SlideShare una empresa de Scribd logo
1 de 39
Company
LOGO
1.   Overview of Unix System
2.   Basic Commands
3.   Relative & Absolute Path
4.   Redirect, Append and Pipe
5.   Permission
6.   Process Management
7.   Install Software
8.   Text Editor
9.   Foreground and Background Jobs
Overview of Unix System

Kernel & Shell
   Unix/Linux is operating system (OS).
   Unix system is described as kernel & shell.

   Kernel is a main program of Unix system.      User
    it controls hard wares, CPU, memory, hard
    disk, network card etc.                              input


   Shell is an interface between user and                Shell
    kernel. Shell interprets your input as
    commands and pass them to kernel.
                                                          Kernel
Unix Overview (cont.)

Multi-user & Multi-process
 Many people can use one machine at the same time.

File & Process
 Data, directory, process, hard disk etc (almost everything)
   are expressed as a file.
 Process is an running program identified by a unique id
   (PID).
Unix Overview (cont.)
Directory Structure
 Files are put in a directory.
 All directories are in a hierarchical structure (tree
  structure).
 User can put and remove any directories on the tree.
 Top directory is “/”, which is called slash or root.
 Users have the own directory. (home directory)
Unix Overview (cont.)
Directory Structure
Unix Overview (cont.)

Important Directories
   /bin This contains files that are essential for correct
    operation of the system. These are available for use by all
    users.

   /home This is where user home directories are stored.

   /var This directory is used to store files which change
    frequently, and must be available to be written to.

   /etc   Various system configuration files are stored here.
Unix Overview (cont.)

Important Directories
   /dev This contains various devices as files, e.g. hard
                 disk, CD-ROM drive, etc.

   /sbin Binaries which are only expected to be used by
          the super user.

   /tmp   Temporary files.
Unix Overview (cont.)

Normal user and Super user
 In Unix system, there is one special user for administrator, which
  can do anything.
 This special user is called root or superuser.

Case Sensitivity
 Unix is case-sensitive.
 MYFILE.doc, Myfile.doc, mYfiLe.Doc are different.

Online Manual
 Unix has well-written online manuals.
Basic Commands

How to run commands
   Finder => Application => Utilitaires => Terminal
   When you log on Unix machine, you will see,

[someone]$

   One command consists of three parts, i.e. command
    name, options, arguments.

Example)
[someone~]$ command-name optionA optionB argument1 argument2
Basic Commands

How to run commands
   Between command name, options and arguments, space is
    necessary.

   Opitions always start with “-”

   Example:
    cd ..
    ls –l .bashrc
    mv fileA fileB
Basic Commands

Commands
   ls                show files in current position
   cd                change directory
   cp                copy file or directory
   mv                move file or directory
   rm                remove file or directory
   pwd               show current position
   mkdir             create directory
   rmdir             remove directory
   less, more, cat   display file contents
   man               display online manual
Basic Commands

Commands
   su         switch user
   passwd     change password
   useradd    create new user account
   userdel    delete user account
   mount      mount file system
   umount     unmount file system
   df or du   show disk space usage
   shutdown   reboot or turn off machine
Basic Commands

1. Type following command in   3. In your home directory,
    your directory.                ls .bash_profile
                                   cp .bash_profile sample.txt
    ls
                                   less sample.txt (note: to quit less, press “q”)
    ls –a
                                   rm sample.txt
    ls –la
    ls -Fa
                               4. check disk space usage
2. Make a directory
                                   df
    mkdir linux                    df -h
    pwd
    cd linux
    pwd
    cd
    pwd
    rmdir linux
Relative & Absolute Path

 Path means a position in the directory tree.
 To express a path, you can use relative path or
  absolute path.
 In relative path expression, the path is not defined
  uniquely, depends on your current path.
 In absolute path expression, the path is defined
  uniquely, does not depend on your current path.
Absolute Path

 Address from the root
      /home/linux/
      ~/linux
      ~: ~: Alt+N

 Similar to:
       Lausanne University/Lausanne/Canton de Vaud/
  Switzerland/Europe/Earth/Solar System/
Relative Path

 Relative to your current location
      . : your current location
      .. : one directory above your current location
      pwd: gives you your current location

 Example
      ls ./linux : lists the content of the dir linux
      ls ../../ : lists everything that is two dir higer

 Similar to:
      Go Left/turn right/take the TSOL/go
Relative & Absolute Path

 Relative Path        Ablsoute Path
  pwd                   cd
  cd .                  mkdir mydir
                        pwd
  pwd
                        cd /Users/invite
  cd ..
                        pwd
  pwd
                        cd /Users
  cd ..                 pwd
  pwd                   cd /
  cd                    pwd
                        cd /Users/invite
                        cd ~/mydir
Redirect, Append and Pipe

Redirect and append
   Output of command is displayed on screen.
   Using “>”, you can redirect the output from screen to a file.
   Using “>>” you can append the output to the bottom of the file.



