Premium Essay

List the Number and Name of Each Runlevel as Used by Fedora/Red Hat Linux Provide a Brief Explanation of Each Runlevel.

In:

Submitted By JSantana023
Words 1402
Pages 6
Homework
Assignment 1.1 1. List the number and name of each runlevel as used by Fedora/Red Hat Linux Provide a brief explanation of each runlevel. ID | Name | Description | 0 | Halt | Shuts down the system. | 1 | Single-user Mode | Mode for administrative tasks. | 2 | Multi-user Mode | Does not configure network interfaces and does not export networks services. | 3 | Multi-user Mode with Networking | Starts the system normally. | 4 | Not used/User-definable | For special purposes. | 5 | Start the system normally with appropriate display manager. ( with GUI ) | As runlevel 3 + display manager. | 6 | Reboot | Reboots the system. |

2. Which two runlevel should never be set as the default? 0 (HALT) and 6 (reboot) should never be set as default. 3. What script contains the default runlevel?
/etc/rc <tab> 4. The init scripts for each runlevel are contained in which directory tree?
Check /etc/inittab 5. What would you name the link to an init script that would start the fictitious bigd daemon early in the boot process?
Open /etc/rc.local and write the script to run at boot time. 6. What would you name the link to kill the same daemon?
Kill -9 <pid> 7. How would you use the service command to manually kill the bigd daemon?
Kill -9 <pid /// You can get through ps for service> 8. How would use chkconfig to set the bigd daemon to start at runlevel 2 and 3? chkconfig bigd --level 23 on 9. How would you use chkconfig to remove bidg from all runlevel? chkconfig - -del bigd 10. How would you use telinit to switch to runlevel 5?
Edit the /etc/inittab and Enter: id:5:initdefault: 11. How would you use you tell Linux to shut down five minutes (not delay five minutes) with the message, “The system will shut down in 5 minutes. Log off now!”? shutdown -t 5 // You can write it on script for the

Similar Documents

Premium Essay

This Is Not a Test

... gzip compress (you should have used either of these when you created your kernel source code backup.) * chmod - options to recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character  What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions:  * Redhat,  * CentOS * Fedora  * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation * ftp * http * nfs Who created the Linux Kernel? What does open source...

Words: 4587 - Pages: 19

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Free Essay

Fsfdfdfd

...Oracle VM VirtualBox R User Manual Version 5.0.0 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 1.1 Why is virtualization useful? . . . . . . . . . . . . . . . 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . ....

Words: 143714 - Pages: 575