This document summarizes Mr. Cantlie's upcoming climb of Mt. Kilimanjaro to raise funds for BC Children's Hospital. It provides background on Summits of Hope, an organization that raises money for the hospital through climbing expeditions. It outlines Mr. Cantlie's goals for the climb, fundraising efforts, and ways for students to follow and support his journey up Kilimanjaro.
Erica Campbell Byrum at Landlord WEBCON 2014LandlordWebCon
This document discusses strategies for integrating social media, such as Pinterest, Instagram, and Twitter, into an overall marketing plan. It provides tips for using each platform effectively including creating boards and pins on Pinterest to showcase listings and local areas, using hashtags and cross-promoting on Instagram to share photos of properties and lifestyle images, and engaging followers by crowdsourcing content. The goal is to generate social signals that can improve search engine optimization rankings and grow followers across networks.
The process of the making of my music magazineozgealtinok
The author created a music magazine by following conventions like using a shot list. They featured top hip hop and R&B artists on the cover to appeal to many readers. Through experimenting with colors, fonts, and layouts in Photoshop, the author found the best design for the magazine. Peer feedback helped improve the product by blending a model's cheek for a better look. A questionnaire provided ideas for articles by learning what topics the target audience wanted to read about their favorite artists.
Intervento dell'ASL del VCO Convegno Acqua PremiaMassimo Falsaci
Acqua, gestione di piscine, centri benessere, strutture ricettive e ricreative - Convegno promosso del Centro Servizi Lapideo il 21 marzo alle Terme di Premia
The document summarizes Taylor Faulring's work log for building a 5 string bluegrass banjo over multiple dates. Some of the key activities included: widening tuning peg holes on the neck, sanding and staining the neck and resonator, installing brackets and tension hoop to construct the banjo pot, and applying a second coat of stain to the neck and resonator. Comments provided suggestions such as being careful when drilling or sanding to avoid damage, and ensuring even application of stain.
Final data collection webinar highlights & remindersprogroup
This document provides guidance and reminders for collecting data through the GASPS (Georgia Student Health Survey-Secondary School Survey) program. It outlines best practices for recruiting participants, obtaining consent, administering paper and online surveys, tracking data, and collecting additional community data on alcohol availability, promotion, and enforcement. Providers are encouraged to customize the slide template with their own data collection plans and timelines. The document stresses following protocols, collecting a diverse sample, and documenting any challenges in meeting sample size goals.
The document outlines the agenda for a July 2012 regional meeting. It includes welcoming remarks and introductions, a report out from the community on data collection, an overview and discussion of Phase 5 documents led by Amber and Tiffiany, an MDS presentation by Amber, announcements about upcoming trainings and awareness campaigns from Amber, an update on the Google calendar by Tiffiany, and time for questions and information sharing. The next meeting is scheduled for August 9th at 2pm.
The Millennial Shift: Financial Services and the Digial Generation Study PreviewCorporate Insight
With 80 million members, the Millennial generation is the largest in the history of the United States. The group's size, coupled with its increasing spending power and social influence, means that Millennials are a huge potential market for financial services firms. However, Millennials' skeptical view of financial institutions and unique digital preferences pose a clear challenge to the industry's traditional marketing strategies and business models.
CI's new study, The Millennial Shift: Financial Services and the Digital Generation will help financial services marketers, product managers and strategists to better understand Millennials and identify effective tactics for serving this demographic. Download the study preview now!
Five Questions the Study Will Address
#1 How do Millennial attitudes/behaviors differ from those of earlier generations?
#2 What financial product features do Millennials value?
#3 Which financial services firms seem to be effectively targeting this group and why?
#4 What are the most effective ways to use technology to market to and serve these consumers?
#5 How can financial firms use education, gamification, social media and other innovations to connect with Millennials?
The document provides information about the Sony Cybershot DSC T500 digital camera. It includes specifications such as a 10.1 megapixel CCD sensor, 5x optical and 10x digital zoom, 3.5 inch LCD display, and features like face detection and red eye reduction. The camera runs on a lithium ion battery and stores photos on Memory Stick Duo cards. It has a list price of Rs. 14,899 but is available from some sellers for less.
#weightloss 2014 vs Old School #DietingCindy McAsey
This document summarizes the Shaklee 180 weight loss program. It promotes the program's high-nutrient calorie controlled meal replacements that help lose weight while preserving muscle mass unlike traditional dieting. Meal replacements include shakes and bars, with 1 prepared meal and 1-2 snacks per day. The program costs $9 per day which is lower than competitors, and offers additional benefits through a free app and membership program.
