当前位置:网站首页>Rhcsa the next day
Rhcsa the next day
2022-07-04 07:11:00 【Where are the peaches】
1. Introduce the difference between soft and hard links
Symbolic links are also called soft links , And the original file is not a file . for example Windows Shortcut to ,
Characteristics of action : Find a file in the specified path and access it quickly and easily , Delete source file shortcut cannot be accessed
Create objects : Text files and directory files can be created , And can cross file systems
Hard links , Multiple filenames point to the same Inode
Characteristics of action : Prevent users from deleting by mistake , Backup ( Backup only for file names )
Create objects : Cannot create for catalog file , And can't cross file systems
2. Create hard and soft link files as required ( stay /home Create the file as aaa, And in / Create a soft link file in the directory a.txt; /root Create a hard link file as )
3. In the current system / Create under directory 100 File ( File name e.g :abc1..abc100)
4. Introduce ll List what each column of information in a directory is
5. Create directory /test/sysroot Create three files in this directory a,b,c After then sysroot Directory move to /tmp Change the name to sys Ensure that the three files in the directory also exist
6 Delete /tmp/sys/a file .
7. Catalog /tmp Create 4 A catalog , And create one under each of these four directories test Catalog
8. Create a test Catalog , Create a file in this directory , Content writing nano
9. stay /dir Create directory under dir2 And documents file1, Moving files file1 To create test Directory , Put the table of contents dir2 Copied to the test Directory
边栏推荐
- 两年前美国芯片扭捏着不卖芯片,如今芯片堆积如山祈求中国帮忙
- Industrial computer anti-virus
- [Mori city] random talk on GIS data (I)
- There is no Chinese prompt below when inputting text in win10 Microsoft Pinyin input method
- Directory of tornado
- Redis - detailed explanation of cache avalanche, cache penetration and cache breakdown
- Master-slave replication principle of MySQL database
- Analysis of tars source code 5
- Technical experts from large factories: common thinking models in architecture design
- [FPGA tutorial case 8] design and implementation of frequency divider based on Verilog
猜你喜欢
Node connection MySQL access denied for user 'root' @ 'localhost' (using password: yes
【网络数据传输】基于FPGA的百兆网/兆网千UDP数据包收发系统开发,PC到FPGA
图的底部问题
How notepad++ counts words
【Kubernetes系列】Kubernetes 上安装 KubeSphere
Status of the thread
leetcode825. 适龄的朋友
[Valentine's day] - you can change your love and write down your lover's name
What is the use of cloud redis? How to use cloud redis?
Transition technology from IPv4 to IPv6
随机推荐
Analysis of tars source code 1
【GF(q)+LDPC】基于二值图GF(q)域的规则LDPC编译码设计与matlab仿真
Tar source code analysis Part 7
响应式移动Web测试题
uniapp小程序分包
About how idea sets up shortcut key sets
图的底部问题
js 常用时间处理函数
输入年份、月份,确定天数
Research on an endogenous data security interaction protocol oriented to dual platform and dual chain architecture
高薪程序员&面试题精讲系列119之Redis如何实现分布式锁?
MySQL 45 lecture learning notes (12) MySQL will "shake" for a while
Uniapp applet subcontracting
Cochez une colonne d'affichage dans une colonne de tableau connue
校园网络问题
电子协会 C语言 1级 34 、分段函数
Status of the thread
[Android reverse] function interception (use cache_flush system function to refresh CPU cache | refresh CPU cache disadvantages | recommended time for function interception)
what the fuck! If you can't grab it, write it yourself. Use code to realize a Bing Dwen Dwen. It's so beautiful ~!
云Redis 有什么用? 云redis怎么用?