Pipe
   Some commands require input from a file or other commands.
   Using “|”, you can use output from other command as input to the command.
   On MacOSX, The Pipe sign: (Shift+Alt+N: franc, Alt+7)
Redirect, Append and Pipe

Commands
   head          show first several lines and omit other lines.

   tail          show last several lines and omit      other lines.

   grep XXX File show lines matching pattern XXX in File
Redirect, Append and Pipe

   In home directory, type                 Use pipe.
    ls -1 > sample.txt                        less redirect.txt
    less sample.txt                           grep Desk redirect.txt
   Use redirect.                             grep –n Desk redirect.txt
    head -3 sample.txt                        man grep
    head -3 sample.txt > redirect.txt         tail redirect.txt | grep Desk
   Use append.                               rm sample.txt
    tail -3 sample.txt                        rm redirect.txt
    tail -3 sample.txt >> redirect.txt
    less redirect.txt
Sorting

Commands
   sort    Sorts using the first field of each line.

   -n      Sorts considering the numeric value of the strings
   -k3     Sorts using the third field of each line
   -rnk3   Sorts in reverse order, using the numeric value of
            the third field
Redirect, Append and Pipe

   Identify the largest file in a directory:

                         ls –la /bin/ | sort –nk5 | tail -1
Permission

 All of files and directories have owner and permission.
 There are three types of permission, readable, writeable and
  executable.
 Permissions are given to three kinds of group. owner, group
  member and others.

Example:
    ls -l .bash_profile
       -rw-r--r-- 1 cnotred   cnotred   191 Jan 4 13:11 .bash_profile

     r:readable, w:writable, x: executable
Permission

Command
 chmod                   change file mode, add or remove
                                 permission
 chown                   change owner of the file

Example)
   chmod a+w filename
                add writable permission to all users
   chmod o-x filename
                remove executable permission from others
   chmod a+x
                Gives permission to the usser to execute a file

 u: user (owner),        g: group,         o: others         a: all
Permission

   Check permission
    ls –l .bash_profile
    cp .bash_profile sample.txt
    ls –l sample.txt

   Remove readable permission from all.
    chmod a-r sample.txt
    ls –l sample.txt
    less sample.txt

   Add readable & writable premissions to file owner.
    chmod u+rw sample.txt
    ls –l sample.txt
    less sample.txt
    rm sample.txt
Process Management
     Process is a unit of running program.

     Each process has some information, like process
      ID, owner, priority, etc.




Example) Output of “top” command
Process Management
Commands
 kill      Stop a program. The program is
            specified by process ID.
 killall   Stop a program. The program is
            specified by command name.
 ps        Show process status
 top       Show system usage statistics
Process Management

   Check your process.
    ps
    ps –u

   Check process of all
    users.
    top (To quit top, press
    “q”)
    ps –e
    ps –ef

   Find your process.

    ps –ef | grep cnotred
Install Software

Commands
 Zypper
 New installation command introduced first in 10.2 release
 Transparant and simple
 Function :
      Install
      Update
      Search
      Remove
      Reduced Dependency Problem
Install Software
 Common paramater:
    zypper # to print the list of available global options and

     commands
    zypper help search # to print help for the search command

    zypper lp # to see what patch updates are needed

    zypper patch # to apply the needed patches

    zypper se sqlite # to search for sqlite

    zypper rm sqlite2 # to remove sqlite2

    zypper in sqlite3 # to install sqlite3

    zypper in yast* # to install all packages matching 'yast*'

    zypper up # to update all installed packages with newer

     versions, where possible
Text Editor

pico
 Programs & configuration files are text file.
 There are two popular text editors, vi and Emacs.
 Although they are very powerful and useful, it is also true that
  they are complicated for beginners and difficult to learn.
 pico is an easy and simple alternative.
Text Editor


Commands
   Arrow-keys Move cursor
   CTRL+a Move to the beginning of the current line.
   CTRL+e Move to the end of the current line.
   CTRL+v Move forward one page.
   CTRL+y Move backward one page.
   CTRL+w Search for text.
   CTRL+d Delete the current character.
   CTRL+k Remove (cut) current line or selected text.
   CTRL+u Paste (uncut) last cut text at the cursor position.
   CTRL+o Save (output) the file.
   CTRL+x Exit Pico, saving the file.

