Linux common-sense questions

Source: Internet
Author: User
Tags documentation ftp file gz file ftp file transfer

http://www.linuxdiyf.com/viewarticle.php?id=202718


One, the blank question

1, the link is divided into: () and ().
2. When installing a Linux system on a hard disk partition, there must be two types of partitions: () and ().
3, the kernel is divided into process management system, (), I/O management system and () and other four subsystems.
4, vi editor has two modes of operation: () and ().
5. DNS is actually a database of host information distributed over the Internet, and its role is to achieve () and () the conversion between.
6. The two main protocols used by the SendMail mail system are: () and (), the former used to send the message which is used to receive the mail.
7, MV Command can (), can also ().
8, the shell is not only (), it is also a powerful programming language. () is the default shell for Linux.
9. The command to add a user is: () or ().
10, when using the manual method to configure the network, you can modify the () file to change the hostname, to configure the computer's domain name resolution client, you need to configure () file.
11. There are two types of backups that can be made on Linux systems: () and ().
12. There are two ways to run a process, namely () and ().
13, in the VI editing environment, using the () key for mode conversion; To save the contents of the file in the Test.txt file, type: () in command mode.
14, the pipeline is the previous command () as the last Command ().
15, DHCP is () the short name of the agreement, its role is ().
16, rm command can delete files or directories, the main difference is whether to use a recursive switch () or ().
17, in the use of manual method to configure the network, you can modify the/etc/hostname file to change (); To configure (), you need to configure the/etc/resolv.conf file.
18. The ping command is used () and the ping command is implemented by the () protocol.
19. When installing a Linux system on a hard disk partition, there must be two types of partitions: () and ().
20, in the Linux system, the directory used to store the configuration files and subdirectories required by the system is (), the () directory is used to store the management program used by the system administrator.

Second, write the command to complete the following functions.
1. Delete all files and folders under non-empty folder/daisy.
2, renamed the file A.txt to B.txt.
3. Load the contents of the USB drive into the/mnt/udisk folder.
4. Change the password of the user root. (at the # prompt).
5. View the Web address of this machine.
6. Under the/root folder, look for the file with the suffix. C.
7, the process of terminating process number 1001.
8. View the installed RPM packages.
9, to file A.txt to do a backup b.txt.
10. See the Help documentation for MKDIR.
11. Archive The/home/stud1/wang directory, compress it, generate the wang.tar.gz file, and save the file to the/home directory.
12, check the installed file system/dev/had5 is normal, if the check is wrong, the automatic repair.
13, to send 10 packet packet test and host abc.tuu.edu.cn connectivity.
14. Create a command for the parent directory when its parent directory does not exist.
15, to make the file named Fido has the following permissions-r-xr-x-x command.
16. Look for files with the suffix. cpp under the/root folder.
17. Turn off the commands used by the Linux system (do not restart)
18, the CD-ROM/dev/hdc uninstall command.
19, known to a user stud1, whose user directory is/home/stud1. If the current directory is/home, enter the command for directory/home/stud1/test
20. See the Help documentation for the MV.

Three, Jane answers.
1. What are the responsibilities of the system administrator? What are the managed objects?
2, what is the static route, what is the characteristic?
3. What is dynamic routing and what is its characteristic?
4, briefly describe the network File system NFS, and explain its role.
5. What commands are used to view and dispatch the process separately?
6, how to check and repair the system when the file system is compromised?
7. What are symbolic links and what are hard links? What is the difference between a symbolic link and a hard link?

Iv. analysis and calculation questions.
1. Try to describe how the process starts, terminates, and how the process is viewed.
2, try to describe the DNS process of domain name resolution.
3. A line in a/etc/fstab file is as follows:/dev/had5/mnt/dosdata msdos Defaultsusrquota 1 2. Please explain what it means.
4, there is a general user want to backup every Sunday:00 regular/user/backup to/tmp directory, what should the user do?
5, briefly describe the use of FTP file transfer when two ways to log in? What is the difference between them? What are the common FTP file transfer commands?
6, try to describe the DNS process of domain name resolution.
7, with Shell programming, to determine whether a file is a character device file, if it is copied to the/dev directory.
8, a system administrator to do a certain amount of repetitive work every day, please follow the following requirements, to develop a solution:
(1) Delete all subdirectories and all files under the/ABC directory at 4:50;
(2) from early 8:00~ 6:00 hourly read the/XYZ directory in the X1 file, the entire data of the first field in each row is added to the Bak01.txt file in the/backup directory;
(3) Every Monday 5:50 archive and compress all directories and files in the/data directory into files: backup.tar.gz;
(4) Unmount the CD-ROM of the IDE interface at 5:55 (assuming that the device name of the CD-ROM is hdc);
(5) Start up before 8:00.

