In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces "the arrangement of basic knowledge points of linux". In the daily operation, I believe that many people have doubts about the arrangement of basic knowledge points of linux. The editor consulted all kinds of materials and sorted out simple and easy-to-use methods of operation. I hope it will be helpful for you to answer the doubts of "arrangement of basic knowledge points of linux"! Next, please follow the editor to study!
1. In Linux systems, access the device as a file.
2.When the Linux kernel boots, read the file system to be loaded from the file / etc/fstab.
3. Each file in the Linux file system is identified by an I node.
4. All disk blocks are composed of four parts, namely, boot block, dedicated block, I-node table block and data storage block.
5. Links are divided into hard links and symbolic links.
6. Super blocks contain important file system information such as I node tables and free block tables.
7. The permission of a file is: drw-r--r--, represents the permission in numerical form, then the octal number is 644, and the file attribute is a directory.
8. The process started by the foreground is terminated using Ctrl+c.
9. When installing a Linux system to partition a hard disk, there must be two types of partitions: file system partitions and swap partitions.
10. The script file must be given execution permission before the written Shell program can be run.
11. One of the tasks of system management is to realize the security protection, backup, recovery and update of programs and data in a distributed environment.
twelve。 The system swap partition is an area that acts as a virtual memory of the system.
13. The kernel is divided into four subsystems: process management system, memory management system, Imax O management system and file management system.
14. Kernel configuration is an important operation for system administrators to change the hardware configuration of the system.
15. Each user is uniquely identified by the user ID and user name.
16. In the Linux system, all content is represented as files, and the various methods of organizing files are called file systems.
17. The vi editor has two working modes: command mode and input mode.
18. You can use the ls-al command to observe the permissions of a file. The permissions of each file are expressed in 10 bits and are divided into four segments, of which the first paragraph is 1 bit, indicating the file type, and the second paragraph is 3 bits, indicating the permissions of the file owner to the file.
19. The difference between a process and a program lies in its dynamic nature, dynamic generation and termination. The basic states that a process can have from generation to termination are: running state, ready state and waiting state (blocking state).
20. There are two types of backups on Linux systems: system backups and user backups. The former refers to the backup of the operating system, and the latter refers to the backup of applications and user files.
21. The file system type of CD-ROM standard is iso9660.
twenty-two。 When lilo.conf is configured to take effect, the command and parameter that should be run is lilo.
23. When using the ls command, the parameter-b should be used to display non-print characters in octal form.
24. The type of file system that Linux uses that supports Windows 9.x/2000 long filenames is vfat.
25. The command that sets the limit on disk space for users is quota.
In the Linux system, the directory used to store the configuration files and subdirectories needed by the system is / etc.
twenty-seven。 A hard connection can only establish a link to a file. Symbolic links can be created across different file systems.
twenty-eight。 The attribute bit of the socket file is s.
twenty-nine。 The command to end the background process is kill.
thirty。 There are two ways to run a process, that is, to run independently and to run using the parent process.
thirty-one。 Links is divided into hard links and symbolic links.
thirty-two。 To display all running processes in the Linux system under the superuser, the command and parameter that should be used is ps-aux.
thirty-three。 The attribute bit of the pipe file is p.
thirty-four。 The standard output of the previous command is used as the standard input of the latter command, which is called a pipeline.
thirty-five。 The command and argument that assigns execution authority to the script is chmod aquix filename.
thirty-six。 The command to log in remotely is telnet.
fifty-two。 On Linux systems, the command to compress a file and generate a .gz file with the suffix is gzip.
fifty-three。 When editing a file with vi, save the contents of the file into the test.txt file, and type: W test.txt in command mode.
54 the command and parameter that can display a full-year calendar on standard output is cal-y.
fifty-five。 In shell programming, the rule for using square brackets to indicate test conditions is that there must be spaces on both sides of the square brackets.
fifty-six。 Check whether the mounted file system / dev/had5 is normal, and if there is any error, it will be repaired automatically, and its command and parameter is fsck-a / dev/had5.
fifty-seven。 One tool for sharing user directories in Unix/Linux in a Windows9.x environment is the Samba server.
fifty-eight。 The duties of the system administrator are system resource management, system performance management, equipment management, security management and system performance monitoring.
sixty。 Under the Linux system, the hard disk (slave disk) of the second IDE channel is identified as hdb.
sixty-one。 When the system administrator needs to upgrade the kernel version and change the system hardware configuration, the kernel should be recompiled.
sixty-two。 If you just want to change the IP address of the system, modify the / etc/rc.d/rc.inet1 configuration file.
sixty-four。 In the vi editing environment, use the Esc key for schema conversion.
sixty-six。 The / home/stud1/wang directory is archived and compressed to generate a wang.tar.gz file, and save this file to the / home directory to achieve the tar command format tar zcvf / home/wang.tar.gz / home/stud1/wang for this task.
sixty-seven。 The pipeline takes the standard output of the previous command as the standard input of the latter command.
sixty-nine。 There are two methods to start the startup process: manual startup and scheduling startup, in which the commonly used commands for scheduling startup are at, batch and crontab.
seventy-four。 The rm command deletes a file or directory, and the main difference is whether to use the recursive switch-r or-R.
seventy-five。 The mv command can move files and directories and rename them.
seventy-eight。 The nfs protocol is used to achieve file system sharing between Unix (/ linux) hosts.
seventy-nine。 In the Linux operating system, devices are accessed through special files.
eighty。 Shell is not only an interpreter of user commands, but also a powerful programming language. Bash is the default shell for Linux.
eighty-one。 Use the >; symbol to append the output redirection to the end of the original text.
eighty-two。 The command to add a user is: adduser or useradd.
83 do string lookups, using the grep command.
eighty-four。 Use * to match several characters at a time.
eighty-five。 The / sbin directory is used to store hypervisors used by system administrators.
At this point, the study of "sorting out the basic knowledge points of linux" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.