In many ways, directories are treated like files. They can be created, deleted, moved and copied from Nautilus or from a shell prompt, using commands similar to those for files.
Creating Directories
You must have write permissions in a directory in order to create a new sub-directory. Most users have these permissions in their home directory (and its sub-directories) and the /tmp/ directory.
To create a new directory with Nautilus, navigate to the location of your new directory. Right-click in a blank portion of the window and select Create Folder. A new folder icon appears with the highlighted text untitled folder. Type a name for your folder and press [Enter].
To create a new directory using a shell prompt, use the command mkdir. Enter: mkdir <directory-name>, replacing <directory-name> with the intended title of the new directory.
Deleting Directories
To delete a directory from Nautilus, right click on it and choose Move to Trash, or click and drag the icon to the Trash on the Desktop.
To delete an empty directory from a shell prompt, enter the command rmdir. To delete a directory that may not be empty (and consequently everything inside that directory), enter the command rm -rf <directory>. Refer to Section 4.5.5 Delete files with rm for more information regarding the rm command.
Dot Directories
Applications create "dot" directories as well as dot files. Dot files are a single hidden configuration file — a dot directory is a hidden directory of configuration and other files required by the application. The non-configuration files in these directories are generally user-specific, and will be available only to the user who installed them.
This presentation has been created for Red Hat System Administration I (RH124) training course conducted at Cybergate. This will help every one who wish to update their knowledge on Linux user management.
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
This presentation has been created for Red Hat System Administration I (RH124) training course conducted at Cybergate. This will help every one who wish to update their knowledge on Linux user management.
Introduction to users and groups in Linux. We will explore how to set user expiry information and force user password change after certain period of time. We will be also providing different permission to users and groups and restricting users and groups operations using sudoers file
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
These slides were presented by Dan Gillean at the first ever AtoM Camp, held at the SFU Harbour Centre in Vancouver, BC, Canada, March 20-22, 2017. For more information on the Camp, see:
https://wiki.accesstomemory.org/Community/Camps/SFU2017
These slides introduce participants to basic commands in the linux/unix command-line interface, for navigation and basic tasks such as reading, creating, deleting, and moving files. The slides were intended as an initial introduction for archivists unfamiliar with using the command-line, prior to teaching them about the command-line tasks available in Access to Memory (AtoM), which can be used for maintenance and troubleshooting.
Here, you can learn all information about Shell Script.
1. What is Shell Script?
2. Types of Shell Script.
3. Use of Shell Script.
4. Command line of Shell Script.
5. Example of Shell Script.
It is a Unix like operating system.
It can run on 32 bit and 64 bit hardware.
Linux OS, is a freely distributable, cross-platform
Supports multiple processors.
True multi-tasking, multi-user OS.
Following are some of the important features of Linux Operating System.
Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform.
Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving.
Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time.
Multiprogramming - Linux is a multiprogramming system means multiple applications can run at same time.
Hierarchical File System - Linux provides a standard file structure in which system files/ user files are arranged.
Shell - Linux provides a special interpreter program which can be used to execute commands of the operating system. It can be used to do various types of operations, call application programs etc.
Security - Linux provides user security using authentication features like password protection/ controlled access to specific files/ encryption of data.
This presentation examines the way files are stored in Linux following the File System Hierarchy. It also addresses the recent proposals by Fedora to change this to merge bin directories.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
These slides were presented by Dan Gillean at the first ever AtoM Camp, held at the SFU Harbour Centre in Vancouver, BC, Canada, March 20-22, 2017. For more information on the Camp, see:
https://wiki.accesstomemory.org/Community/Camps/SFU2017
These slides introduce participants to basic commands in the linux/unix command-line interface, for navigation and basic tasks such as reading, creating, deleting, and moving files. The slides were intended as an initial introduction for archivists unfamiliar with using the command-line, prior to teaching them about the command-line tasks available in Access to Memory (AtoM), which can be used for maintenance and troubleshooting.
Here, you can learn all information about Shell Script.
1. What is Shell Script?
2. Types of Shell Script.
3. Use of Shell Script.
4. Command line of Shell Script.
5. Example of Shell Script.
It is a Unix like operating system.
