Is usually each of the subsequent an absolute pathname, a relative pathname, or a basic filename? a) Mile_co b) Correspond/business/milk_co c) /home/max d) /home/max/literature/promo e).. f) Letter. 0210 2 . List the commands you should use to perform these operations: a. Make your home listing the working directory site b. Identify the working directory site a. disc; b. pwd 3. If your working index is /home/alex with a subdirectory named materials, give three sets of commands that you can use to create a subdirectory named timeless classics under literature.
Also give several sets of commands you should use to remove the classics index and its contents. 4. The df electricity displays all mounted filesystems along with information about each. Use the df utility while using “h (human-readable) option to response the following concerns. $ df -h Filesystem Size Applied Avail Use% Mounted on /dev/hda1 1 . 4G 242M 1 . 1G 18% / /dev/hda3 23M 11M 10M 51% /boot /dev/hda4 1 . 5G 1 . 2G 222M 85% /home /dev/hda7 564M 17M 518M 4% /tmp dev/hdc1 984M 92M 842M 10% /gc1 /dev/hdc2 16G 13G 1 .
9G??? /gc2 a. How many filesystems will be mounted on your Linux program? b. Which will filesystem shops your home directory? c. Assuming that your reply to exercise 4a is two or more, attempt to produce a hard hyperlink to a file in another filesystem. What problem message will you get? What goes on when you make an attempt to create a representational link to the file instead? Following happen to be sample answers to these inquiries.
Your answers will be different because your filesystems will vary.. six; n. /dev/hda4; c. ln: creating hard website link ‘/tmp/xxx’ to ‘xxx’: Invalid cross-device hyperlink. No problem making a cross-device emblematic link. 2 Answers to Even-Numbered Exercises 5. Guess that you have folders that is linked to a file possessed by another user. How can you ensure that changes to the record are no longer distributed? 6. You need to have read agreement for the /etc/passwd file. To answer the following questions, employ cat or less to display /etc/passwd. Glance at the fields of information in /etc/passwd for you on your program.. Which figure is used to separate your lives fields in /etc/passwd? m. How a large number of fields are used to describe every single user? c. How various users are recorded your system? d. How a number of login shells are in use on your program? (Hint: Look at the last field. ) at the. The second discipline of /etc/passwd stores consumer passwords in encoded form. If the password field includes an x, your system uses shadow accounts and retailers the encoded passwords somewhere else.
one particular