Introduction to Operating Systems

Total Page:16

File Type:pdf, Size:1020Kb

Introduction to Operating Systems Outline Working with files and directories Working with file editor pico To be done by the next class Assignment 1. 05/24/11 unix-lect02-file1.pdf 1 Review: Major Components of the Unix OS Kernel The master control program to control both hardware and software Schedules tasks and provides multitasking and multi-user operations Manages resources Shell Interprets user commands Passes user commands to the kernel for execution (executes programs) File System Information organized as files and directories (special files) Utilities Software tools provided as part of the OS 05/24/11 unix-lect02-file1.pdf 2 Review: Syntax of UNIX Command Lines A UNIX command may have arguments, which can be an option or a filename The general format for UNIX command line is command option(s) filename(s) A command is typically in lowercase Options modify the way in which a command works Options are often single letters prefixed with a dash Some of options can be made from complete words There are also special characters (such ‘>’, ‘<‘, ‘&’, ‘|’) 05/24/11 unix-lect02-file1.pdf 3 Files The most common entity users manipulate (directly or indirectly) is files (and directories) Files A well defined repository of information saved on a storage device Program or component of a program Arbitrary text An executable (binary text) A UNIX operating system itself consists of a set of files and directories 05/24/11 unix-lect02-file1.pdf 4 File Examples The linux operating system on shell.cs.fsu.edu is saved in files -rw-r--r-- 1 root root 1401588 Jun 9 2005 /boot/vmlinuz-2.6.9-11.ELsmp -rw-r--r-- 1 root root 390536 Jul 11 2005 /boot/initrd-2.6.9-11.ELsmp.img The tcsh shell program is a file -rwxr-xr-x 1 root root 307488 Feb 17 2005 /bin/tcsh The cpuinfo of shell.cs.fsu.edu is a file -r--r--r-- 1 root root 0 Jan 8 17:17 /proc/cpuinfo The usernames and their information are saved in a file -rw-r--r-- 1 root root 1473 Dec 22 2005 /etc/passwd The information about the file systems is a file -rw-r--r-- 1 root root 1212 Sep 8 15:37 /etc/fstab 05/24/11 unix-lect02-file1.pdf 5 Directories Special files called directories contain pointers to other files In other words, a directory is a file that contains a list of files and subdirectories A directory is changed when a file name is changed or a file is deleted Structure of directories Hierarchically structured like an inverted tree / is the starting directory or “root” 05/24/11 unix-lect02-file1.pdf 6 Example Set of Directories and Files / bin home etc tcsh majors grads faculty fstab … nienaber … … research teaching … vision cop3353 … notes homework 05/24/11 unix-lect02-file1.pdf 7 unix-lect01-intro.ppt unix-lect02-file1.ppt Identifying Files and Directories Pathnames Identifying a file by following a sequence of directories until you reach the file/directory / is also the separator among the subdirectories and final file Examples /bin/tcsh /etc/fstab /home/grads/nienaber/teaching/cop3353/notes/unix-lect02- file1.ppt 05/24/11 unix-lect02-file1.pdf 8 Current Working Directory In order to be able to specify a file name or directory more efficiently, the UNIX (actually the shell program) also remembers the directory where you currently work You can then identify a file or directory relative to the current working directory Suppose the current working directory is “home/grads/nienaber”, then: “teaching” would refer to the same directory as: /home/grads/nienaber/teaching 05/24/11 unix-lect02-file1.pdf 9 More on Pathnames Absolute pathnames start at root /home/grads/nienaber /bin/tcsh Relative pathnames start at the current working directory Special symbols for the current directory and parent directory “..” refers to the parent directory (the directory “above”) “.” is the current directory Referencing user directories ~nienaber is the absolute pathname to the user’s home directory “nienaber” (directory “/home/grads/nienaber” in this example) ~/ is shorthand for the absolute path to your own user directory For me, it is the same as ~nienaber 05/24/11 unix-lect02-file1.pdf 10 Pathname Examples / bin home etc tcsh majors grads faculty fstab … nienaber … … research teaching … vision cop3353 notes homework 05/24/11 unix-lect02-file1.pdf 11 unix-lect01-intro.ppt unix-lect02-file1.ppt Potential Exam Questions True/false For any file, the absolute path to the file always starts with /. [T/F] For any directory, the absolute path to the directory is always the same. [T/F] For any file or directory, its relative pathname depends on the current working directory and is not