Reference answer
First, fill in the blanks
1
Hard Links
Symbolic Links
2
File system partition
Swap partition
3
Memory Management System
File Management System
4
Command mode
Input mode
5
IP Address
Host Name
6
Smtp
POP
7
Moving files and directories
Renaming files, directories
8
Interpreter for user commands
Bash
9
AddUser
Useradd
10
/etc/hostname
/etc/resolv.conf
11
System backup
User Backup
12
Standalone operation
Run with parent process
13
Esc
W test.txt
14
Standard output
Standard input
15
Dynamic Host Configuration
For hosts in the network
Distribution
IP Address
16
-R
-R
17
Host Name
The domain name resolution client for this computer
18
Testing the connectivity of the network
Icmp
19
Ext3
Swap
20
/etc
/sbin

Two
1, Rm–r/daisy
2, MV A.txt B.txt
3, Mount–t Vfat–o Iocharset=gb2312/dev/sda1/mnt/udisk
4. passwd Root
5, Ifconfig eth0
6, Find/root–name \*.c
7. Kill 1001
8, Rpm-qia
9. CP A.txt B.txt
10, man mkdir
11, Tar-zcvf/home/wang.tar.gz/home/stud1/wang
12, Fsck–a/dev/had5
13. Ping Abc.tuu.edu.cn–c 10
14, Mkdir–p
15, chmod 551 Fido
16, Find/root–name \*.cpp
17, halt
18, UMOUNT/DEV/HDC
19. CD Stud1/test
20, man MV

Three, simple answer
1. Reference Answer:
System administrators are responsible for system resource management, equipment management, systems performance management, security management and performance monitoring. The managed objects are the servers, the users, the processes of the server, and the various resources of the system.
2. Reference Answer:
A static route is a route that is defined by a routing table that is designed and built by the system administrator. It is applicable to the network where the number of gateways is limited, and the network topology structure does not change frequently. The disadvantage is that the change of network condition cannot be applied dynamically, and the routing table must be modified by network administrator when the network condition changes.
3. Reference Answer:
Dynamic routing is dynamically constructed by routing protocols, and routing protocols update the contents of the routing table in real time by exchanging the routing information they own. Dynamic routing can automatically learn the topology of the network and update the routing table. The disadvantage is that the routing broadcast update information will occupy a large amount of network bandwidth.
4. Reference Answer:
Network File system is an application Layer application service, which mainly applies to the sharing of files or directories between Linux and Linux systems, Linux and UNIX systems. For users, the remote file system can be easily accessed via NFS, making it part of the local file system. The use of NFS eliminates the login process and facilitates user access to system resources.
5. Reference Answer:
The commands that the process looks at are PS and top.
The command for the process Scheduler has at,crontab,batch,kill.
6. Reference Answer:
The prerequisite for a successful file system repair is to have more than two primary file systems and to ensure that the file system that will be repaired is first uninstalled before being repaired. Use the command fsck to repair a compromised file system. The fsck check file system is divided into 5 steps, each of which examines the connection characteristics of different parts of the system and verifies and modifies the previous step. When you execute the fsck command, the check starts with the Super block, then the allocated disk block, the pathname, the connectivity of the directory, the number of links, and the free Block list, I-node.
7. Reference Answer:
Links are divided into hard links and symbolic links.
Symbolic links can establish links to files and directories. Symbolic links can span file systems, which can be partitioned across disks. The file type bit of the symbolic link is l, and the linked file has the new I node.
Hard links can not cross file systems. It can only establish a link to the file, the hard-linked file type bit is-, and the hard-link file's I node is the same as the I node of the linked file.