The article discusses the Visian ICL V4c, a new generation of implantable collamer lens (ICL) developed by STAAR Surgical. Key points:
1) The V4c features a central 0.36mm hole called the KS-Aquaport that allows natural aqueous flow without the need for additional peripheral iridotomies.
2) Computer simulations and a clinical case study found that the V4c provided visual results comparable to older ICL models, while eliminating the need for an additional surgical step.
3) By removing the need for iridotomies, the V4c creates a more convenient experience for both patients and surgeons, addressing a potential
It's a fact, finding a legitimate work at home job is tough - but not impossible. Scams are everywhere and innocent people get scammed every day. This slide show contains 12 solid tips for avoiding work at home scams and information on 7 common scams that you should look out for.
This document summarizes Mr. Cantlie's upcoming climb of Mt. Kilimanjaro to raise funds for BC Children's Hospital. It provides background on Summits of Hope, an organization that raises money for the hospital through climbing expeditions. It outlines Mr. Cantlie's goals for the climb, fundraising efforts, and ways for students to follow and support his journey up Kilimanjaro.
Erica Campbell Byrum at Landlord WEBCON 2014LandlordWebCon
This document discusses strategies for integrating social media, such as Pinterest, Instagram, and Twitter, into an overall marketing plan. It provides tips for using each platform effectively including creating boards and pins on Pinterest to showcase listings and local areas, using hashtags and cross-promoting on Instagram to share photos of properties and lifestyle images, and engaging followers by crowdsourcing content. The goal is to generate social signals that can improve search engine optimization rankings and grow followers across networks.
The process of the making of my music magazineozgealtinok
The author created a music magazine by following conventions like using a shot list. They featured top hip hop and R&B artists on the cover to appeal to many readers. Through experimenting with colors, fonts, and layouts in Photoshop, the author found the best design for the magazine. Peer feedback helped improve the product by blending a model's cheek for a better look. A questionnaire provided ideas for articles by learning what topics the target audience wanted to read about their favorite artists.
Intervento dell'ASL del VCO Convegno Acqua PremiaMassimo Falsaci
Acqua, gestione di piscine, centri benessere, strutture ricettive e ricreative - Convegno promosso del Centro Servizi Lapideo il 21 marzo alle Terme di Premia
The document summarizes Taylor Faulring's work log for building a 5 string bluegrass banjo over multiple dates. Some of the key activities included: widening tuning peg holes on the neck, sanding and staining the neck and resonator, installing brackets and tension hoop to construct the banjo pot, and applying a second coat of stain to the neck and resonator. Comments provided suggestions such as being careful when drilling or sanding to avoid damage, and ensuring even application of stain.
Final data collection webinar highlights & remindersprogroup
This document provides guidance and reminders for collecting data through the GASPS (Georgia Student Health Survey-Secondary School Survey) program. It outlines best practices for recruiting participants, obtaining consent, administering paper and online surveys, tracking data, and collecting additional community data on alcohol availability, promotion, and enforcement. Providers are encouraged to customize the slide template with their own data collection plans and timelines. The document stresses following protocols, collecting a diverse sample, and documenting any challenges in meeting sample size goals.
The document outlines the agenda for a July 2012 regional meeting. It includes welcoming remarks and introductions, a report out from the community on data collection, an overview and discussion of Phase 5 documents led by Amber and Tiffiany, an MDS presentation by Amber, announcements about upcoming trainings and awareness campaigns from Amber, an update on the Google calendar by Tiffiany, and time for questions and information sharing. The next meeting is scheduled for August 9th at 2pm.
The Millennial Shift: Financial Services and the Digial Generation Study PreviewCorporate Insight
With 80 million members, the Millennial generation is the largest in the history of the United States. The group's size, coupled with its increasing spending power and social influence, means that Millennials are a huge potential market for financial services firms. However, Millennials' skeptical view of financial institutions and unique digital preferences pose a clear challenge to the industry's traditional marketing strategies and business models.
CI's new study, The Millennial Shift: Financial Services and the Digital Generation will help financial services marketers, product managers and strategists to better understand Millennials and identify effective tactics for serving this demographic. Download the study preview now!
Five Questions the Study Will Address
#1 How do Millennial attitudes/behaviors differ from those of earlier generations?
#2 What financial product features do Millennials value?
#3 Which financial services firms seem to be effectively targeting this group and why?
