AIM: To know how to logon to Linux and logoff. PROCEDURE: Logon: To logon to the Linux system, we have to enter the correct username and password details, when asked,
More informationSet 1 MCQ Which command is used to sort the lines of data in a file in reverse order A) sort B) sh C) st D) sort -r
1. Which symbol will be used with grep command to match the pattern pat at the beginning of a line? A) ^pat B) $pat C) pat$ D) pat^ 2. Which command is used to sort the lines of data in a file in reverse
More informationUnix Handouts. Shantanu N Kulkarni
Unix Handouts Shantanu N Kulkarni Abstract These handouts are meant to be used as a study aid during my class. They are neither complete nor sincerely accurate. The idea is that the participants should
More informationOn successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12.
CIE- 25 Marks Government of Karnataka Department of Technical Education Bengaluru Course Title: Linux Lab Scheme (L:T:P) : 0:2:4 Total Contact Hours: 78 Type of Course: Tutorial, Practical s & Student
More informationCST Algonquin College 2
The Shell Kernel (briefly) Shell What happens when you hit [ENTER]? Output redirection and pipes Noclobber (not a typo) Shell prompts Aliases Filespecs History Displaying file contents CST8207 - Algonquin
More informationProcesses. Shell Commands. a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms:
Processes The Operating System, Shells, and Python Shell Commands a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms: - Command prompt - Shell - CLI Shell commands
More informationCSC UNIX System, Spring 2015
CSC 352 - UNIX System, Spring 2015 Study guide for the CSC352 midterm exam (20% of grade). Dr. Dale E. Parson, http://faculty.kutztown.edu/parson We will have a midterm on March 19 on material we have
More informationUnix Introduction to UNIX
Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationUNIX COMMANDS AND SHELLS. UNIX Programming 2015 Fall by Euiseong Seo
UNIX COMMANDS AND SHELLS UNIX Programming 2015 Fall by Euiseong Seo What is a Shell? A system program that allows a user to execute Shell functions (internal commands) Other programs (external commands)
More information1Z Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions
1Z0-409 Oracle Linux Fundamentals (Oracle Partner Network) Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-409 Exam on Oracle Linux Fundamentals (Oracle Partner Network)... 2 Oracle
More informationIntroduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p.
Introduction p. 1 Who Should Read This Book? p. 1 What You Need to Know Before Reading This Book p. 2 How This Book Is Organized p. 2 Conventions Used in This Book p. 2 Introduction to UNIX p. 5 An Overview
More informationIntroduction to Linux
Introduction to Linux January 2011 Don Bahls User Consultant (Group Leader) bahls@arsc.edu (907) 450-8674 Overview The shell Common Commands File System Organization Permissions Environment Variables I/O
More informationIntroduction to UNIX Shell Exercises
Introduction to UNIX Shell Exercises Determining Your Shell Open a new window or use an existing window for this exercise. Observe your shell prompt - is it a $ or %? What does this tell you? Find out
More informationAppendix B WORKSHOP. SYS-ED/ Computer Education Techniques, Inc.
Appendix B WORKSHOP SYS-ED/ Computer Education Techniques, Inc. 1 Introduction There are no workshops for this chapter. The instructor will provide demonstrations and examples. SYS-ED/COMPUTER EDUCATION
More informationSystem Administration
Süsteemihaldus MTAT.08.021 System Administration UNIX shell basics Name service DNS 1/69 Command Line Read detailed manual for specific command using UNIX online documentation or so called manual (man)
More informationChapter-3. Introduction to Unix: Fundamental Commands
Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system
More informationIntroduction to UNIX Command Line
Introduction to UNIX Command Line Files and directories Some useful commands (echo, cat, grep, find, diff, tar) Redirection Pipes Variables Background processes Remote connections (e.g. ssh, curl) Scripts
More informationThe Unix Shell & Shell Scripts
The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises
More informationLezione 8. Shell command language Introduction. Sommario. Bioinformatica. Mauro Ceccanti e Alberto Paoluzzi
Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza Sommario Shell command language Introduction A
More informationIntroduction to remote command line Linux. Research Computing Team University of Birmingham
Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments
More information3/8/2017. Unix/Linux Introduction. In this part, we introduce. What does an OS do? Examples
EECS2301 Title Unix/Linux Introduction These slides are based on slides by Prof. Wolfgang Stuerzlinger at York University Warning: These notes are not complete, it is a Skelton that will be modified/add-to
More informationLab 2: Linux/Unix shell
Lab 2: Linux/Unix shell Comp Sci 1585 Data Structures Lab: Tools for Computer Scientists Outline 1 2 3 4 5 6 7 What is a shell? What is a shell? login is a program that logs users in to a computer. When
More informationCrash Course in Unix. For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix. -or- Unix in a Nutshell (an O Reilly book).