   Autre: xemacs, emacs
Text Editor


   Create the file Hello
    pico hello.pl

   Write hello.pl as follows.

    #!/usr/bin/perl
    print “Hello Worldn”;


   Make il executable
    chmod u+x hello.pl

   Run it!
    ./hello.pl
Foreground and
                                     Background

 Running job has two modes, “foreground” and “background”

 If program is running as “background”,
  the program keeps running even after your session was
  closed

 If program is running as “foreground”,
      Ctrl-C    stop program
      Ctrl-Z    let program background
Foreground and
                                    Background

   To run programs in background mode, use “&”
    [nomura@ssc-1]$ command &


 To get background job back into foreground mode, use “fg”
  command.
  [nomura@ssc-1]$ fg
Remote Login & File
                                   Transfer

   • rshd, telnetd, ftpd, sshd are server program
   and provide similar services, remote login & file
   transfer.
   • The major difference is security level.
           rshd < telnetd + ftpd < sshd

Commands
Client                   Server
 rsh & rcp
                          rshd
 telnet & ftp
 ssh & scp
                          telnetd & ftpd
                          sshd
Remote Login & File
                                     Transfer

Remote login & file transfer system are based on
server and client model. client program on your
machine ask sever program certain service remote
machine.

For example, telnet server provides remote login
service. ftp server provides file transfer service.

Sample client programs;
       WS FTP               FTP client
       Internet Exploror    HTTP client
       Eudora               POP, SMTP client
Tutorial of Unix/Linux


 END


        Company
        LOGO

Más contenido relacionado

La actualidad más candente (20)

Basic commands of linux
Basic commands of linuxBasic commands of linux
Basic commands of linux
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Know the UNIX Commands
Know the UNIX CommandsKnow the UNIX Commands
Know the UNIX Commands
 
Commands
CommandsCommands
Commands
 
Linux commands
Linux commands Linux commands
Linux commands
 
One Page Linux Manual
One Page Linux ManualOne Page Linux Manual
One Page Linux Manual
 
Linux basic commands
Linux basic commandsLinux basic commands
Linux basic commands
 
Linux
LinuxLinux
Linux
 
Applecmdlista zs
Applecmdlista zsApplecmdlista zs
Applecmdlista zs
 
Linux commands and file structure
Linux commands and file structureLinux commands and file structure
Linux commands and file structure
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Unix practical file
Unix practical fileUnix practical file
Unix practical file
 
Introduction to UNIX Command-Lines with examples
Introduction to UNIX Command-Lines with examplesIntroduction to UNIX Command-Lines with examples
Introduction to UNIX Command-Lines with examples
 
Linux class 8 tar
Linux class 8   tar  Linux class 8   tar
Linux class 8 tar
 
Os lab manual
Os lab manualOs lab manual
Os lab manual
 
3. intro
3. intro3. intro
3. intro
 
Command Line Tools
Command Line ToolsCommand Line Tools
Command Line Tools
 
Linux
Linux Linux
Linux
 
Unix slideshare
Unix slideshareUnix slideshare
Unix slideshare
 
Linux command for beginners
Linux command for beginnersLinux command for beginners
Linux command for beginners
 

Destacado

Role of laboratory technicians for computer institutes
Role of laboratory technicians for computer institutesRole of laboratory technicians for computer institutes
Role of laboratory technicians for computer institutesPriti Srinivas Sajja
 
Computer Laboratory Rules
Computer Laboratory RulesComputer Laboratory Rules
Computer Laboratory RulesLUZ PINGOL
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptDot Rutherford
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 
Linux Administration
Linux AdministrationLinux Administration
Linux AdministrationHarish1983
 