#4 What are the most effective ways to use technology to market to and serve these consumers?
#5 How can financial firms use education, gamification, social media and other innovations to connect with Millennials?
The document provides information about the Sony Cybershot DSC T500 digital camera. It includes specifications such as a 10.1 megapixel CCD sensor, 5x optical and 10x digital zoom, 3.5 inch LCD display, and features like face detection and red eye reduction. The camera runs on a lithium ion battery and stores photos on Memory Stick Duo cards. It has a list price of Rs. 14,899 but is available from some sellers for less.
#weightloss 2014 vs Old School #DietingCindy McAsey
This document summarizes the Shaklee 180 weight loss program. It promotes the program's high-nutrient calorie controlled meal replacements that help lose weight while preserving muscle mass unlike traditional dieting. Meal replacements include shakes and bars, with 1 prepared meal and 1-2 snacks per day. The program costs $9 per day which is lower than competitors, and offers additional benefits through a free app and membership program.
The article discusses the Visian ICL V4c, a new generation of implantable collamer lens (ICL) developed by STAAR Surgical. Key points:
1) The V4c features a central 0.36mm hole called the KS-Aquaport that allows natural aqueous flow without the need for additional peripheral iridotomies.
2) Computer simulations and a clinical case study found that the V4c provided visual results comparable to older ICL models, while eliminating the need for an additional surgical step.
3) By removing the need for iridotomies, the V4c creates a more convenient experience for both patients and surgeons, addressing a potential
It's a fact, finding a legitimate work at home job is tough - but not impossible. Scams are everywhere and innocent people get scammed every day. This slide show contains 12 solid tips for avoiding work at home scams and information on 7 common scams that you should look out for.
Telshe Yeshiva - Teaching Future Generations in ClevelandLeib Tropper
The founder of the Kol Yaakov Torah Center, Rabbi Leib Tropper is a strong advocate of religious education. Rabbi Leib Tropper studied at several yeshivas, including Telshe Yeshiva in Cleveland, Ohio.
i-snapshot are excited to announce the success of our new version V5. With many customers already upgraded to this, we are seeing great results in terms of sales team effectiveness. V5 has greater functionality and added benefits, to make life easier for your field sales team.
1) Innovative works must be creative, but creative works do not necessarily have to be innovative. Creativity and practicality need to go hand in hand for works to be considered innovative.
2) For works to be considered innovative, three aspects must be considered together in a balanced manner.
3) A work's quality and impact increase together as its creativity increases.
Qadha dan Qadar (HU version)
Apakah hidup ini memaksa kita?Apakah hidup memaksa kita menjadi muslim?Apakah hidup memaksa kita jadi kafir?Apakah menjadi penghuni syurga atau neraka itu takdir?
Mô tả các dịch vụ mà hệ điều hành cung cấp cho người dùng, cho tiến trình và cho các hệ thống khác
Giải thích được cách mà lời gọi hệ thống được sử dụng để cung cấp dịch vụ hệ điều hành
Thảo luận về các cấu trúc khác nhau của hệ điều hành
Giải thích hệ điều hành được cài đặt, tùy biến như thế nào và quá trình khởi động của nó
Bộ điều khiển PLC SIMATIC S7-1200 của Siemens là một sự lựa chọn thông minh cho các giải pháp tự động hóa nhỏ gọn với các tùy chọn mở rộng truyền thông và các chức năng tương thích khác.
The document discusses how to programmatically make URL requests in Java. It covers using the URL and URLConnection classes to (1) parse URLs, (2) retrieve URL contents by opening connections or streams, and (3) get header information. It also provides examples of how to fake GET and POST form submissions by encoding parameters and sending requests via URLConnection.
Servlets are Java programs that run on a web server and generate dynamic web page content. Servlets receive HTTP requests and return HTTP responses. They provide an interface between web clients and web servers. Key points:
- Servlets run on web servers like Tomcat and handle HTTP requests/responses dynamically.
- They extend the HttpServlet class and implement doGet() and/or doPost() methods to process requests.
- Servlets can access request parameters, headers, cookies and generate HTML responses by setting headers and writing to the response.
- Servlets are configured in the web server and mapped to URLs to handle requests for those URLs dynamically.
Cookies allow servers to store and retrieve information on the client side. Servers send cookies in HTTP responses and browsers send the cookie back with subsequent requests. There are two main methods for managing sessions between clients and servers - using session cookies or URL rewriting. With session cookies, the server embeds a session ID in a cookie it sends to the client, and the client sends the cookie back on future requests to identify the session. With URL rewriting, the server encodes the session ID directly into the URLs of links and redirects. The session data itself is stored server-side and associated with the client via the session ID.
