I. Fill in blank questions:
1. Access the device as a file in Linux.
2. Read the file system to be loaded from the file/etc/fstab during Linux kernel boot.
3. Each file in the Linux File System is identified by an I node.
4. All disk blocks are composed of four parts: boot block, dedicated block, I node table block, and data storage block.
5. links are divided into hard links and symbolic links.
6. The super block contains important file system information such as the I node table and the idle block table.
7. The permission for a file is D-RW-_ r --. If the permission is expressed as a numerical value, the octal value is 644, and the file attribute is a directory.
8. Press Ctrl + C to terminate the processes started at the front-end.
9. After static route settings, if the network topology changes, the system administrator needs to modify the route settings.
10. An important task of network management is control and monitoring.
11. When installing Linux to partition hard disks, there must be two partition types: file system partition and swap partition.
13. You must grant the execution permission to the script file before running the shell program.
14. One of the tasks of system management is to implement security protection, backup, recovery and update of programs and data in a distributed environment.
15. The system swap partition is an area of the system virtual memory.
16. The kernel is divided into four subsystems: Process Management System, memory management system, I/O Management System, and file management system.
17. Kernel configuration is an important operation performed by the system administrator when changing the system configuration hardware.
18. in Linux installation, use the netconfig program to configure the network. The installation program will prompt you to enter the host name, domain name, Domain Name Server, IP address, gateway address, subnet mask, and other necessary information step by step.
19. Each user is uniquely identified by the user ID and user name.
20. Rip is the most common internal protocol, which is generally called dynamic routing information protocol.
21. In Linux, all content is represented as files. The methods for organizing files are called file systems.
22. DHCP can be used to allocate Dynamic IP addresses.
23. The system network administrator manages processes of servers, users, and servers, as well as various system resources.
24. network management is usually composed of three parts: monitoring, transmission, and management. The management part is the center of the entire network management.
25. When you want to delete a device driver that is not used by the system, you must compile the kernel. When the kernel does not support the device driver on the system, you must upgrade the kernel.
26 The ping command can be used to test whether the system on the network can reach a remote host. Therefore, it is often used to test network connectivity.
27. The vi editor has two working modes: Command mode and input mode.
28. you can use the LS-Al command to observe the permissions of a file. Each file has 10 bits and is divided into four sections. The first section occupies 1 bits, indicating the file type, the second part takes three places, indicating the permission of the file owner to the file.
29. the difference between a process and a program lies in its dynamic nature. The dynamic generation and termination of a process can have the following basic states: running state, ready state, and waiting state (blocking state ).
30. DNS is actually a database of host information distributed on the Internet. Its function is to convert IP addresses and host names.
31. Apache is an application that implements the functions of the WWW server, that is, the "Web Server browsing". Apache is an application that provides web services for users on the server side.
32. There are two types of backup on Linux: system backup and user backup. The former refers to the backup of the operating system, and the latter refers to the backup of applications and user files.
33. CD-ROM standard file system type is iso9660.
34. When Lilo. conf is configured to take effect, the command and parameter to be run are Lilo.
35. When using the LS command, use the-B parameter to display non-printable characters in the octal format.
36. In Linux, vfat is used for file systems that support Windows 9.x/ 2000 long file names.
37. Set the command to restrict the use of disk space to quota.
38 in Linux, the directory used to store the required configuration files and subdirectories is/etc.
39. Only file links can be established for hard connections. Symbolic Links can be created across different file systems.
40. The attribute bit of the socket file is S.
41. The command to end the background process is kill.
42. There are two ways to run a process: independent running and parent running.
43. links can be divided into hard links and symbolic links.
44. display all processes running in Linux under the super user. The command and parameter to be used are PS-Aux.
45. The attribute bit of the MPs queue file is P.
46. using the standard output of the previous command as the standard input of the next command is called a pipeline.
47. Specify the command and parameter for the execution right of the script program as chmod A + x filename.
48. The remote logon command is Telnet.
49. To send 10 packets to test the connectivity with the host abc.tuu.edu.cn, Ping abc.tuu.edu.cn-C 10.
50. The DNS server process is named. When it is started, it automatically loads the DNS partition database file defined in the named. conf file under the/etc directory.
51. The Apache server process configuration file is httpd. conf.
52. In the Linux system, the command that is suffixed with .gz after the compressed file is gzip.
53. When editing a file with VIOs, store the file in the test.txt file and type W test.txt in command mode.
54 The command and parameter for displaying the calendar of the entire year on the standard output is cal-y.
55. In shell programming, square brackets are used to indicate that the test conditions must have spaces on both sides.
56. Check whether the installed file system/dev/had5 is normal. If the check is incorrect, it is automatically repaired. The command and parameter is fsck-A/dev/had5.
57. In Windows 9.x, a tool that shares the user directory in Unix/Linux is the Samba server.
58. The System Administrator is responsible for system resource management, system performance management, device management, security management, and system performance monitoring.
59 in Linux, run the NSLookup command to test whether the DNS server can correctly resolve the domain name.
60. In Linux, the hard disk (slave disk) of the second ide channel is identified as HDB.
61. When the system administrator needs to upgrade the kernel version and change the system hardware configuration, re-compile the kernel.
62. If you only want to modify the system IP address, modify the/etc/rc. d/rc. inet1 configuration file.
63. Configure the/etc/hosts file when you have no conditions to create a DNS server in the LAN, but want to allow users in the LAN to access each other using computer names.
64. In the VI editing environment, use the ESC key to convert the mode.
65. slackware linux 9.0 usually uses the ext3 file system. All disk blocks of the system are composed of four parts.
66. compress the/home/stud1/wangdirectory and generate the wang.tar.gz file. Save the file to the/home directory. Run the tar command format tar zcvf/home/wang.tar.gz/home/stud1/Wang of the task.
67. The pipeline uses the standard output of the previous command as the standard input of the next command.
68. when manually configuring the network, you can modify the/etc/hostname file to change the host name. to configure the domain name resolution client of the computer, you need to configure/etc/resolv. CONF file.
69. There are two methods to start a process: Manual start and scheduling start. Common commands for scheduling and start are at, batch, and crontab.
70. The domain name of test.bns.com.cn is bns.com.cn. to configure a Domain Name Server, define the working directory of the DNS database in the named. conf file.
71. Two main protocols used by the Sendmail system are SMTP and pop. The former is used to send mail, and the latter is used to receive mail.
72. DHCP is short for Dynamic Host Configuration Protocol. It is used to assign IP addresses to hosts in the network.
73. There are many software packages currently used by the proxy server. Squid is used in the teaching materials.
74. The RM command can delete files or directories. The main difference is whether to use the recursive switch-R or-R.
75. The MV command can move files and directories, and rename files and directories.
76. The number of hops in the route selection protocol (RIP) indicates the number of gateways that must pass before arriving at the destination. The maximum distance accepted by RIP is 15 hops.
77. The ping command is used to test network connectivity. The ping command is implemented through the ICMP protocol (Internet Control Information Protocol.
78. NFS is used for file system sharing between Unix (/Linux) hosts.
79. In Linux, devices are all accessed through special files.
80. shell is not only the interpreter of user commands, but also a powerful programming language. Bash is the default shell of Linux.
81. Use the >;>; symbol to append the output redirection content to the end of the original text.
82. The command for adding a user is adduser or useradd.
83. Use the grep command to search for strings.
84. Use * to match several characters each time.
85. The/sbin directory is used to store the management programs used by the system administrator.