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)Kantar
 
Daniel goodwin real estate law 140914
Daniel goodwin   real estate law 140914Daniel goodwin   real estate law 140914
Daniel goodwin real estate law 140914Gale Pooley
 
Aspergillosis Patient Support Meeting July 2011 - Sue Howard
Aspergillosis Patient Support Meeting July 2011 - Sue HowardAspergillosis Patient Support Meeting July 2011 - Sue Howard
Aspergillosis Patient Support Meeting July 2011 - Sue HowardGraham Atherton
 
Ch 30 the monetary system part 2
Ch 30 the monetary system part 2Ch 30 the monetary system part 2
Ch 30 the monetary system part 2Gale Pooley
 
Lecture 9 saving investment and the financial system
Lecture 9 saving investment and the financial systemLecture 9 saving investment and the financial system
Lecture 9 saving investment and the financial systemGale Pooley
 
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...Graham Atherton
 
Successful Ads in Saudi Arabia
Successful Ads in Saudi ArabiaSuccessful Ads in Saudi Arabia
Successful Ads in Saudi ArabiaKantar
 

Destacado (20)

SWC Lab Orientation 5-20-09
SWC Lab Orientation 5-20-09SWC Lab Orientation 5-20-09
SWC Lab Orientation 5-20-09
 
Ch2 Presentation
Ch2 PresentationCh2 Presentation
Ch2 Presentation
 
Role of laboratory technicians for computer institutes
Role of laboratory technicians for computer institutesRole of laboratory technicians for computer institutes
Role of laboratory technicians for computer institutes
 
Laptop maintenance
Laptop maintenanceLaptop maintenance
Laptop maintenance
 
Computer Laboratory Rules
Computer Laboratory RulesComputer Laboratory Rules
Computer Laboratory Rules
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab Ppt
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Products
ProductsProducts
Products
 
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)
BrandZ Top 100 Most Valuable Chinese Brands (Chinese Version)
 
Daniel goodwin real estate law 140914
Daniel goodwin   real estate law 140914Daniel goodwin   real estate law 140914
Daniel goodwin real estate law 140914
 
Aspergillosis Patient Support Meeting July 2011 - Sue Howard
Aspergillosis Patient Support Meeting July 2011 - Sue HowardAspergillosis Patient Support Meeting July 2011 - Sue Howard
Aspergillosis Patient Support Meeting July 2011 - Sue Howard
 
Lecture 8
Lecture 8Lecture 8
Lecture 8
 
Xamarin2.0
Xamarin2.0Xamarin2.0
Xamarin2.0
 
Wassup Ogilvy Asia's Cultural Trends Report
Wassup Ogilvy Asia's Cultural Trends ReportWassup Ogilvy Asia's Cultural Trends Report
Wassup Ogilvy Asia's Cultural Trends Report
 
Ch 30 the monetary system part 2
Ch 30 the monetary system part 2Ch 30 the monetary system part 2
Ch 30 the monetary system part 2
 
Lecture 9 saving investment and the financial system
Lecture 9 saving investment and the financial systemLecture 9 saving investment and the financial system
Lecture 9 saving investment and the financial system
 
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...
Bronchial embolisation to treat bleeding caused by chronic pulmonary aspergil...
 
Successful Ads in Saudi Arabia
Successful Ads in Saudi ArabiaSuccessful Ads in Saudi Arabia
Successful Ads in Saudi Arabia
 
Let it be - Beatles
Let it be - BeatlesLet it be - Beatles
Let it be - Beatles
 

Similar a An Introduction to Linux

linux-lecture4.ppt
linux-lecture4.pptlinux-lecture4.ppt
linux-lecture4.pptLuigysToro
 
The structure of Linux - Introduction to Linux for bioinformatics
The structure of Linux - Introduction to Linux for bioinformaticsThe structure of Linux - Introduction to Linux for bioinformatics
The structure of Linux - Introduction to Linux for bioinformaticsBITS
 
Linux presentation
Linux presentationLinux presentation
Linux presentationNikhil Jain
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdfGiovaRossi
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdfGiovaRossi
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdfGiovaRossi
 
Linux file system nevigation
Linux file system nevigationLinux file system nevigation
Linux file system nevigationhetaldobariya
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS
 
Module 02 Using Linux Command Shell
Module 02 Using Linux Command ShellModule 02 Using Linux Command Shell
Module 02 Using Linux Command ShellTushar B Kute
 
