当前位置:网站首页>Rhcsa the next day
Rhcsa the next day
2022-07-04 07:11:00 【Where are the peaches】
1. Introduce the difference between soft and hard links
Symbolic links are also called soft links , And the original file is not a file . for example Windows Shortcut to ,
Characteristics of action : Find a file in the specified path and access it quickly and easily , Delete source file shortcut cannot be accessed
Create objects : Text files and directory files can be created , And can cross file systems
Hard links , Multiple filenames point to the same Inode
Characteristics of action : Prevent users from deleting by mistake , Backup ( Backup only for file names )
Create objects : Cannot create for catalog file , And can't cross file systems
2. Create hard and soft link files as required ( stay /home Create the file as aaa, And in / Create a soft link file in the directory a.txt; /root Create a hard link file as )
3. In the current system / Create under directory 100 File ( File name e.g :abc1..abc100)
4. Introduce ll List what each column of information in a directory is
5. Create directory /test/sysroot Create three files in this directory a,b,c After then sysroot Directory move to /tmp Change the name to sys Ensure that the three files in the directory also exist
6 Delete /tmp/sys/a file .
7. Catalog /tmp Create 4 A catalog , And create one under each of these four directories test Catalog
8. Create a test Catalog , Create a file in this directory , Content writing nano
9. stay /dir Create directory under dir2 And documents file1, Moving files file1 To create test Directory , Put the table of contents dir2 Copied to the test Directory
边栏推荐
- Selenium ide plug-in download, installation and use tutorial
- Tar source code analysis Part 2
- [FPGA tutorial case 8] design and implementation of frequency divider based on Verilog
- What is the use of cloud redis? How to use cloud redis?
- Boosting the Performance of Video Compression Artifact Reduction with Reference Frame Proposals and
- 响应式移动Web测试题
- Adaptive spatiotemporal fusion of multi-target networks for compressed video perception enhancement
- A real penetration test
- Transition technology from IPv4 to IPv6
- CMS source code of multi wechat management system developed based on thinkphp6, with one click curd and other functions
猜你喜欢
[Valentine's day] - you can change your love and write down your lover's name
响应式——媒体查询
How to share the source code anti disclosure scheme
SQL foundation 9 [grouping data]
用于压缩视频感知增强的多目标网络自适应时空融合
Selenium driver ie common problem solving message: currently focused window has been closed
关于IDEA如何设置快捷键集
flask-sqlalchemy 循环引用
Chain ide -- the infrastructure of the metauniverse
Solution of running crash caused by node error
随机推荐
图的底部问题
Recursive Fusion and Deformable Spatiotemporal Attention for Video Compression Artifact Reduction
Selenium driver ie common problem solving message: currently focused window has been closed
The important role of host reinforcement concept in medical industry
flask-sqlalchemy 循环引用
Tar source code analysis Part 10
Analysis of tars source code 5
期末周,我裂开
【FreeRTOS】FreeRTOS学习笔记(7)— 手写FreeRTOS双向链表/源码分析
Introduction to rce in attack and defense world
NLP literature reading summary
The difference between synchronized and lock
win10微软拼音输入法输入文字时候下方不出现中文提示
电子协会 C语言 1级 34 、分段函数
Review of enterprise security incidents: how can enterprises do a good job in preventing source code leakage?
Technical experts from large factories: common thinking models in architecture design
校园网络问题
Redis - detailed explanation of cache avalanche, cache penetration and cache breakdown
The final week, I split
Su Weijie, a member of Qingyuan Association and an assistant professor at the University of Pennsylvania, won the first Siam Youth Award for data science, focusing on privacy data protection, etc