unique. [T/F] Using relative pathnames only, some files and directories can not be referenced when the current working directory is at the bottom of the directory tree (note / is at the top of the tree). [T/F] 05/24/11 unix-lect02-file1.pdf 12 Common UNIX File Commands ls List files and subdirectories cat View file content more/less View file content (pause each screen) touch Create a file / update its time stamp cp Copy file to a new file mv Move file to a new directory, rename file rm Delete a file 05/24/11 unix-lect02-file1.pdf 13 Common Directory Commands pwd Display absolute pathname to current working directory mkdir Create a directory rmdir Remove a directory cd Change the current working directory 05/24/11 unix-lect02-file1.pdf 14 Command Examples pwd Prints the absolute pathname of the current working directory ls –l The ls command lists the files and subdirectories in a directory. The ‘l’ flag gives detailed information. touch The touch commands creates an empty file or updates the timestamp of an existing file cp The cp command copies the contents of a file or directory to another file or directory (two parameters). The ‘i’ flag asks before it replaces an existing file; the r flag recursively copies all subdirectories also 05/24/11 unix-lect02-file1.pdf 15 Command Examples – cont. mv The mv command renames a file (it takes two arguments) mv oldfilename newfilename If the second argument is a directory it moves it to that directory cd Changes the current working directory to another one cd notes cd .. cd ../notes Command --help Most commands have a summary of options via --help (or – h) Manual pages give more detailed information 05/24/11 unix-lect02-file1.pdf 16 Characters in Filenames File names can contain any characters except “/”, but it is recommended that you use upper or lower case letters, numbers, and “-” “.” For example, although a file name could contain a space or spaces confusing name commands using this would not work correctly unless you tell the shell to not break an argument at the spaces by quoting the filename or using special characters rm “confusing name” (or rm confusing\ name) 05/24/11 unix-lect02-file1.pdf 17 File Permissions Three types of running programs (or processes) can access a file User (or owner): process spawned by the user who created the file Group: process spawned by a member of the same group of a file Other: process spawned by anyone else Permission types Read: access to a file or list files of a directory Write: modify / remove / write to a file (directory) Execute: run a file as a program or enter a directory 05/24/11 unix-lect02-file1.pdf 18 Example Outputs Current permissions can be viewed using “ls –l” First line is the number of disk blocks (1 block is 1024 (or 512) bytes) taken up by all the files 05/24/11 unix-lect02-file1.pdf 19 Columns in the Display from “ls –l” First entry in a line is the mode The first character is d for directory, else - for a normal file The remain 9 characters in groups of threes are r, w, x permissions for user, group and other respectively (- indicates not having that permission) Second entry indicates number of links to the file (usually 1 for a file and 2 for a directory) Third entry is the user id of owner and the fourth entry is the group id Fifth entry is the number of bytes of the file Sixth entry is the date the file was last modified The last entry is the file/directory name 05/24/11 unix-lect02-file1.pdf 20 Potential Exam Questions True/false In order to read homework1.txt, a user must have read permission and execute permission for all directories along its absolute path. [F] Without writing permssion to the current working directory, a user can not delete a file from it. [T] 05/24/11 unix-lect02-file1.pdf 21 Changing Permissions Using the chmod command to set/change permissions Numeric (as octal numbers) Directly set the permissions for u, g, o using each 3 bit value as an octal value chmod 754 unix-lect02-file1.ppt will set to 111 101 100 or rwx r-x r-- chmod 700 unix-lect02-file1.ppt will set to 111 000 000 or rwx --- --- chmod 644 unix-lect02-file1.ppt will set to 110 100 100 or rw- r-- r-- 05/24/11 unix-lect02-file1.pdf 22 Changing Permissions - cont. Symbolic Format: chmod mode,[mode] <filename> The format of mode is who operation permission Who is one or more of u, g, o, a (for all) operation is + (add), - (remove), = (set) Permissions are one or more of r, w, x Examples chmod 654 unix-lect02-file1.ppt chmod go-rwx unix-lect02-file1.ppt chmod g+w unix-lect02-file1.ppt chmod u=rwx,g=rx,o=r unix-lect02-file1.ppt 05/24/11 unix-lect02-file1.pdf 23 Changing Permissions - cont.
