Guide to Unix using Linux Key Terms Chp 1

 Guide to Unix using Linux Key Terms Chp 1

 

 

 

Terms Definitions

UNIX/Linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
a. superuser c. multitasking
b. peer-to-peer d. multiuser

d. multiuser
UNIX and Linux are ____ systems, which allow one user to execute more than one program at a time.
a. server-based c. multitasking
b. peer-to-peer d. multiuser

c. multitasking
____ is an Internet terminal emulation program.

c. Telnet
Currently, the ____ project, a joint effort of experts from industry, academia, and government, is working to standardize UNIX.
a. POSIX c. ANSI
b. BSD d. Ubuntu

a. POSIX
Stephen Bourne at AT&T Bell Labs developed the ____ shell as the first UNIX command processor.
a. Bash c. C
b. Bourne d. Korn

b. Bourne
Linux uses the freeware ____ shell as its default command interpreter.
a. Bash c. C
b. Bourne d. Korn

a. Bash
You can use the ____ command to show the system calendar.
a. clndr c. cal
b. syscal d. calendar

c. cal
To determine information about who is logged in, you can use the ____ command.
a. whatis c. whois
b. who d. whoami

b. who
In the Linux Bash shell, the ____ key combination moves the cursor to the previous letter.
a. Ctrl+b c. Alt+l
b. Alt+d d. Ctrl+a

a. Ctrl+b
In the Linux Bash shell, the ____ key combination deletes the content of the command line from the current cursor position to the end of the command line.
a. Ctrl+b c. Ctrl+k
b. Alt+d d. Ctrl+a

c. Ctrl+k

 

 

Argument

Text that provides UNIX/LINUX with additional information for executing a command. On the command line, an argument name follows an option name, and a space separates the two. Example are file and directory names.

Authentication

The process of verifying that a user is authorized to access a particular computer, server, network, or network resource, such as Telnet or FTP

 

Bash Shell

A UNIX/LINUX command interpreter (and the default Linux shell ) Incorporates the best features of the Bourne shell and the Korn shell. Its name is an acronym for Bourne Again Shell.

Berkeley Software Distribution (BSD)

A distribution of UNIX developed through the University of California at Berkeley, which first distirbuted the BSD UNIX version in 1975.

 

Bourne Shell

The first UNIX/Linux command interpreter, developed at AT&T Bell Labs by Stephen Bourne.

 

C Shell

A UNIX/Linux command interpreter designed for C programmers.

 

Case sensitive

A property that distinguishes uppercase letters from lowercase letters.



Client

A computer on a network running programs or accessing files from a mainframe, network server, or host computer.

 

Command

Text typed after the command line prompt which requests that the computer take a specific action.

Command Line

The onscreen location for typing commands.

 

Domain Name

A name that identifies a grouping of computer resources on a network. Internet-based domain names consist of three parts: a top-level domain, a sub domain and a host name.

FTP File Transfer Protocol

An internet protocol for sending and receiving files.

GUI

Software that transforms bitmaps into an infinite variety of images, so that when you use an operating system you see graphical images.

IP address

A set of four numbers separated by periods. and used to identify and access remote computers on a network or over the internet.

Kernal

The basic operating system, which interacts directly with the hardware and services user programs.

Kernel Mode

A means of accessing the kernel. Its use is limited to the system administrator to prevent unauthorized actions from interfering with the hardware that supports the entire UNIX / Linux structure.

Korn Shell

A UNIX/Linux command interpreter that offers more feature than the original Bourne shell. Developed by David Korn at AT&T Bell labs.

 

Log in

A process that protects privacy and safeguards a mulituser system by requiring each user to type a user name and password before using the system.

Mainframe

A large computer that has historically offered extensive processing, mass storage, and client access for industrial-strengthcp,computing. Mainframes are still in use today, but many have been replaced by PC-type computers that are designed as servers with powerful processing and disk storage capabilities.

 

Man Pages

The online manual pages for UNIX/Linux commands and programs that can be accessed by entering man plus the name of the command or program.

Multitasking System

A system in which many people can simultaneously access and share a server computer’s resources. To protect privacy and safeguard the system, each user must type a user name and password in order to user, or log in to, the system. UNIX and Linux are multiuser systems.

 

Network

A group of computers connected by network cable or wireless communications to allow many users to share computer’s resources and files. It combines and convience and familiarity of the personal computer with the processing power of a mainframe.

 

Operating System (OS)

The most fundamental computer program, it controls all the computer’s resources and provides the base upon which

Guide to Unix using Linux Key Terms Chp 1

Guide to Unix using Linux Key Terms Chp 1

Terms Definitions
UNIX/Linux are ____ systems, which let many people simultaneously access and share the resources of a server computer.
a. superuser c. multitasking
b. peer-to-peer d. multiuser
d. multiuser
UNIX and Linux are ____ systems, which allow one user to execute more than one program at a time.
a. server-based c. multitasking
b. peer-to-peer d. multiuser
c. multitasking
____ is an Internet terminal emulation program.
c. Telnet
Currently, the ____ project, a joint effort of experts from industry, academia, and government, is working to standardize UNIX.
a. POSIX c. ANSI
b. BSD d. Ubuntu
a. POSIX
Stephen Bourne at AT&T Bell Labs developed the ____ shell as the first UNIX command processor.
a. Bash c. C
b. Bourne d. Korn
b. Bourne
Linux uses the freeware ____ shell as its default command interpreter.
a. Bash c. C
b. Bourne d. Korn
a. Bash
You can use the ____ command to show the system calendar.
a. clndr c. cal
b. syscal d. calendar
c. cal
To determine information about who is logged in, you can use the ____ command.
a. whatis c. whois
b. who d. whoami
b. who
In the Linux Bash shell, the ____ key combination moves the cursor to the previous letter.
a. Ctrl+b c. Alt+l
b. Alt+d d. Ctrl+a
a. Ctrl+b
In the Linux Bash shell, the ____ key combination deletes the content of the command line from the current cursor position to the end of the command line.
a. Ctrl+b c. Ctrl+k
b. Alt+d d. Ctrl+a
c. Ctrl+k




Argument

Text that provides UNIX/LINUX with additional information for executing a command. On the command line, an argument name follows an option name, and a space separates the two. Example are file and directory names.

Authentication

The process of verifying that a user is authorized to access a particular computer, server, network, or network resource, such as Telnet or FTP

Bash Shell

A UNIX/LINUX command interpreter (and the default Linux shell ) Incorporates the best features of the Bourne shell and the Korn shell. Its name is an acronym for Bourne Again Shell.

Berkeley Software Distribution (BSD)

A distribution of UNIX developed through the University of California at Berkeley, which first distirbuted the BSD UNIX version in 1975.

Bourne Shell

The first UNIX/Linux command interpreter, developed at AT&T Bell Labs by Stephen Bourne.

C Shell

A UNIX/Linux command interpreter designed for C programmers.

Case sensitive

A property that distinguishes uppercase letters from lowercase letters.


Client

A computer on a network running programs or accessing files from a mainframe, network server, or host computer.

Command

Text typed after the command line prompt which requests that the computer take a specific action.

Command Line

The onscreen location for typing commands.

Domain Name

A name that identifies a grouping of computer resources on a network. Internet-based domain names consist of three parts: a top-level domain, a sub domain and a host name.

FTP File Transfer Protocol

An internet protocol for sending and receiving files.

GUI

Software that transforms bitmaps into an infinite variety of images, so that when you use an operating system you see graphical images.

IP address

A set of four numbers separated by periods. and used to identify and access remote computers on a network or over the internet.

Kernal

The basic operating system, which interacts directly with the hardware and services user programs.

Kernel Mode

A means of accessing the kernel. Its use is limited to the system administrator to prevent unauthorized actions from interfering with the hardware that supports the entire UNIX / Linux structure.

Korn Shell

A UNIX/Linux command interpreter that offers more feature than the original Bourne shell. Developed by David Korn at AT&T Bell labs.

Log in

A process that protects privacy and safeguards a mulituser system by requiring each user to type a user name and password before using the system.

Mainframe

A large computer that has historically offered extensive processing, mass storage, and client access for industrial-strengthcp,computing. Mainframes are still in use today, but many have been replaced by PC-type computers that are designed as servers with powerful processing and disk storage capabilities.

Man Pages

The online manual pages for UNIX/Linux commands and programs that can be accessed by entering man plus the name of the command or program.

Multitasking System

A system in which many people can simultaneously access and share a server computer’s resources. To protect privacy and safeguard the system, each user must type a user name and password in order to user, or log in to, the system. UNIX and Linux are multiuser systems.

Network

A group of computers connected by network cable or wireless communications to allow many users to share computer’s resources and files. It combines and convience and familiarity of the personal computer with the processing power of a mainframe.

Operating System (OS)

The most fundamental computer program, it controls all the computer’s resources and provides the base upon which
إغلاق جهازك الماك من Terminal

إغلاق جهازك الماك من Terminal

إغلاق جهازك الماك من Terminal

 

يمكن إيقاف تشغيل ال”ماك” الخاص بك بشكل صحيح لتجنب تكبد مشاكل مثل تعطل بعض الملفات في النظام. كل ما يتطلبه الأمر هو القليل من الصبر والقليل من الروتين الصحيح. يمكنك استخدام القائمة Apple لإيقاف جهاز الكمبيوتر الخاص بك، ووضعها على النوم، أو إعادة تشغيله، ولكن مع الـ “Terminal” يمكنك تحديد المزيد من الخيارات لاغلاق جهازك، بما في ذلك تسجيل خروج كافة المستخدمين ووضع أوقات معينة لإغلاق جهاز نظام التشغيل Mac الخاص بك. وهذه الأوامر هي في متناول يديك، وبالاضافة إلى ذلك حتى إذا كنت تدير الخادم أو ماك عن بعد من خلال SSH. بإمكانك متابعة القراءة لمعرفة المزيد.

 

إيقاف التشغيل Shutting Down

Terminal-shutdown-1

لإيقاف تشغيل جهازك ال”ماك”، يمكنك استخدام او كتابة الأمر التالي للقيام بذلك على

sudo shutdown -h now

 

h- يعطي الأمر لجهازك ويعلمه بالإيقاف التشغيل. بعد تنفيذ الأمر باستخدام كلمة المرور الرئيسية للنظام سيتم إيقاف تشغيل الجهاز، او عن طريق الحصول على صلاحيات الإدارة التي تتيح لك المجال أن تستدعي إيقاف تشغيل الجهاز.

 

إعادة التشغيل Rebooting

 

Terminal-shutdown-2

لإعادة تشغيل الجهاز، بإمكانك استخدام الأمر التالي لإعادة التشغيل:

sudo shutdown -r now

r- ينفذ عملية إعادة التشغيل ضمن أمر إعادة التشغيل. بعد تنفيذ الأمر سيتم إعادة التشغيل مباشرة.

 

وضعية النوم Sleeping

Terminal-shutdown-3

لوضع جهازك في وضع النوم أو وضع توفير الطاقة، بإمكانك استخدام الأمر التالي:

sudo shutdown -s now

Terminal-shutdown-5

عند تفعيل الأمر، سيتم وضع الجهاز في وضع توفير للطاقة. وان كنت تستخدم SSH البروتوكول الخاص بتشفير الاتصال وتأمين الاتصال. يجب عليك التأكد من إتاحة الخيار التالي “Wake for network access” من الخطوات التالية: System Preferences > Energy Saver

لن تتمكن من الدخول على الجهاز عن بعد إلا ان تم تشغيله يدويا بتحريك الفأرة أو الضغط على زر التشغيل أو الضغط على زر لوحة المفاتيح.

 

إستخدام إيقاف مؤقت Using a Timed Shutdown

في الأوامر السابقة تم استخدام “now” بعد كتابة الأمر المرغوب به. بحيث يقوم بإعطاء الأوامر للجهاز بالتنفيذ الفوري. ومع ذلك، بإمكانك ان تعطي الأمر للجهاز بالايقاف او وضعه في وضعية النوم او موفر للطاقة بعد فترة زمنية معينة. بإمكانك استخدام احدى الطرق التالية:

 

في وقت معين

 

بإمكانك إيقاف تشغيل الجهاز،إعادة تشغيل الجهاز، وضع النوم للجهاز، في وقت معين باستبدال “now” باستخدام احد التنسيقات التالية للتواقيت على سبيل المثال: yymmddhhmm . 

بحيث يبدأ ب “yy” أي السنة يتم كتابة العام المرغوب حسب التوقيت المتوفر في الجهاز، و “mm” الشهر اي في اي

شهر تريد، “dd” اليوم، “hh” الساعة بنظام ال24 ساعة، “mm” الدقيقة/الدقائق.

في المثال التالي أرغب في إيقاف تشغيل الجهاز في الساعة

So, if for instance, we wanted the computer to restart at 3:30pm on January 1, 2013, we’d issue the following command:

sudo shutdown -r 1301011530

After executing the command, you’ll be given the date and time of the shutdown in your system’s format, along with the process id (pid).

 

المصدر الرئيسي

إغلاق جهازك الماك من Terminal

إغلاق جهازك الماك الخاص بك من Terminal

إغلاق جهازك الماك الخاص بك من Terminal

Terminal 101 إغلاق جهازك الماك الخاص بك

يمكن إيقاف تشغيل ال”ماك” الخاص بك بشكل صحيح لتجنب تكبد مشاكل مثل تعطل بعض الملفات في النظام. كل ما يتطلبه الأمر هو القليل من الصبر والقليل من الروتين الصحيح. يمكنك استخدام القائمة Apple لإيقاف جهاز الكمبيوتر الخاص بك، ووضعها على النوم، أو إعادة تشغيله، ولكن مع الـ “Terminal”&nbsp;يمكنك تحديد المزيد من الخيارات لاغلاق جهازك، بما في ذلك تسجيل خروج كافة المستخدمين ووضع أوقات معينة لإغلاق جهاز نظام التشغيل Mac الخاص بك. وهذه الأوامر هي في متناول يديك، وبالاضافة إلى ذلك حتى إذا كنت تدير الخادم أو ماك عن بعد من خلال SSH. بإمكانك متابعة القراءة لمعرفة المزيد.</div>

إيقاف التشغيل Shutting Down

لإيقاف تشغيل جهازك ال”ماك”، يمكنك استخدام او كتابة الأمر التالي للقيام بذلك على الفور:

sudo shutdown -h now 

المصدر الرئيسي
Terminal 101 إغلاق جهازك الماك الخاص بك