Basic of and Unix and Command. More presentation you can find on www.scmGalaxy.com.
scmGalaxy.com is dedicated to software configuration, build and Release management. This covers CVS, VSS (Visual Source Safe),Perforce, SVN(Subversion) MKS Integrity, ClearCase,TFS,CM Synergy, Best Practices ,AnthillPro, Apache Ant, Maven, Bamboo, Cruise Control and many more tools.
Shell: A Command-Line Interpretor that connects a user to Operating System and allows to execute the commands or by creating text script.
Process: Any task that a user run in the system is called a process. A process is little more complex than just a task.
File: It resides on hard disk (hdd) and contains data owned by a user.
X-windows aka windows: A mode of Linux where screen (monitor) can be split in small “parts” called windows, that allow a user to do several things at the same time and/or switch from one task to another easily and view graphics in a nice way.
Text terminal: A monitor that has only the capability of displaying text stuff, no graphics or a very basic graphics display.
Session: Time between logging on and logging out of the system.
Basic of and Unix and Command. More presentation you can find on www.scmGalaxy.com.
scmGalaxy.com is dedicated to software configuration, build and Release management. This covers CVS, VSS (Visual Source Safe),Perforce, SVN(Subversion) MKS Integrity, ClearCase,TFS,CM Synergy, Best Practices ,AnthillPro, Apache Ant, Maven, Bamboo, Cruise Control and many more tools.
Shell: A Command-Line Interpretor that connects a user to Operating System and allows to execute the commands or by creating text script.
Process: Any task that a user run in the system is called a process. A process is little more complex than just a task.
File: It resides on hard disk (hdd) and contains data owned by a user.
X-windows aka windows: A mode of Linux where screen (monitor) can be split in small “parts” called windows, that allow a user to do several things at the same time and/or switch from one task to another easily and view graphics in a nice way.
Text terminal: A monitor that has only the capability of displaying text stuff, no graphics or a very basic graphics display.
Session: Time between logging on and logging out of the system.
Présentation aux Geeks Anonymes Liège par Cyril Soldani, le 13 décembre 2017.
Page des Geeks Anonymes : https://www.recherche.uliege.be/cms/c_9463913/fr/geeks-anonymes
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
Here, you can learn all information about Shell Script.
1. What is Shell Script?
2. Types of Shell Script.
3. Use of Shell Script.
4. Command line of Shell Script.
5. Example of Shell Script.
Getting started with setting up embedded platform requires audience to understand some of the key aspects of Linux. This presentation deals with basics of Linux as an OS, Linux commands, vi editor, Shell features like redirection, pipes and shell scripting
Unix , Linux Commands
Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language.
QSpiders - Selenium Webdriver Syllabus to meet growing skill demands of the current job market. Here is all new Selenium WebDriver course covering concepts from basics to advance test automation.
Présentation aux Geeks Anonymes Liège par Cyril Soldani, le 13 décembre 2017.
Page des Geeks Anonymes : https://www.recherche.uliege.be/cms/c_9463913/fr/geeks-anonymes
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
Here, you can learn all information about Shell Script.
1. What is Shell Script?
2. Types of Shell Script.
3. Use of Shell Script.
4. Command line of Shell Script.
5. Example of Shell Script.
Getting started with setting up embedded platform requires audience to understand some of the key aspects of Linux. This presentation deals with basics of Linux as an OS, Linux commands, vi editor, Shell features like redirection, pipes and shell scripting
Unix , Linux Commands
Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language.
QSpiders - Selenium Webdriver Syllabus to meet growing skill demands of the current job market. Here is all new Selenium WebDriver course covering concepts from basics to advance test automation.
This slide explores the basics of UNIX operating system - What's UNIX? What are different types of UNIX OS? What is difference between UNIX and Linux? and much more..
Practical Example of grep command in unixJavin Paul
Grep command is one of most useful command in unix. having mastery in Grep and find means your productivity will be very high in unix. these grep command tutorials contains some examples of grep command in unix. It teaches how to leverage power of grep command in unix or linux. This presentation contains some of most useful example of grep command in unix.
for more tutorial see my blog
http://javarevisited.blogspot.com/2011/03/10-find-command-in-unix-examples-basic.html
http://javarevisited.blogspot.com/2011/06/10-examples-of-grep-command-in-unix-and.html
What is data and information? What is data base? What is data base management system? What are various data base models??? Components of data base function of data base. Advantages of data base. And what is system language query???
Basic Data Management Concept
Organizing Data in a Database
Database Management Systems
Hi,
This presentation contains history of Unix operating system.
Kindly send me your comments to ankitmehta21@gmail.com so it will help me to improve future presentations.