Crash Course in Unix For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix -or- Unix in a Nutshell (an O Reilly book). 1 Unix Accounts To access a Unix system you need to have
More informationLab Week02 - Part I. Shell Commands. Professional Training Academy Linux Series
Lab Week02 - Part I Shell Commands Professional Training Academy Linux Series Commands: Manipulation cp : copy a file To copy a file you need to give a source and then a destination e.g. to copy the file
More informationBasic Linux (Bash) Commands
Basic Linux (Bash) Commands Hint: Run commands in the emacs shell (emacs -nw, then M-x shell) instead of the terminal. It eases searching for and revising commands and navigating and copying-and-pasting
More informationFirst of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.
Warnings Linux Commands 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material
More informationUNIX. Basic UNIX Command
UNIX Basic UNIX Command Command List ls mkdir mv chmod groupadd hostname kill head top compress/ uncompress pwd Cat find chown useradd id ioscan pdf sar cd more grep chgrp passwd mount dmesg netstat tar
More informationCS4350 Unix Programming. Outline
Outline Unix Management Files and file systems Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission
More informationLinux Command Line Primer. By: Scott Marshall
Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and
More informationLezione 8. Shell command language Introduction. Sommario. Bioinformatica. Esercitazione Introduzione al linguaggio di shell
Lezione 8 Bioinformatica Mauro Ceccanti e Alberto Paoluzzi Esercitazione Introduzione al linguaggio di shell Dip. Informatica e Automazione Università Roma Tre Dip. Medicina Clinica Università La Sapienza
More informationUnix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.
Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,
More informationUNIX. The Very 10 Short Howto for beginners. Soon-Hyung Yook. March 27, Soon-Hyung Yook UNIX March 27, / 29
UNIX The Very 10 Short Howto for beginners Soon-Hyung Yook March 27, 2015 Soon-Hyung Yook UNIX March 27, 2015 1 / 29 Table of Contents 1 History of Unix 2 What is UNIX? 3 What is Linux? 4 How does Unix
More informationIntroduction to UNIX command-line
Introduction to UNIX command-line Boyce Thompson Institute March 17, 2015 Lukas Mueller & Noe Fernandez Class Content Terminal file system navigation Wildcards, shortcuts and special characters File permissions
More informationSome useful UNIX Commands written down by Razor for newbies to get a start in UNIX
Some useful UNIX Commands written down by Razor for newbies to get a start in UNIX 15th Jan. 2000 / 3:55 am Part 1: Working with files and rights ------------------------------------- cp
More informationFirst of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.
Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If
More informationEmbedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island
Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller
More informationCSCI 2132 Software Development. Lecture 4: Files and Directories
CSCI 2132 Software Development Lecture 4: Files and Directories Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 12-Sep-2018 (4) CSCI 2132 1 Previous Lecture Some hardware concepts
More informationIntroduction to Unix: Fundamental Commands
Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating
More informationFiles
http://www.cs.fsu.edu/~langley/cop3353-2013-1/reveal.js-2013-02-11/02.html?print-pdf 02/11/2013 10:55 AM Files A normal "flat" file is a collection of information. It's usually stored somewhere reasonably
More informationShell Scripting. With Applications to HPC. Edmund Sumbar Copyright 2007 University of Alberta. All rights reserved
AICT High Performance Computing Workshop With Applications to HPC Edmund Sumbar research.support@ualberta.ca Copyright 2007 University of Alberta. All rights reserved High performance computing environment
More informationGetting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers
Chapter 2 Unix Utilities for non-programmers Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, 2003. Original Notes by Raj Sunderraman Converted to presentation
More informationMills HPC Tutorial Series. Linux Basics I
Mills HPC Tutorial Series Linux Basics I Objectives Command Line Window Anatomy Command Structure Command Examples Help Files and Directories Permissions Wildcards and Home (~) Redirection and Pipe Create
More information5/8/2012. Creating and Changing Directories Chapter 7
Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing
More informationUnix/Linux Operating System. Introduction to Computational Statistics STAT 598G, Fall 2011
Unix/Linux Operating System Introduction to Computational Statistics STAT 598G, Fall 2011 Sergey Kirshner Department of Statistics, Purdue University September 7, 2011 Sergey Kirshner (Purdue University)
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationReview of Fundamentals
Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log
More informationCS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 2