Recommended publications
  • Dot at Command Firmware Release 4.0.0 Release 3.3.5
    Product Change Notification Software Release Notes Dot AT Command Firmware Release 4.0.0 Release 3.3.5 MultiTech xDot® MultiTech mDot™ Date: March 30, 2021 Contents Product Change Notification (PCN) Number PCN 03302021-001 (Dot) I. Overview II. Suggested Action Plan I. Overview MultiTech announces the availability of new AT Command III. Release 4.0.0 Overview Firmware for use on MultiTech® Long Range LoRa® Modules: MultiTech xDot® (MTXDOT Series) IV. Release 3.3.5 Overview MultiTech mDot™ (MTDOT Series) V. Schedule New versions are currently available for download and VI. Flashing mDot Firmware evaluation: VII. Part Numbers Impacted Release 4.0.0 (shipping in June 2021) Release 3.3.5 VIII. Mbed OS Overview IX. xDot Overview Release 4.0.0 will released into standard MultiTech product starting in June 2021. Currently, product ships with X. mDot Overview Release 3.2.1 XI. xDot Micro Developer Kit II. Suggested Action Plan XII. Additional Information Customers Review the information in this PCN and forward to Attachments others within your organization who are actively Identifying Firmware Version involved with the development of IoT applications using the MultiTech xDot and MultiTech mDot. Identifying Date of Manufacture Consider downloading the firmware available on MultiTech or Mbed websites to check compatibility mPower & mLinux Software with existing deployments. PCN 03302021-001 (Dot) Page 1 of 12 https://support.multitech.com Review the release schedule for the upcoming firmware release and understand the effect on your manufacturing and deployment schedules. Distributors Forward this announcement to others within your organization who are actively involved in the sale or support of LoRa-enabled sensors.
    [Show full text]
  • Dell EMC Powerstore CLI Guide
    Dell EMC PowerStore CLI Guide May 2020 Rev. A01 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Additional Resources.......................................................................................................................4 Chapter 1: Introduction................................................................................................................... 5 Overview.................................................................................................................................................................................5 Use PowerStore CLI in scripts.......................................................................................................................................5 Set up the PowerStore CLI client........................................................................................................................................5 Install the PowerStore CLI client..................................................................................................................................
    [Show full text]
  • Shell Variables
    Shell Using the command line Orna Agmon ladypine at vipe.technion.ac.il Haifux Shell – p. 1/55 TOC Various shells Customizing the shell getting help and information Combining simple and useful commands output redirection lists of commands job control environment variables Remote shell textual editors textual clients references Shell – p. 2/55 What is the shell? The shell is the wrapper around the system: a communication means between the user and the system The shell is the manner in which the user can interact with the system through the terminal. The shell is also a script interpreter. The simplest script is a bunch of shell commands. Shell scripts are used in order to boot the system. The user can also write and execute shell scripts. Shell – p. 3/55 Shell - which shell? There are several kinds of shells. For example, bash (Bourne Again Shell), csh, tcsh, zsh, ksh (Korn Shell). The most important shell is bash, since it is available on almost every free Unix system. The Linux system scripts use bash. The default shell for the user is set in the /etc/passwd file. Here is a line out of this file for example: dana:x:500:500:Dana,,,:/home/dana:/bin/bash This line means that user dana uses bash (located on the system at /bin/bash) as her default shell. Shell – p. 4/55 Starting to work in another shell If Dana wishes to temporarily use another shell, she can simply call this shell from the command line: [dana@granada ˜]$ bash dana@granada:˜$ #In bash now dana@granada:˜$ exit [dana@granada ˜]$ bash dana@granada:˜$ #In bash now, going to hit ctrl D dana@granada:˜$ exit [dana@granada ˜]$ #In original shell now Shell – p.