The document discusses cryptography functions like secret key encryption, public key encryption, and message digests. It also discusses security services like privacy, authentication, and integrity. Cryptography algorithms are used to provide these security services. Secret key encryption uses a single key for encryption and decryption while public key encryption uses separate public and private keys. Message digests are used to verify integrity through cryptographic checksums.
Remote Method Invocation (RMI) allows programmers to execute remote functions and calls using the same semantics as local function calls. RMI uses stubs and skeletons, where the stub acts as a proxy for the remote object on the client side and the skeleton receives the calls on the server side. To use RMI, an interface must be defined and implemented on the server, stub and skeleton classes are generated, the remote object is registered with an RMI registry, and then clients can look up and invoke methods on the remote object.
The document discusses Java Database Connectivity (JDBC) and how it allows Java code to execute SQL statements inside relational databases. It covers the JDBC API and how it provides a standard interface to different databases. It also discusses the JDBC-ODBC bridge which allows Java code to access databases via ODBC. The document provides an example of JDBC code to connect to a database, execute a query, and access the result set. It discusses using connection pooling and JNDI lookups in J2EE applications to connect to databases.
The JavaMail API allows Java applications to send and receive email. It includes core classes like Session, Message, Transport, and Store. A Session represents a mail session with an email server. Messages can be composed and sent using Transport, and email can be retrieved from mailboxes using Store and Folder classes. The API supports authentication, sending attachments, and receiving notifications about mail events.
TCP sockets allow for communication between applications over the internet. A server creates a ServerSocket to listen for incoming connections on a specific port. When a client connects, the server accepts the connection to get a Socket. Both client and server then obtain input and output streams from the Socket to send and receive data. The connection is closed once communication is complete. Multithreading allows servers to handle multiple clients concurrently by spawning a new thread for each connection.
1. TCP provides connection-oriented and reliable byte-stream communication between applications over IP networks. It uses flow control and congestion control to ensure reliable data delivery.
2. A TCP connection is established through a 3-way handshake where the client and server exchange SYN and ACK packets to synchronize sequence numbers and establish the connection.
3. Data is transferred in segments containing sequence numbers. ACKs confirm received segments and allow out-of-order delivery. Buffers store unacknowledged data.
4. Connections close through an orderly shutdown with FIN packets from each end acknowledging the other's end of data, followed by a TIME_WAIT state to detect lost ACKs.
The document discusses Java UDP sockets and networking. It explains how to use the InetAddress class to represent IP addresses, and the DatagramSocket and DatagramPacket classes to send and receive UDP datagrams. It provides code examples for both client and server implementations of UDP networking in Java using these classes.
This document provides an overview of using the Java Secure Socket Extension (JSSE) to enable secure socket communication in Java applications. It discusses key topics like the Java Cryptography Architecture (JCA), public-key cryptography, certificates, and the SSL/TLS handshake protocol. The goal of the tutorial is to provide instructions for configuring and using JSSE to encrypt client-server applications.
Java Server Faces (JSF) is a Java web development framework that provides reusable UI components and a component-based MVC architecture. Key aspects of JSF include:
- Clean separation of behavior and presentation using a component-based MVC model.
- Standard UI components and events tied to server-side code.
- Typical JSF applications include JavaBeans for state/behavior, event-driven development, and JSP view pages that reference a component tree.
The example JSF calculator application demonstrates:
1) Configuring the Faces servlet and managed beans.
2) Developing a model class and controller to mediate between the view and model.
3) Creating
Beans are commonly used to represent HTML form data. A bean class defines properties that correspond to form fields and get/set methods to access these properties. When a form is submitted, a bean is instantiated and its properties are set from the form data using setProperty. The bean properties can then be accessed as needed, such as to perform calculations or display the data on a response page. This follows the MVC pattern with the bean representing the model, the JSP pages representing the view, and a controller handling form submission and forwarding requests.
The document provides an overview of the Java Persistence API (JPA). It describes JPA as an API for managing Plain Old Java Objects (POJOs) and mapping their state and relationships to a relational database. It discusses key JPA concepts like entities, the entity manager, queries, object-relational mapping, and common annotations.