Linux Basic Commands
Linux Basic CommandsLinux Basic Commands
Linux Basic CommandsHanan Nmr
 
Presentation for RHCE in linux
Presentation  for  RHCE in linux Presentation  for  RHCE in linux
Presentation for RHCE in linux Kuldeep Tiwari
 
Linux file commands and shell scripts
Linux file commands and shell scriptsLinux file commands and shell scripts
Linux file commands and shell scriptsPrashantTechment
 

Similar a An Introduction to Linux (20)

linux-lecture4.ppt
linux-lecture4.pptlinux-lecture4.ppt
linux-lecture4.ppt
 
Directories description
Directories descriptionDirectories description
Directories description
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of Linux
 
Linux Shell Basics
Linux Shell BasicsLinux Shell Basics
Linux Shell Basics
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
The structure of Linux - Introduction to Linux for bioinformatics
The structure of Linux - Introduction to Linux for bioinformaticsThe structure of Linux - Introduction to Linux for bioinformatics
The structure of Linux - Introduction to Linux for bioinformatics
 
Linux shell scripting
Linux shell scriptingLinux shell scripting
Linux shell scripting
 
linux cmds.pptx
linux cmds.pptxlinux cmds.pptx
linux cmds.pptx
 
Linux presentation
Linux presentationLinux presentation
Linux presentation
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdf
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdf
 
unix_ref_card.pdf
unix_ref_card.pdfunix_ref_card.pdf
unix_ref_card.pdf
 
Linux file system nevigation
Linux file system nevigationLinux file system nevigation
Linux file system nevigation
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
 
Module 02 Using Linux Command Shell
Module 02 Using Linux Command ShellModule 02 Using Linux Command Shell
Module 02 Using Linux Command Shell
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Linux Basic Commands
Linux Basic CommandsLinux Basic Commands
Linux Basic Commands
 
Presentation for RHCE in linux
Presentation  for  RHCE in linux Presentation  for  RHCE in linux
Presentation for RHCE in linux
 
Linux
LinuxLinux
Linux
 
Linux file commands and shell scripts
Linux file commands and shell scriptsLinux file commands and shell scripts
Linux file commands and shell scripts
 

Más de Dimas Prasetyo

Learning management System UT Strategy
Learning management System UT StrategyLearning management System UT Strategy
Learning management System UT StrategyDimas Prasetyo
 
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UT
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UTPengembangan Bahan Ajar Multimedia dan Profil P2M2 UT
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UTDimas Prasetyo
 
PERJALANAN PANJANG TRANFORMASI DIGITAL UNIVERSITAS TERBUKA
PERJALANAN PANJANG  TRANFORMASI DIGITAL UNIVERSITAS TERBUKAPERJALANAN PANJANG  TRANFORMASI DIGITAL UNIVERSITAS TERBUKA
PERJALANAN PANJANG TRANFORMASI DIGITAL UNIVERSITAS TERBUKADimas Prasetyo
 
Learning management system in HE
Learning management system in HELearning management system in HE
Learning management system in HEDimas Prasetyo
 
Mobile Learning Content Development
Mobile Learning Content DevelopmentMobile Learning Content Development
Mobile Learning Content DevelopmentDimas Prasetyo
 
E learning-basic guidelines to develop multimedia learning
E learning-basic guidelines to develop multimedia learningE learning-basic guidelines to develop multimedia learning
E learning-basic guidelines to develop multimedia learningDimas Prasetyo
 
Mengenal Camtasia Studio
Mengenal Camtasia StudioMengenal Camtasia Studio
Mengenal Camtasia StudioDimas Prasetyo
 
Sumber Belajar Dari Internet
Sumber Belajar Dari InternetSumber Belajar Dari Internet
Sumber Belajar Dari InternetDimas Prasetyo
 
Trends and Technology for Teaching and Learning
Trends and Technology for Teaching and LearningTrends and Technology for Teaching and Learning
Trends and Technology for Teaching and LearningDimas Prasetyo
 
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013Dimas Prasetyo
 
Perubahan Pola Pikir dalam Kurikulum 2013
Perubahan Pola Pikir dalam Kurikulum 2013Perubahan Pola Pikir dalam Kurikulum 2013
Perubahan Pola Pikir dalam Kurikulum 2013Dimas Prasetyo
 