    [Show full text]
  • Application for New Or Duplicate License Plates
    APPLICATION FOR NEW OR DUPLICATE LICENSE PLATES APPLICANT AND VEHICLE INFORMATION Owner(s) Name Daytime Phone Number ( ) - Mailing Address City State ZIP Vehicle Make Model Year VIN Body Style Original License Plate Number Expiration Date Number of Plate(s) lost, stolen, destroyed Plate(s) Surrendered STEP STEP #1 If license plate(s) cannot be surrendered because they are lost or stolen, duplicate license plates (plates that are reproduced with the same plate number) cannot be displayed on the vehicle until the validation stickers on the original plates have expired. This form cannot be used to replace lost, damaged, or mutilated embossed plates. You must reapply for embossed plates using the form MV-145. In case of lost, damaged or mutilated plates, a new or duplicate license plate and registration certificate will be issued by the County Treasurer. Damaged or mutilated license plates must be surrendered to the County Treasurer when you receive your new license plates. The fee to obtain a replacement license plate is eight dollars ($8.00), made payable to the County Treasurer. A replacement plate is the next available consecutive plate. The fee to obtain a duplicate license plate is thirty dollars ($30.00), made payable to the County Treasurer. A duplicate plate is the plate with the same number or combination that you currently have; WYDOT will reproduce your plate. Please note the following plates are the ONLY license plates that can be remade: Prestige, all types of Specialty Plates and preferred number series plates. Preferred number series in each county are determined by the County Treasurer, but will not exceed 9,999.
    [Show full text]
  • DOT Series at Command Reference Guide DOT SERIES at COMMAND GUIDE
    DOT Series AT Command Reference Guide DOT SERIES AT COMMAND GUIDE DOT Series AT Command Guide Models: MTDOT-915-xxx, MTDOT-868-xxx, MTXDOT-915-xx, MTXDOT-898-xx, Part Number: S000643, Version 2.2 Copyright This publication may not be reproduced, in whole or in part, without the specific and express prior written permission signed by an executive officer of Multi-Tech Systems, Inc. All rights reserved. Copyright © 2016 by Multi-Tech Systems, Inc. Multi-Tech Systems, Inc. makes no representations or warranties, whether express, implied or by estoppels, with respect to the content, information, material and recommendations herein and specifically disclaims any implied warranties of merchantability, fitness for any particular purpose and non- infringement. Multi-Tech Systems, Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Multi-Tech Systems, Inc. to notify any person or organization of such revisions or changes. Trademarks and Registered Trademarks MultiTech, and the MultiTech logo, and MultiConnect are registered trademarks and mDot, xDot, and Conduit are a trademark of Multi-Tech Systems, Inc. All other products and technologies are the trademarks or registered trademarks of their respective holders. Legal Notices The MultiTech products are not designed, manufactured or intended for use, and should not be used, or sold or re-sold for use, in connection with applications requiring fail-safe performance or in applications where the failure of the products would reasonably be expected to result in personal injury or death, significant property damage, or serious physical or environmental damage.