Thanks,
Ankit Mehta
ankitmehta21@gmail.com
Interest Assignments
Partnership Assignments
Percentages Assignment
Profit and Loss
Assignments
Proportion Assignments
Set Theory Assignments
Time and Distance Assignments
Time and Work Assignments
Permutation Assignments
Allegation Assignments
AP,GP Assignments
Data is a useful information
Which helps to make a decision
Set of information of any entity is known as data
Databases support storage and manipulation of data
Controlling test runs can help you to identify and eliminate defects in your tests.
The Debug Viewer tabs can display the values of variables or objects in the main script of the current action or in a selected subroutine.
Synchronizing Your Test
Tests can be synchronized either of the ways
Synchronization point
Exist or Wait statements
Increase the default timeout settings
JDK stand for java development kit.
JVM stands for Java Virtual Machine.
JRE is the responsible unit to run the java program.
JIT stands for Just In Time compiler.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2. Introduction
• Operating System:
It acts as an interface between the user and
system.
a system that manages the resources of a
computer.
• Resources:
CPUs, Memory, I/O devices, Network etc..
4. Kernel
• Three major tasks of kernel:
Process Management
Device Management
File Management
5. Shell
The shell acts as an interface between
the user and the kernel
A shell is an environment in which we
can run our commands, it is also called
as a command-line interpreter
6. Basic Linux Commands
• File Handling
• Text Processing
• System Administration
• Process Management
• Archival
• Network
• File Systems
• Advanced Commands
7. Files
Everything in unix is considered as a file,
including the physical devices like flash
device, network cards etc..
Logical collection of files is called as file
system or Unix file system(UFS).
A UFS(unix file system) contains both inode
and contents of the file.
Every file as a unique number to identify, this
number is called as an inode number.
8. Files…..
We can classify files into 3
1. Ordinary Files
• Text File
• Binary File
2. Device Files
3. Directory Files / Special Files
9. Unix File Attributes
File Permissions
1. Read: ‘r’ If you have read permission of a file, you
can see the contents of the file.
2. Write: ‘w’ If you have write permission of a file,
you can change the file. This means you can add to
a file, or overwrite a file. You can empty a file.
3. Execute: ‘x’ If the file has execute permission, then
you can ask the operating system to run the file as
if it were a program. If it's a binary file/program,
you can execute it like any other program.
10. File Attribute…
1. File type/File Permissions
2. Link
3. Owner
4. Group
5. Size
6. Last Modified Time
7. File Name
NOTE: ‘ls –l’ command lists the files in
the directory along with their attributes.
11. 1. File type/ File permissions
The first field of ls –l command gives the details of file type
and file permission
This field as 10 characters.
_|_ _ _|_ _ _|_ _ _
FILE TYPE
FILE PERMISSIONS
1. FILE TYPE
the first character of the first field defines the type of the
file.
‘d’ – specifies that the file is a ‘directory file’ or a ‘special file’
‘-’ – spefies that a file is not a directory file.
12. File Permissions:
Unix has three categories of file permission.
_ _ _ | _ _ _ | _ _ _
r w x r w x r w x
USER (U)
GROUP (G)
OTHER (O)
U G O
13. To change file Permission
‘chmod’ command is used to change the permissions of
the file.
USAGE: chmod [options] mode[,mode] file1 [file2 ...]
Unix allows the user to specify modes in two ways.
1. Absolute
2. Relative
1. Absolute:
in this we use a series of 3 octal numbers to specify
the permission of a file.
Ex: chmod 501 demo.txt, chmod 777 demo.txt
15. RELATIVE
In this mode ‘=‘ , ‘+’, ‘-’ operators are used to
assign, give and remove permissions.
On the LHS specify the category u,g,o,a.
On the RHS specify the permission r,w,x.
Ex: chmod u+r demo.txt
chmod u+rw demo.txt
chmod ug+rwx demo.txt
chmod a+rwx demo.txt
chmod u+rw,g+x demo.txt
16. INODE
Is a data structure and it contains following details of the
file:
1. Mode/permission (protection)
2. Owner ID
3. Group ID
4. Size of file
5. Number of hard links to the file
6. Time last accessed
7. Time last modified
8. Time inode last modified
‘-i’ option along with ls command is used to see the
inode number of a file.
17. 2. Link
A link in UNIX is a pointer to a file. Like pointers in
any programming languages, links in UNIX are
pointers pointing to a file or a directory . Creating
links is a kind of shortcuts to access a file.
It is similar to creating multiple names of the file to
access from different directories.
The two different types of links in UNIX are:
1. Soft Links or Symbolic Links
2. Hard links
18. ln Command
This command is used to create link for a file.
USAGE: ln [option] target link_name
ex: ln file1 file2
‘-s’ option is used to provide a soft link.
USAGE: ln –s target_file Link_name
ex: ln –s file1 file3
19. Hard link
A hard link is an additional name for an existing file
on Unix-like operating systems. Any number of hard
links can be created for a file, and thus any number of
names, can be created for any file
The inode of the hard linked file remains same as the
original file.
On deleting the original file, hard linked file can still be
accessed.