It can run on 32 bit and 64 bit hardware.
Linux OS, is a freely distributable, cross-platform
Supports multiple processors.
True multi-tasking, multi-user OS.
Following are some of the important features of Linux Operating System.
Portable - Portability means softwares can works on different types of hardwares in same way.Linux kernel and application programs supports their installation on any kind of hardware platform.
Open Source - Linux source code is freely available and it is community based development project. Multiple teams works in collaboration to enhance the capability of Linux operating system and it is continuously evolving.
Multi-User - Linux is a multiuser system means multiple users can access system resources like memory/ ram/ application programs at same time.
Multiprogramming - Linux is a multiprogramming system means multiple applications can run at same time.
Hierarchical File System - Linux provides a standard file structure in which system files/ user files are arranged.
Shell - Linux provides a special interpreter program which can be used to execute commands of the operating system. It can be used to do various types of operations, call application programs etc.
Security - Linux provides user security using authentication features like password protection/ controlled access to specific files/ encryption of data.
This presentation examines the way files are stored in Linux following the File System Hierarchy. It also addresses the recent proposals by Fedora to change this to merge bin directories.
Most file systems have methods to assign permissions or access rights to specific users and groups of users.
These system control the ability of the users to view, change, navigate, and execute the contents of the file system.
Permissions on the linux- systems are managed in three distinct scopes or classes. Theses scopes are known as users, groups or others.
Introduction to command line tools for *NIX (UNIX (like OS X and Solaris/SunOS), BSD, & GNU/Linux) environments. I made this presentation originally for the LUG@UCF when I was an undergrad but still contains valid information. Hope you find it useful.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
1. Chapter three
Managing Files and Directories
Prepare by zkre S Saleh
This chapter explores the general format of your Red Hat Enterprise
Linux system. It bridges the differences between using Nautilus to
manage the files on your system and using a shell prompt to manage
them. It does not go into the minute details of using a shell prompt;
those will be covered in Chapter 4 Shell Prompt Basics. This chapter
orients you to the system as a whole, and then you can choose which
method of management you prefer.
2. File System Terms
extension
An extension is that part of a filename that is found after the final ".". In the
filename foo.txt ".txt" is the le's extension. Extensions are used to indicate le
type.
path
A path is the string of directories and sub-directories you would have to navigate
through in order to reach a given location in the le system.
3. File System Terms
root access
To have root access means to be logged in using the root account. This can be
done from the main login screen, a shell prompt, or any application that requires
your root password. Root access means that the user has permission to do
anything on the system, so use root access with care.
root directory
The root directory is the top-most directory of the le system. All other les and
directories exist in this directory or one of its sub-directories. Do not confuse the
root directory, /, with root's home directory, /root/.
4. A Larger Picture of the File System
Every operating system has a method of storing data in files and directories so
that it can keep track
of additions, modifications, and other changes. In Red Hat Enterprise Linux,
every file is stored in
a directory. Directories can also contain directories: these subdirectories may
also contain files and
other subdirectories. You might think of the le system as a tree and
directories as branches.
away the directories branch, everything is connected to the root directory,
which is represented as a
singe forward slash (/).
8. Managing Files
File Types
Compressed and Archived Files
.bz2. a file compressed with bzip2
.gz. a file compressed with gzip
. .tar. a file archived with tar (short for tape
archive), also known as a tar file
. .tbz or .tar.bz. a tarred and bzipped le
. .tgz or .tar.gz. a tarred and gzipped le
. .zip.a le compressed with ZIP compression,
commonly found in MS-DOS applications; most
compressed les for Linux use the gzip
compression, so nding a .zip archive for Linux
les is
rare
9. Managing Files
File Types
File Formats
.au. an audio le
.gif. a GIF image le (short for Graphics Interchange
Format)
.html or .htm. an HTML le (short for Hyper Text
Markup Language)
.jpg. a JPEG image le (short for Joint Photographic
Experts Group)
.pdf. an electronic image of a document; PDF stands for
Portable Document Format
.png. a PNG image le (short for Portable Network
Graphic)
.ps. a PostScript file; formatted for printing
.txt. a plain ASCII text file
.wav. an audio le
.xpm. an image le (short for X Pixelmap)
10. Managing Files
File Types
Programming and Scripting Files
.c . a C program language source code le
.cpp . a C++ program language source
code le
.h . a C or C++ program language header le
.o . a program object le
.pl . a Perl script
.py. a Python script
.so . a library file
.sh. a shell script
.tcl . a TCL script
12. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File Names
Files with Multiple Extensions
13. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File Names
Files with Multiple Extensions
14. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File Names
Files with Multiple Extensions
Files whose name begins with a ".", called "dot" files, are
hidden files. These files can be viewed in both graphical file
managers like Nautilus and from the shell prompt, but require
an extra step to reveal them. command ls –al used for view
the hidden files in your home directory,
How to make hidden file or
folder ?