    [Show full text]
  • Configuring Your Login Session
    SSCC Pub.# 7-9 Last revised: 5/18/99 Configuring Your Login Session When you log into UNIX, you are running a program called a shell. The shell is the program that provides you with the prompt and that submits to the computer commands that you type on the command line. This shell is highly configurable. It has already been partially configured for you, but it is possible to change the way that the shell runs. Many shells run under UNIX. The shell that SSCC users use by default is called the tcsh, pronounced "Tee-Cee-shell", or more simply, the C shell. The C shell can be configured using three files called .login, .cshrc, and .logout, which reside in your home directory. Also, many other programs can be configured using the C shell's configuration files. Below are sample configuration files for the C shell and explanations of the commands contained within these files. As you find commands that you would like to include in your configuration files, use an editor (such as EMACS or nuTPU) to add the lines to your own configuration files. Since the first character of configuration files is a dot ("."), the files are called "dot files". They are also called "hidden files" because you cannot see them when you type the ls command. They can only be listed when using the -a option with the ls command. Other commands may have their own setup files. These files almost always begin with a dot and often end with the letters "rc", which stands for "run commands".
    [Show full text]
  • 2017 Noise Requirements
    DEPARTMENT OF TRANSPORTATION Noise Requirements for MnDOT and other Type I Federal-aid Projects Satisfies FHWA requirements outlined in 23 CFR 772 Effective Date: July 10, 2017 Website address where additional information can be found or inquiries sent: http://www.dot.state.mn. u /environment/noise/index.html "To request this document in an alternative format, contact Janet Miller at 651-366-4720 or 1-800-657-3774 (Greater Minnesota); 711or1-800-627-3529 (Minnesota Relay). You may also send an e-mail to [email protected]. (Please request at least one week in advance). MnDOT Noise Requirements: Effective Date July 10, 2017 This document contains the Minnesota Department of Transportation Noise Requirements (hereafter referred to as 'REQUIREMENTS') which describes the implementation of the requirements set forth by the Federal Highway Administration Title 23 Code of Federal Regulations Part 772: Procedures for Abatement of Highway Traffic Noise and Construction Noise. These REQUIREMENTS also describe the implementation of the requirements set forth by Minnesota Statute 116.07 Subd.2a: Exemptions from standards, and Minnesota Rule 7030: Noise Pollution Control. These REQUIREMENTS were developed by the Minnesota Department of Transportation and reviewed and approved with by the Federal Highway Administration. C,- 2.8-{7 Charles A. Zelle, Commissioner Date Minnesota Department of Transportation toJ;.11/11 Arlene Kocher, Divi lronAdmini ~ rator Date I Minnesota Division Federal Highway Administration MnDOT Noise Requirements: Effective
    [Show full text]
  • Standard TECO (Text Editor and Corrector)
    Standard TECO TextEditor and Corrector for the VAX, PDP-11, PDP-10, and PDP-8 May 1990 This manual was updated for the online version only in May 1990. User’s Guide and Language Reference Manual TECO-32 Version 40 TECO-11 Version 40 TECO-10 Version 3 TECO-8 Version 7 This manual describes the TECO Text Editor and COrrector. It includes a description for the novice user and an in-depth discussion of all available commands for more advanced users. General permission to copy or modify, but not for profit, is hereby granted, provided that the copyright notice is included and reference made to the fact that reproduction privileges were granted by the TECO SIG. © Digital Equipment Corporation 1979, 1985, 1990 TECO SIG. All Rights Reserved. This document was prepared using DECdocument, Version 3.3-1b. Contents Preface ............................................................ xvii Introduction ........................................................ xix Preface to the May 1985 edition ...................................... xxiii Preface to the May 1990 edition ...................................... xxv 1 Basics of TECO 1.1 Using TECO ................................................ 1–1 1.2 Data Structure Fundamentals . ................................ 1–2 1.3 File Selection Commands ...................................... 1–3 1.3.1 Simplified File Selection .................................... 1–3 1.3.2 Input File Specification (ER command) . ....................... 1–4 1.3.3 Output File Specification (EW command) ...................... 1–4 1.3.4 Closing Files (EX command) ................................ 1–5 1.4 Input and Output Commands . ................................ 1–5 1.5 Pointer Positioning Commands . ................................ 1–5 1.6 Type-Out Commands . ........................................ 1–6 1.6.1 Immediate Inspection Commands [not in TECO-10] .............. 1–7 1.7 Text Modification Commands . ................................ 1–7 1.8 Search Commands .
    [Show full text]
  • Graph Dot — Dot Charts (Summary Statistics)
    Title stata.com graph dot — Dot charts (summary statistics) Description Quick start Menu Syntax Options Remarks and examples References Also see Description graph dot draws horizontal dot charts. In a dot chart, the categorical axis is presented vertically, and the numerical axis is presented horizontally. Even so, the numerical axis is called the y axis, and the categorical axis is still called the x axis: . graph dot (mean) numeric_var, over(cat_var) x first group ......o.............. second group ..........o.......... 0 2 4 6 8 The syntax for dot charts is identical to that for bar charts; see[ G-2] graph bar. We use the following words to describe a dot chart: x axis Group 1 ..........o............... Group 2 ..............o........... Group 3 ..................o....... <- lines Group 4 ......................o... 0 1 2 3 4 5 <- y axis The above dot chart contains four lines. The words used to describe a line are marker / .............o............ distance \ dots Quick start Dot graph showing the mean of v1 graph dot v1 As above, with dots for the means of v1 and v2 on a single line graph dot v1 v2 As above, but with dots for the means of v1 and v2 on separate lines graph dot v1 v2, ascategory 1 2 graph dot — Dot charts (summary statistics) As above, with dots showing the means of v1 and v2 for each level of categorical variable catvar1 graph dot v1 v2, over(catvar1) Include missing values of catvar1 as their own category graph dot v1 v2, over(catvar1) missing Dot graph with dots for each combination of the levels of catvar1 and catvar2
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Unix Login Profile
    Unix login Profile A general discussion of shell processes, shell scripts, shell functions and aliases is a natural lead in for examining the characteristics of the login profile. The term “shell” is used to describe the command interpreter that a user runs to interact with the Unix operating system. When you login, a shell process is initiated for you, called your login shell. There are a number of "standard" command interpreters available on most Unix systems. On the UNF system, the default command interpreter is the Korn shell which is determined by the user’s entry in the /etc/passwd file. From within the login environment, the user can run Unix commands, which are just predefined processes, most of which are within the system directory named /usr/bin. A shell script is just a file of commands, normally executed at startup for a shell process that was spawned to run the script. The contents of this file can just be ordinary commands as would be entered at the command prompt, but all standard command interpreters also support a scripting language to provide control flow and other capabilities analogous to those of high level languages. A shell function is like a shell script in its use of commands and the scripting language, but it is maintained in the active shell, rather than in a file. The typically used definition syntax is: <function-name> () { <commands> } It is important to remember that a shell function only applies within the shell in which it is defined (not its children). Functions are usually defined within a shell script, but may also be entered directly at the command prompt.
    [Show full text]
  • Command Line Interface (Shell)
    Command Line Interface (Shell) 1 Organization of a computer system users applications graphical user shell interface (GUI) operating system hardware (or software acting like hardware: “virtual machine”) 2 Organization of a computer system Easier to use; users applications Not so easy to program with, interactive actions automate (click, drag, tap, …) graphical user shell interface (GUI) system calls operating system hardware (or software acting like hardware: “virtual machine”) 3 Organization of a computer system Easier to program users applications with and automate; Not so convenient to use (maybe) typed commands graphical user shell interface (GUI) system calls operating system hardware (or software acting like hardware: “virtual machine”) 4 Organization of a computer system users applications this class graphical user shell interface (GUI) operating system hardware (or software acting like hardware: “virtual machine”) 5 What is a Command Line Interface? • Interface: Means it is a way to interact with the Operating System. 6 What is a Command Line Interface? • Interface: Means it is a way to interact with the Operating System. • Command Line: Means you interact with it through typing commands at the keyboard. 7 What is a Command Line Interface? • Interface: Means it is a way to interact with the Operating System. • Command Line: Means you interact with it through typing commands at the keyboard. So a Command Line Interface (or a shell) is a program that lets you interact with the Operating System via the keyboard. 8 Why Use a Command Line Interface? A. In the old days, there was no choice 9 Why Use a Command Line Interface? A.
    [Show full text]