Konsep dan Implementasi Kurikulum 2013
Konsep dan Implementasi Kurikulum 2013Konsep dan Implementasi Kurikulum 2013
Konsep dan Implementasi Kurikulum 2013Dimas Prasetyo
 
Reaching Younger Distance Learners through Technology & Social Media, Indones...
Reaching Younger Distance Learners through Technology & Social Media, Indones...Reaching Younger Distance Learners through Technology & Social Media, Indones...
Reaching Younger Distance Learners through Technology & Social Media, Indones...Dimas Prasetyo
 
2010 12 mysql_clusteroverview
2010 12 mysql_clusteroverview2010 12 mysql_clusteroverview
2010 12 mysql_clusteroverviewDimas Prasetyo
 
Plny12 galera-cluster-best-practices
Plny12 galera-cluster-best-practicesPlny12 galera-cluster-best-practices
Plny12 galera-cluster-best-practicesDimas Prasetyo
 
Panduan singkat lync2013
Panduan singkat lync2013Panduan singkat lync2013
Panduan singkat lync2013Dimas Prasetyo
 
Pendekatan Empati Pada Tuton
Pendekatan Empati Pada TutonPendekatan Empati Pada Tuton
Pendekatan Empati Pada TutonDimas Prasetyo
 
E texbooks for student’s e-resources
E texbooks for student’s e-resourcesE texbooks for student’s e-resources
E texbooks for student’s e-resourcesDimas Prasetyo
 

Más de Dimas Prasetyo (20)

Learning management System UT Strategy
Learning management System UT StrategyLearning management System UT Strategy
Learning management System UT Strategy
 
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UT
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UTPengembangan Bahan Ajar Multimedia dan Profil P2M2 UT
Pengembangan Bahan Ajar Multimedia dan Profil P2M2 UT
 
PERJALANAN PANJANG TRANFORMASI DIGITAL UNIVERSITAS TERBUKA
PERJALANAN PANJANG  TRANFORMASI DIGITAL UNIVERSITAS TERBUKAPERJALANAN PANJANG  TRANFORMASI DIGITAL UNIVERSITAS TERBUKA
PERJALANAN PANJANG TRANFORMASI DIGITAL UNIVERSITAS TERBUKA
 
Learning management system in HE
Learning management system in HELearning management system in HE
Learning management system in HE
 
ELearning Development
ELearning DevelopmentELearning Development
ELearning Development
 
Mobile Learning Content Development
Mobile Learning Content DevelopmentMobile Learning Content Development
Mobile Learning Content Development
 
E learning-basic guidelines to develop multimedia learning
E learning-basic guidelines to develop multimedia learningE learning-basic guidelines to develop multimedia learning
E learning-basic guidelines to develop multimedia learning
 
Mengenal Camtasia Studio
Mengenal Camtasia StudioMengenal Camtasia Studio
Mengenal Camtasia Studio
 
Sumber Belajar Dari Internet
Sumber Belajar Dari InternetSumber Belajar Dari Internet
Sumber Belajar Dari Internet
 
Trends and Technology for Teaching and Learning
Trends and Technology for Teaching and LearningTrends and Technology for Teaching and Learning
Trends and Technology for Teaching and Learning
 
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013
IMPLEMENTASI KURIKULUM PENDIDIKAN NASIONAL 2013
 
Perubahan Pola Pikir dalam Kurikulum 2013
Perubahan Pola Pikir dalam Kurikulum 2013Perubahan Pola Pikir dalam Kurikulum 2013
Perubahan Pola Pikir dalam Kurikulum 2013
 
Konsep dan Implementasi Kurikulum 2013
Konsep dan Implementasi Kurikulum 2013Konsep dan Implementasi Kurikulum 2013
Konsep dan Implementasi Kurikulum 2013
 
Reaching Younger Distance Learners through Technology & Social Media, Indones...
Reaching Younger Distance Learners through Technology & Social Media, Indones...Reaching Younger Distance Learners through Technology & Social Media, Indones...
Reaching Younger Distance Learners through Technology & Social Media, Indones...
 