CS 307: UNIX PROGRAMMING ENVIRONMENT KATAS FOR EXAM 2 Prof. Michael J. Reale Fall 2014 COMMAND KATA 7: VARIABLES Command Kata 7: Preparation First, go to ~/cs307 cd ~/cs307 Make directory dkata7 and go
More informationSIEMENS UserAdmin Workshop TELEPERM XP Version 4 Chapter 1
1 UNIX... 1-2 1.1 USER-ENVIRONMENT... 1-2 1.1.1 User-environment... 1-3 1.1.2 Basic commands... 1-3 1.1.3 SCO Unix specific commands... 1-4 1.1.4 HP Unix specific commands... 1-4 1.2 FILE SYSTEM... 1-5
More informationFiles and Directories
CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on
More informationIntroduction to Linux Basics Part II. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala
Introduction to Linux Basics Part II 1 Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala pakala@uga.edu 2 Variables in Shell HOW DOES LINUX WORK? Shell Arithmetic I/O and
More informationVirtual Machine. Linux flavor : Debian. Everything (except slides) preinstalled for you. https://www.virtualbox.org/
Virtual Machine Anyone have problems installing it? VM: Virtual Box - allows you to run a different operating system within the current operating system of your machine. https://www.virtualbox.org/ Linux
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationCS246 Spring14 Programming Paradigm Notes on Linux
1 Unix History 1965: Researchers from Bell Labs and other organizations begin work on Multics, a state-of-the-art interactive, multi-user operating system. 1969: Bell Labs researchers, losing hope for
More informationFREEENGINEER.ORG. 1 of 6 11/5/15 8:31 PM. Learn UNIX in 10 minutes. Version 1.3. Preface
FREEENGINEER.ORG Learn UNIX in 10 minutes. Version 1.3 Preface This is something that I had given out to students (CAD user training) in years past. The purpose was to have on one page the basics commands
More informationSelf-test Linux/UNIX fundamentals
Self-test Linux/UNIX fundamentals Document: e0829test.fm 16 January 2018 ABIS Training & Consulting Diestsevest 32 / 4b B-3000 Leuven Belgium TRAINING & CONSULTING INTRODUCTION TO THE SELF-TEST LINUX/UNIX
More informationRH033 Red Hat Linux Essentials
RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to
More informationWhat is the Shell. Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell.
What is the Shell Whenever you login to a Unix system you are placed in a program called the shell. All of your work is done within the shell. The shell is your interface to the operating system. It acts
More informationCSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80
CSE 303 Lecture 2 Introduction to bash shell read Linux Pocket Guide pp. 37-46, 58-59, 60, 65-70, 71-72, 77-80 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Unix file system structure
More informationEECS2301. Lab 1 Winter 2016
EECS2301 Lab 1 Winter 2016 Lab Objectives In this lab, you will be introduced to the Linux operating system. The basic commands will be presented in this lab. By the end of you alb, you will be asked to
More informationUsing LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)
Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers
More informationShell Programming Systems Skills in C and Unix
Shell Programming 15-123 Systems Skills in C and Unix The Shell A command line interpreter that provides the interface to Unix OS. What Shell are we on? echo $SHELL Most unix systems have Bourne shell
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationUnix as a Platform Exercises + Solutions. Course Code: OS 01 UNXPLAT
Unix as a Platform Exercises + Solutions Course Code: OS 01 UNXPLAT Working with Unix Most if not all of these will require some investigation in the man pages. That's the idea, to get them used to looking
More informationShells. A shell is a command line interpreter that is the interface between the user and the OS. The shell:
Shells A shell is a command line interpreter that is the interface between the user and the OS. The shell: analyzes each command determines what actions are to be performed performs the actions Example:
More informationCSC209H Lecture 1. Dan Zingaro. January 7, 2015
CSC209H Lecture 1 Dan Zingaro January 7, 2015 Welcome! Welcome to CSC209 Comments or questions during class? Let me know! Topics: shell and Unix, pipes and filters, C programming, processes, system calls,
More informationAssignment clarifications
Assignment clarifications How many errors to print? at most 1 per token. Interpretation of white space in { } treat as a valid extension, involving white space characters. Assignment FAQs have been updated.
More informationCSCI 2132 Software Development. Lecture 3: Unix Shells and Other Basic Concepts
CSCI 2132 Software Development Lecture 3: Unix Shells and Other Basic Concepts Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 10-Sep-2018 (3) CSCI 2132 1 Introduction to UNIX
More informationReview of Fundamentals. Todd Kelley CST8207 Todd Kelley 1
Review of Fundamentals Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 GPL the shell SSH (secure shell) the Course Linux Server RTFM vi general shell review 2 These notes are available on
More informationCommon UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface
Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,
More information