By giving the hard link the link count of the file will
increase.
Hard links do not need any extra data memory to save
since it uses links
Can be created only on files, not on directories.
20. Soft/Symbolic Link
In computing, a symbolic link (soft link) is the nickname for
any file that contains a reference to another file or directory in
the form of an absolute or relative path and that affects
pathname resolution.
Soft link can be created for non exiting file.
oft link has a different inode number than the original file
On deleting the original file, soft link cannot be accessed.
Soft link needs extra memory to store the original file name as
its data.
Access to the file is slower due to the overhead to access file.
21. 3. Owner
Gives the name of the owner of the file.
We can change the owner of the file using the
command ‘chown’.
usage: chown owner file
22. 4.Group
Gives the name of the group a file belong to.
We can change the group of the file using the
command ‘chgrp’.
Usage: chgrp group file
23. Sources to learn commands??
(man)
λ
Primary – man(manual) pages.1
2
man <command> shows all information about the
command ex: man ls
<command> help shows the available options
for that command ex: ls help
24. File Handling
commands
•
•
mkdir – is used to create directories
Usage: mkdir [OPTION]
DIRECTORY...
ex: mkdir demo
ls – is used to list all the files and
subdirectories
of the current directory.
Usage: ls [OPTION]... [FILE]...
eg. ls, ls l, ls l demo
25. File
Handling(contd...)
• pwd - print name of current working directory
Usage: pwd
• cd change directories
Usage: cd [DIRECTORY]
eg. cd demo
Note: the Directory can be a relative or absolute path
of Directory
27. mv – this command is used to move a file
from one directory to another
It is also used to rename a file.
Usage: mv [OPTION]... SOURCE DEST
eg. mv source.txt target_dir
mv old.txt new.txt
rm remove files or directories
Usage: rm [OPTION]... FILE... eg. rm file1.txt , rm rf
some_dir
28. • find – search for files in a directory
hierarchy
Usage: find [OPTION] [path]
[action]
eg. 1. find file1.txt,
2. find name file1.txt
• history – prints recently used commands
Usage: history
29. TO create an USER
‘addusr’ command is used to create a user.
To create a new user the user should be logged
in as a rootuser.
usage: addusr user_name
30. TO switch User
‘su’ command is used to switch from one user to another
Usage: su User_name
It asks for the password to login.
‘exit’ command is used to come out of the logged in
user.
31. How to login as root ?
‘sudo su’ command is used to login as a root-user.
usage: sudo su
It will ask for the password.
The user should have permission to login as the root-user.
All the users having root permissions are stored in a file
‘visudo’.
32. To remove User
‘delusr’ command is used to delete a user.
usage: delusr user-name
You should be log-in as a root-user to delete an
user.
33. Basic Regular Expression
The BRE a{1,2} matches a{1,2} literally,
while a{1,2} matches a or aa.
As {,},+,?,(,),.. Are treated as a normal
symbols and we have to use a ‘’ to give
special meaning to them.
As ?,+,.. Are not supported by POSIX
(Portable Operating system Interface for Unix)
BRE.
We use grep command for BRE.
34. Extended Regular Expression
The quantifiers ?, +, {n}, {n,m} and {n,} repea
t the preceding token zero or once, once or
more, n times, between n and m times, and n or
more times, respectively.
These above quantifiers are supported by
POSIX ERE and we use egrep or grep –E
command.
35. Metacharacters
^ (Caret)=match expression at the start of a line, as in
^A.
$ (Dollar)=match expression at the end of a line, as in
A$.
(Back Slash)=turn off the special meaning of the next
character, as in ^.
[ ] (Brackets)=match any one of the enclosed characters,
as in [aeiou]. Use Hyphen "-" for a range, as in [0-9].
[^ ]=match any one character except those enclosed in
[ ], as in [^0-9].
36. . (Period)=match a single character of any
value, except end of line.
* (Asterisk)=match zero or more of the
preceding character or expression.
{x,y}=match x to y occurrences of the
preceding.
{x}=match exactly x occurrences of the
preceding.
{x,}=match x or more occurrences of
the preceding.
37. Searching for a pattern in UINIX
Unix has a special family of commands for handling
search requirements.
The main member of this family is the grep
command.
GREP: (Global Regular Expression Parser)
It scans its input for a pattern and displays lines
containing the pattern.
38. Examples
grep '^From: ' demo.txt
grep '[a-zA-Z]'{any line with at least one
letter}
grep '[^a-zA-Z0-9]{anything not a letter or
number}
grep '[0-9]{3}-[0-9]{4}'{999-9999, like
phone numbers}
grep '^.$'{lines with exactly one character}
39. grep '"smug"'{'smug' within double
quotes}
grep '"*smug"*'{'smug', with or without
quotes}
grep '^.'{any line that starts with a
Period "."}
grep '^.[a-z][a-z]'{line start with "." and
2 letters}