Four: Question and answer questions
1. Reference Answer:
Starting a process in Linux has two methods: Manual start and scheduled start.
(1) manual start
The user issues a command at the input to start a process directly. Can be divided into:
① front-start: Enter the command directly in the shell to start.
② background boot: Start a process that is not currently urgent, such as a printing process.
(2) scheduled start
System administrator according to the system resources and processes occupy resources, advance scheduling, specify the time and place for the task to run, then the system will automatically complete the task.
The frequently used process scheduling commands are: At, batch, crontab.
2. Reference Answer:
First, the client issues a DNS request to translate the IP address or host name. After the DNS server receives the client's request:
(1) Check the DNS server cache, if the requested address or name, that is, to send a reply to the client;
(2) If not found, then find in the database, if the requested address or name, that is, to send a reply to the client;
(3) If not found, the request is sent to the root domain DNS server, and sequentially from the root domain to find the top-level domain, the top level to find two-level domain, two-level domain to find the level three, until the address or name to resolve, that is, the DNS server on the network to send the response information, the DNS server is now Then, the parsing results are sent to the client.
(4) If not found, an error message is returned.
3. Reference Answer:
(1) The first column: The file system name to be loaded, and (2) The second column: The installation point of the file system;
(3) The third column: the type of file system; (4) The fourth column: setting parameters;
(5) Fifth column: For the Backup program to determine the number of days from the last backup;
(6) Sixth column: The order in which the file system is detected at system boot time.
4. Reference Answer:
(1) The first method:
The user should use the crontab–e command to create the crontab file. The format is as follows:
0 0 * * Sun cp–r/user/backup/tmp
(2) The second method:
The user first creates a new file in their own directory, the file content is as follows:
0 * * Sun cp–r/user/backup/tmp, then execute crontab file to make it effective.
5. Reference Answer:
(1) FTP has two ways of logging in: Anonymous login and Authorized login. When using anonymous login, the user name is: Anonymous, password is: any legitimate email address; When using the authorization login, the user name is the user's account number in the remote system, and the password is the user password of the user in the remote system.
The difference: Using anonymous login can only access resources under the FTP directory, the default configuration can only download, and authorized logon access is greater than anonymous logon, and upload, download can.
(2) FTP file transfer has two types of file transfer modes: ASCII mode and binary mode. ASCII mode is used to transfer text files, and other files are transmitted using binary mode.
(3) Common FTP file transfer commands are: Bin, ASC, PUT, GET, mput, mget, prompt, bye.
6. Reference Answer:
First, the client issues a DNS request to translate the IP address or host name. After the DNS server receives the client's request:
(1) Check the DNS server cache, if the requested address or name, that is, to send a reply to the client;
(2) If not found, then find in the database, if the requested address or name, that is, to send a reply to the client;
(3) If not found, the request is sent to the root domain DNS server, and sequentially from the root domain to find the top-level domain, the top level to find two-level domain, two-level domain to find the level three, until the address or name to resolve, that is, the DNS server on the network to send the response information, the DNS server is now Then, the parsing results are sent to the client.
(4) If not found, an error message is returned.
7. Reference Program:
#!/bin/sh
Filename=
echo "Input file name:"
Read FILENAME
If [-C "$FILENAME"]
Then
CP $FILENAME/dev
Fi
8. Reference Answer:

(1) Create a crontab file named Prgx with VI;
(2) Contents of the Prgx file:
* * * * rm-r/abc/*
0 8-18/1 * * * cut-f1/xyz/x1 >;>; /backup/bak01.txt
* * * Tar ZCVF backup.tar.gz/data
* * * * UMOUNT/DEV/HDC
(3) Log in by the Superuser and execute the contents of the Prgx file with crontab:
[Email protected]: #crontab prgx, start the crontab automatically after you turn it on every day before 8:00.

Source: Chinaunix Blog
Read (436) | Comments (0) | Forwards (10) |0

Previous: Firefox fully compatible with China UnionPay "online Payment"

Next: Npviewer.bin occupancy rate is too high-flash plug-in

Related Popular articles
    • Linux log file System (EXT4, XFS ...
    • What is the use of #undef in Config.h file,...
    • Linux Journal file system, fsck ...
    • Welcome to Pxe_linux in Chinaunix blog ...
    • Linux Journal file system, fsck ...
    • Common Linux Service ports
    • Xmanager 2.0 for Linux configuration
    • "Rootfs build" BusyBox httpd ...
    • OpenWrt in Luci study notes
    • What is a shell?
    • Linux DHCP Peizhi ROC
    • Soft links to Unix files
    • What does this command mean, I'm new ...
    • What does sed-e "/grep/d" mean ...
    • Who can help me solve Linux 2.6 10 ...
Leave something to the owner! ~~ Comment on the hot topic

Linux common-sense questions

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.