当前位置:网站首页>Rhcsa learning practice
Rhcsa learning practice
2022-07-04 10:17:00 【Attiude】
1. Use whereis lookup locate command
Use which lookup whereis command
Use locate lookup rm command
[[email protected] ~]# locate -c rm
5228
[[email protected] ~]# whereis locate
locate: /usr/bin/locate /usr/share/man/man1/locate.1.gz
[[email protected] ~]# which whereis
/usr/bin/whereis2.find Command to use : Use find Command to find all ordinary files in the current path Use find Command to find... In the current path file1.txt,file2.txt,file3.txt Use find The command to find the file owner is root The ordinary documents of Use find The command search modification time is 1 Ordinary documents within days
[[email protected] ~]# find -type f # All text files
[[email protected] ~]# find -type l # All linked files
[[email protected] ~]# find find_test1 find_test2 find_test3
find_test1
find_test2
find_test3
[email protected] ~]# find -user root | find -type l # Find the user as root Common files under
[[email protected] ~]# find -mtime -1 |find -type l # Documents modified within one day 3.cut Command to use : Given the file cut_data.txt And the content is : No Name Score 1 zhang 20 2 li 80 3 wang 90 4 sun 60 Use the default delimiter to cut the contents of the file , And output the first field after cutting Cut file content , And output the first field and the third field after cutting Cut by byte : Output the first byte to the second byte of the cut 10 Bytes of content Cut by character : Output the first character and the second character after cutting 5 The content of a character Cut according to the specified delimiter : The contents are as follows , Output the contents of the first field and the third field No|Name|Score 1|zhang|20 2|li|80 3|wang|90 4|sun|60
[[email protected] ~]# cut -s -f1 cut_data.txt
[[email protected] ~]# cut -s -f1,3 cut_data.txt
[[email protected] ~]# cut -b 1-10 cut_data.txt
[[email protected] ~]# cut -c 1-5 cut_data.txt
[[email protected] ~]# cut -d"|" -f 1,3 cut_data.txt
4.uniq Command to use : New file uniq_data.txt, The content of the document is Welcome to Linux Windows Windows Mac Mac Linux Use uniq The command outputs the result after de duplication Use uniqmingl Output only duplicate lines Use uniq The command outputs non repeating lines Use uniq The command counts the number of repetitions
[[email protected] ~]# uniq uniq_data.txt
[[email protected] ~]# uniq -d uniq_data.txt
[[email protected] ~]# uniq -u uniq_data.txt
[[email protected] ~]# uniq -c -d uniq_data.txt5.sort command : Given the file num.txt, args.txt The contents of the document :num.txt 1 3 5 2 4 The contents of the document :args.txt test args1 args2 args4 args4 args3

Yes num.txt Sort , And output the results to sorted_num.txt in

[email protected] ~]# sort -n num.txt > sorted_num.txtYes args.txt Sort , And output the results to sorted_args.txt in

[[email protected] ~]# sort -n args.txt > sorted_merge.txtYes num.txt and args.txt Sort , And output the results to sorted_merge.txt in

[[email protected] ~]# sort -n args.txt num.txt > sorted_merge.txtYes args.txt After sorting, de re output
[[email protected] ~]# sort -n -u args.txtMerge sorted_args.txt and sorted_num.txt And output
[[email protected] ~]# sort args.txt num.txt Given the file info_txt: Press the second column as key Sort No Name Score 1 zhang 20 2 li 80 3 wang 90 4 sun 60
[[email protected] ~]# sort -n -k 2 info.txt6. take 26 After a lowercase letter 13 Replace the first letter with a capital letter
![]()
take hello 123 world 456 Replace the numbers in with empty characters ( Prompt to use wildcards )
![]()
take hello 123 world 456 Replace letters and spaces in , Just keep the numbers ( Prompt to use wildcards )
![]()
7.wc Command to use : Given the file :word_count.txt, It's filled with 10 Row content Count by byte Count by word Count by
[[email protected] ~]# wc -l word_count.txt # Count by
10 word_count.txt
[[email protected] ~]# wc -w word_count.txt # Count by word
11 word_count.txt
[[email protected] ~]# wc -c word_count.txt # Count by byte 
边栏推荐
- MongoDB数据日期显示相差8小时 原因和解决方案
- Servlet基本原理与常见API方法的应用
- Golang Modules
- Golang Modules
- Doris / Clickhouse / Hudi, a phased summary in June
- Baidu R & D suffered Waterloo on three sides: I was stunned by the interviewer's set of combination punches on the spot
- 【Day1】 deep-learning-basics
- Differences among opencv versions
- Kubernetes CNI 插件之Fabric
- MySQL develops small mall management system
猜你喜欢

MongoDB数据日期显示相差8小时 原因和解决方案

Pcl:: fromrosmsg alarm failed to find match for field 'intensity'

Introduction to extensible system architecture

C语言指针面试题——第二弹

六月份阶段性大总结之Doris/Clickhouse/Hudi一网打尽

Hands on deep learning (40) -- short and long term memory network (LSTM)

Advanced technology management - how to design and follow up the performance of students at different levels

对于程序员来说,伤害力度最大的话。。。

Three schemes of ZK double machine room

Dynamic memory management
随机推荐
Use the data to tell you where is the most difficult province for the college entrance examination!
Golang type comparison
Dynamic address book
2020-03-28
Hands on deep learning (38) -- realize RNN from scratch
What is devsecops? Definitions, processes, frameworks and best practices for 2022
libmysqlclient.so.20: cannot open shared object file: No such file or directory
Hands on deep learning (34) -- sequence model
Delayed message center design
Realsense of d435i, d435, d415, t265_ Matching and installation of viewer environment
Baidu R & D suffered Waterloo on three sides: I was stunned by the interviewer's set of combination punches on the spot
百度研发三面惨遭滑铁卢:面试官一套组合拳让我当场懵逼
基于线性函数近似的安全强化学习 Safe RL with Linear Function Approximation 翻译 1
Press the button wizard to learn how to fight monsters - identify the map, run the map, enter the gang and identify NPC
查看CSDN个人资源下载明细
2021-08-10 character pointer
Hands on deep learning (45) -- bundle search
Es advanced series - 1 JVM memory allocation
Golang Modules
Differences among opencv versions