Touch .extension
Mkdir .extension
15. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File Names
Files with Multiple Extensions
While Linux allows file names with spaces in them,
manipulating these files from a shell prompt can be
quite cumbersome.
16. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File
Names
Files with Multiple Extensions
It is possible to use punctuation marks in your file
names. However, be aware that these special characters
have special meaning to the shell and may cause errors
at a shell prompt. It is generally recommended that you
avoid using special characters in file names for this
reason. If you choose to use file names with special
characters, use quotes around the file names when
manipulating them from a shell prompt.
You cannot use a "/" — this indicates a directory.
17. Managing Files
Naming Conventions
Dot Files
Using Spaces in File Names
Using Symbols in File
Names
Files with Multiple Extensions
18. File Compression and Archiving
File Compression and Archiving
It is useful to store a group of files in one file for easy backup, for
transfer to another directory, or for transfer to another computer. It
is also useful to compress large files; compressed files take up less
disk space and download faster via the Internet.
It is important to understand the distinction between an archive file
and a compressed file. An archive file is a collection of files and
directories stored in one file. The archive file is not compressed —
it uses the same amount of disk space as all the individual files and
directories combined. A compressed file is a collection of files and
directories that are stored in one file and stored in a way that uses
less disk space than all the individual files and directories
combined. If disk space is a concern, compress rarely-used files, or
place all such files in a single archive file and compress it.
19. File Compression and Archiving with
GUI
Applications >> accessories >> archive manager
21. File Compression and Archiving
Shell prompt
Bzip2 and Bunzip2
bzip2 filename. extinction
bunzip2 filename.ext.bz2
22. File Compression and Archiving
Shell prompt
gzip2 and gunzip2
Gzip filename. extinction
Gunzip filename.ext.gz
23. File Compression and Archiving
Shell prompt
Zip unzip
To compress a file with zip, enter the following command: zip -r
filename.zip filesdir
The -r option specifies that you want to include all files
contained in the filesdir directory recursively.
Zip –r filename.zip collection items
Zip –r z.zip a b s q.png
24. File Compression and Archiving
Tar
Tar –cvf coll.tar 1 2 3 4 5 6 dirA dirB dirC
Filename for
archiving
25. File Compression and Archiving
List Content of tar Archive File
Tar –tvf coll.tar
Add Files or Directories to tar Archive File
Tar –rvf coll.tar 1 2 3 4 5 6
Check the Size of the tar, tar.gz and tar.bz2 Archive File
Tar –czf – coll.tar | wc -c
26. File Compression and Archiving
Tar
Compression and Archiving
z.Tar >>>> z.tar.gz
Gzip z.tar
27. Managing Files and Directories
Creating Directories
Deleting Directories
Dot Directories .
Right-click on Desktop
select Create Folder
Change name with you want
To create a new directory using a shell prompt, use the
command mkdir. Enter: mkdir
28. Managing Files and Directories
Creating Directories
Deleting Directories
Dot Directories .
right click on it and choose Move to Trash, or click and drag
the icon to the Trash on the Desktop.
To delete an empty directory from a shell prompt, enter the
command rmdir.
To delete a directory that may not be empty (and consequently
everything inside that directory), enter the command rm - rf
<directory>.