This document provides examples and explanations of different types of Enterprise JavaBeans (EJBs), including stateless session beans, stateful session beans, entity beans, and container-managed persistence. It describes the home and remote interfaces, bean classes, required bean methods, and example client code for each EJB type. It also discusses entity bean mappings, characteristics, and how they represent persistent data stored in a database. Finally, it briefly outlines the multitiered J2EE application model and database connection pooling techniques.
CORBA allows for cross-platform communication between software components. It uses an Object Request Broker (ORB) to connect client objects to server objects across a network. Interfaces are defined using the Interface Definition Language (IDL) and compiled to generate stubs and skeletons in various programming languages. Clients locate objects by querying a naming service, then call methods on remote objects using the stubs.
This document provides an introduction to AJAX and guides the reader through four steps to make a basic AJAX request: 1) Create an XMLHttpRequest object to make HTTP requests, 2) Set up the request and handle the response, 3) Make a simple request to an HTML file and display the response, 4) Make a request to an XML file and parse the response using DOM methods.
Enterprise JavaBeans (EJBs) are reusable software components that can represent either data (entity beans) or business logic (session beans). EJBs provide benefits like transaction management, security, and the ability to be deployed on application servers. There are different types of session beans, including stateful and stateless, and entity beans can use either bean-managed or container-managed persistence to access a database. To use an EJB, a client first locates its home interface using JNDI and then calls methods on the home interface to access the bean.
1. 1
HỆ ĐIỀU HÀNH LINUX
(Quản lý tiến trình)
Phạm Nguyên Khang, Đỗ Thanh Nghị
Email: pnkhang,dtnghi@cit.ctu.edu.vn
2. Nội dung
2
Tiến trình
Thực thi
Tạo tiến trình
Các hàm cơ bản khác
Thực thi chương trình ở chế độ nền
Liệt kê tiến trình
Các hàm quản lý tiến trình khác
3. Tiến trình
3
Tiến trình = chương trình đang thực thi
Ảnh bộ nhớ (memory image) bao gồm:
Text: mã thực thi của chương trình
Data: lưu trữ dữ liệu
Stack: ngăn xếp của người dùng
Định danh: phân biệt tiến trình với chương trình khác
Cấu trúc u (user: người dùng)
Ngăn xếp (stack) của hệ thống
Vùng định danh chỉ truy xuất được trong chế độ hệ
thống (system mode)
4. Thực thi
4
Điều khiển bằng tiến trình 0 (sched hoặc
swapper)
Tiến trình 0 (không) trong không gian hệ thống
Sử dụng CPU theo mức độ ưu tiên của tiến trình
Tiến trình thực thi trong chế độ người dùng (user
mode) và chuyển sang chế độ hệ thống bằng các hàm
đặc biệt của nhân
Chỉ có duy nhất một tiến trình chạy trong
không gian hệ thống: trình quản lý bộ nhớ
ảo (pagedaemon)
5. Tạo tiến trình
5
fork: Ví dụ: (viết bằng ngôn ngữ C)
Tạo ra một tiến trình con pid = fork();
bằng cách sao chép vùng if (pid == -1) {
nhớ của một tiến trình cha /*lỗi*/
} else if (pid == 0) {
Kết quả trả về: /*mã lệnh chương trình con*/
-1 thất bại } else {
/*mã lệnh chương trình cha */
0 tiến trình con }
N tiến trình cha với N
là PID (định danh)
của tiến trình cha
6. Các hàm cơ bản khác
6
exec:
Thay thế ảnh bộ nhớ bằng nội dung của một file thực thi khác
wait:
Chờ tất cả các tiến trình con kết thúc
exit:
Kết thúc một tiến trình
kill:
Gởi tín hiệu đến một tiến trình (thường dùng để đồng bộ các tiến trình
hoặc buộc một tiến trình kết thúc)
signal:
Chọn cách xử lý phải thực hiên khi nhận được một tín hiệu
pipe:
Tạo một ống dẫn để giao tiếp giữa hai tiến trình
7. Chế độ nền
7
Mặc định các tiến trình thực thi tuần tự (foreground), tiến trình này thực
hiện xong rồi mới đến tiến trình khác
Ví dụ: người dùng gõ lệnh date (hiển thị ngày hệ thống)
Shell tạo ra một tiến trình con (sử dụng hàm fork)
Chờ tiến trình con này kết thúc (dùng hàm wait)
Trong chương trình con gọi thực thi lệnh /bin/date (bằng lệnh exec)
Để thực thi một tiến trình ở chế độ nền (background) ta thêm dấu & vào
cuối lệnh
Ví dụ: người dùng gõ lệnh date&
Shell tạo ra một tiến trình con (fork)
Không chờ tiến trình con kết thúc
Tiến trình con gọi thực thi lệnh /bin/date (bằng lệnh exec)
Tiến trình cha và tiến trình con chạy song song
Có thể kế quả hiển thị bị lẫn lộn (vì sử dụng chung một màn hình)
8. Tạm dừng tiến trình
8
Các trạng thái của tiến trình
active (đang hoạt động), waiting (chờ), …
Trạng thái tạm dừng = tiến trình bị ngắt có khả năng
chạy lại bằng cách sử dụng lệnh
fg (chạy lại chương trình ở chế độ foreground)
bg (chạy lại chương trình ở chế độ background)
Tạm ngưng chương trình bằng cách gõ Ctrl + Z
Mục đích:
Thực thi một chương trình khác mà không cần phải kết thúc tiến
trình đang chạy
9. Liệt kê tiến trình
9
ps: Các OPTIONS
Liệt kê các tiến trình đang thực thi -a: hiển thị các tiến trình của user được
Hiển thị tất cả các thuộc tính của tiến liên kết tới tty
trình -e (-A): hiển thị tất cả các tiến trình
Mặc định chỉ liệt kê các tiến trình của -f: hiển thị PID của tiến trình cha và
người dùng thời điểm bắt đầu
Cú pháp: ps [OPTIONS] -l: tương tự như –f
Ví dụ: a: hiển thị các tiến trình của các users
ps liên kết tới tty
ps l x: hiển thị các tiến trình ngoại trừ các
ps aux (liệt kê tất cả các tiến trình) tiến trình là controlling tty (e.g
/sbin/mingetty tty*)
u: dạng hiển thị hướng đến người dùng
Ví dụ: ps –ux
10. Liệt kê tiến trình
10
Xem các tiến trình
Lệnh pstree với
-p: hiển thị PID
-h: highlight tiến trình hiện
hành và những tiến trình con
cháu của tiến trình hiện hành
10
11. Các lệnh khác
11
các thông số của hệ thống như: bộ nhớ sử dụng, % sử dụng CPU, ...
ang thực thi
11
12. Các lệnh khác
12
kill:
Gởi một tín hiệu đến một tiến trình
Cú pháp:
kill [-signal | -s signal] pid
Các signal
0 0
HUP 1 (hangup)
INT 2 (tương đương CTRL + C)
KILL 9 (buộc kết thúc)
TERM 15 (mặc định, kết thúc êm ái)
STOP 19 (tạm dừng, tương đương CTRL + Z)
Ví dụ:
kill -1 1234 (gởi tín hiệu HUP đến tiến trình 1234)
kill -s 9 3456 (gởi tín hiệu KILL đến tiến trình 3456, buộc tiến trình
này kết thúc)
kill -l liệt kê tất cả các tín hiệu
id = -1 có nghĩa tất cả các tiến trình trừ tiến trình kill và tiến trình init
13. Các lệnh khác
13
Tránh HUP: nohup
Tiến trình nhận tín hiệu HUP khi người dùng logout
khỏi session
Sử dụng nohup để bỏ qua tín hiệu HUP
Ví dụ: nohup find / –name log.txt&
14. Các lệnh khác
14
jobs:
Liệt kê tất cả các job gồm
Tiến trình thực thi chế độ nền
Tiến trình tạm ngưng
Tiến trình bị ngẽn (chờ vào/ra)
Chú ý: mỗi job có một số hiệu của job (khác với định danh của tiến trình)
Các lệnh bg, fg, kill cũng có thể làm việc được với số hiệu job thay vì pid.
Để sử dụng số hiệu job ta dùng %<số hiệu job>
nice:
Chạy chương trình với một độ ưu tiên nào đó
Cú pháp: nice –n <độ ưu tiên> <chương trình>
Độ ưu tiên từ -20 (ưu tiên cao nhất) đến 19 (ưu tiên thấp nhất). Độ ưu
tiên mặc định = 0.
Ví dụ: nice -n 12 xcalc
15. Các lệnh khác
15
renice:
Thay đổi độ ưu tiên của một tiến trình
Cú pháp: renice -n <độ ưu tiên> -p <pid>
Hoặc: renice <độ ưu tiên> <pid>
Ví dụ: renice 1 4567
Chú ý: người dùng bình thường không thể thay đổi độ
ưu tiên nhỏ hơn 0 (không).