2010 12 mysql_clusteroverview
2010 12 mysql_clusteroverview2010 12 mysql_clusteroverview
2010 12 mysql_clusteroverview
 
Plny12 galera-cluster-best-practices
Plny12 galera-cluster-best-practicesPlny12 galera-cluster-best-practices
Plny12 galera-cluster-best-practices
 
Panduan singkat lync2013
Panduan singkat lync2013Panduan singkat lync2013
Panduan singkat lync2013
 
Pendekatan Empati Pada Tuton
Pendekatan Empati Pada TutonPendekatan Empati Pada Tuton
Pendekatan Empati Pada Tuton
 
E texbooks for student’s e-resources
E texbooks for student’s e-resourcesE texbooks for student’s e-resources
E texbooks for student’s e-resources
 
Teaching Online
Teaching OnlineTeaching Online
Teaching Online
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

An Introduction to Linux

  • 2. 1. Overview of Unix System 2. Basic Commands 3. Relative & Absolute Path 4. Redirect, Append and Pipe 5. Permission 6. Process Management 7. Install Software 8. Text Editor 9. Foreground and Background Jobs
  • 3. Overview of Unix System Kernel & Shell  Unix/Linux is operating system (OS).  Unix system is described as kernel & shell.  Kernel is a main program of Unix system. User it controls hard wares, CPU, memory, hard disk, network card etc. input  Shell is an interface between user and Shell kernel. Shell interprets your input as commands and pass them to kernel. Kernel
  • 4. Unix Overview (cont.) Multi-user & Multi-process  Many people can use one machine at the same time. File & Process  Data, directory, process, hard disk etc (almost everything) are expressed as a file.  Process is an running program identified by a unique id (PID).
  • 5. Unix Overview (cont.) Directory Structure  Files are put in a directory.  All directories are in a hierarchical structure (tree structure).  User can put and remove any directories on the tree.  Top directory is “/”, which is called slash or root.  Users have the own directory. (home directory)
  • 7. Unix Overview (cont.) Important Directories  /bin This contains files that are essential for correct operation of the system. These are available for use by all users.  /home This is where user home directories are stored.  /var This directory is used to store files which change frequently, and must be available to be written to.  /etc Various system configuration files are stored here.
  • 8. Unix Overview (cont.) Important Directories  /dev This contains various devices as files, e.g. hard disk, CD-ROM drive, etc.  /sbin Binaries which are only expected to be used by the super user.  /tmp Temporary files.
  • 9. Unix Overview (cont.) Normal user and Super user  In Unix system, there is one special user for administrator, which can do anything.  This special user is called root or superuser. Case Sensitivity  Unix is case-sensitive.  MYFILE.doc, Myfile.doc, mYfiLe.Doc are different. Online Manual  Unix has well-written online manuals.
  • 10. Basic Commands How to run commands  Finder => Application => Utilitaires => Terminal  When you log on Unix machine, you will see, [someone]$  One command consists of three parts, i.e. command name, options, arguments. Example) [someone~]$ command-name optionA optionB argument1 argument2
  • 11. Basic Commands How to run commands  Between command name, options and arguments, space is necessary.  Opitions always start with “-”  Example: cd .. ls –l .bashrc mv fileA fileB
  • 12. Basic Commands Commands  ls show files in current position  cd change directory  cp copy file or directory  mv move file or directory  rm remove file or directory  pwd show current position  mkdir create directory  rmdir remove directory  less, more, cat display file contents  man display online manual
  • 13. Basic Commands Commands  su switch user  passwd change password  useradd create new user account  userdel delete user account  mount mount file system  umount unmount file system  df or du show disk space usage  shutdown reboot or turn off machine
  • 14. Basic Commands 1. Type following command in 3. In your home directory, your directory. ls .bash_profile cp .bash_profile sample.txt ls less sample.txt (note: to quit less, press “q”) ls –a rm sample.txt ls –la ls -Fa 4. check disk space usage 2. Make a directory df mkdir linux df -h pwd cd linux pwd cd pwd rmdir linux
  • 15. Relative & Absolute Path  Path means a position in the directory tree.  To express a path, you can use relative path or absolute path.  In relative path expression, the path is not defined uniquely, depends on your current path.  In absolute path expression, the path is defined uniquely, does not depend on your current path.
  • 16. Absolute Path  Address from the root /home/linux/ ~/linux ~: ~: Alt+N  Similar to: Lausanne University/Lausanne/Canton de Vaud/ Switzerland/Europe/Earth/Solar System/
  • 17. