Chapter 5 Flashcards

1
Q

ACL

A

An access control list (ACL) is a list of users or groups and the permissions they’re given. Linux ACLs, like Linux owner, group, and world permissions, consist of three permission bits, one each for read, write, and execute permissions. The file’s owner can assign ACLs to an arbitrary number of users and groups, making ACLs more flexible than Linux permissions, which are limited to groups defined by the system administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cp

A

The cp command copies a file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cpio

A

cpio
The cpio program is similar in principle to tar, but the details of its operation differ. As with tar, you can direct its output straight to a tape device or to a regular file. Backing up to a tape device can be a convenient way to back up the computer because it requires no intermediate storage. To restore data, you use cpio to read directly from the tape device file or from a regular file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Disk quota

A

A limit on the amount of disk space that an individual or group may use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FAT

A

FAT
A simple filesystem using a table to index files on a block device (floppy or hard disk). It comes in the varieties of FAT-12 (MS-DOS), FAT-16 (MS-DOS, MS-Windows 3.x) and “FAT-32” (MS-Windows 9x).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

FHS

A

A standard that defines the names and contents of critical directories in a Linux filesystem (meaning 2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

File globbing

A

The process of wildcard expansion-for instance, matching the existing file glossary.txt when the string glos*.txt is typed. Also called globbing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Filesystem Hierarchy Standard (FHS)

A

A standard that defines the names and contents of critical directories in a Linux filesystem (meaning 2).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Filesystem Standard (FSSTND)

A

An early attempt to define the names and contents of critical directories in a Linux filesystem (meaning 2). The FSSTND has been supplanted by the FHS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

FSSTND

A

An early attempt to define the names and contents of critical directories in a Linux filesystem (meaning 2). The FSSTND has been supplanted by the FHS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GID

A

A number associated with a particular group. Similar to a user ID (UID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Globbing

A

Filename expansion using asterisks (*), question marks (?), and so on is sometimes called globbing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Group ID (GID)

A

A number associated with a particular group. Similar to a user ID (UID).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hard Link

A

A directory entry for a file that has another directory entry. All hard links are equally valid ways of accessing a file, and all must be deleted in order to delete a file. See also soft link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Incremental backup

A

Incremental backup
A type of backup in which only files that have changed since the last backup are backed up. This is used to reduce the time required to back up a computer, at the cost of potentially greater restoration complexity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is

A

The ls command displays the names of files in a directory.

17
Q

mkdir

A

The mkdir command creates a directory.

18
Q

mv

A

The mv command (short for move) is commonly used both to move files and directories from one location to another and to rename them. Linux doesn’t distinguish between these two types of operations, although many users do.

19
Q

Permission Bit

A

A single bit used to define whether a given user or class of users has a particular type of access to a file. For instance, the owner’s execute permission bit determines whether the owner can run a file as a program. The permission bits together make up the file’s mode.

20
Q

rm

A

To delete a file, use the rm command, whose name is short for remove.

21
Q

rmdir

A

The rmdir command is the opposite of mkdir; it destroys a directory.

22
Q

SGID

A

The set group ID (SGID) option is similar to the SUID option, but it sets the group of the running program to the group of the file. It’s indicated by an s in the group execute bit position in the permission string, as in rwxr-sr-x. When the SGID bit is set on a directory, new files or subdirectories created in the original directory will inherit the group ownership of the directory, rather than be based on the user’s current default group.

23
Q

Shareable files

A

Files that can be reasonably shared with another computer, as in users’ home directory files and program files in /opt or /usr.

24
Q

Socket

A

A programming construct enabling connection to network connection endpoints (the combination of IP addresses and port numbers).

25
Q

Soft link

A

A type of file that refers to another file on the computer. When a program tries to access a soft link, Linux passes the contents of the linked-to file to the program. If the linked-to program is deleted, the soft link stops working. Deleting the soft link doesn’t affect the original file. Also referred to as a symbolic link. See also hard link.

26
Q

Sticky Bit

A

The sticky bit has changed meaning during the course of Unix history. In modern Linux implementations (and most modern versions of Unix), it’s used to protect files from being deleted by those who don’t own the files. When this bit is present on a directory, the directory’s files can be deleted only by their owners, the directory’s owner, or root. The sticky bit i indicated by a t in the world execute bit position, as in rwxr-xr-t.

27
Q

SUID

A

The set user ID (SUID) option is used in conjunction with executable files, and it tells Linux to run the program with the permissions of whoever owns the file rather than with the permissions of the user who runs the program.

28
Q

Superuser

A

A user with extraordinary rights to manipulate critical files on the computer. The superuser’s username is normally root.

29
Q

Symbolic link

A

A type of file that refers to another file on the computer. When a program tries to access a soft link, Linux passes the contents of the linked-to file to the program. If the linked-to program is deleted, the soft link stops working. Deleting the soft link doesn’t affect the original file. Also referred to as a symbolic link. See also hard link.

30
Q

tar

A

The tar program’s name stands for “tape archiver.” Despite this fact, you can use tar to archive data to other media. In fact, tarballs (archive files created by tar and typically compressed with gzip or bzip2) are often used for transferring multiple files between computers in one step, such as when distributing source code.

31
Q

UID

A

A number associated with a particular account. Linux uses the UID internally for most operations, and it converts to the associated username only when interacting with people.

32
Q

umask

A

A bit pattern representing the permission bits that are to be removed from new files as they’re created by processes.

33
Q

User ID (UID)

A

A number associated with a particular account. Linux uses the UID internally for most operations, and it converts to the associated username only when interacting with people.

34
Q

Variable

A

In computer programming or scripting, a placeholder for data. Variables may change from one run of a program to another or even during a single run of a program.

35
Q

Variable file

A

A file whose data may change at any time. Examples include user data files and queues maintained by servers.

36
Q

whereis

A

The whereis program searches for files in a restricted set of locations, such as standard binary file directories, library directories, and man page directories. This tool does not search user directories or many other locations that are easily searched by find or locate.

37
Q

Wildcard

A

A character or group of characters that, when used in a shell as part of a filename, matches more than one character. For instance, b??k matches book, back, and buck, among many other possibilities.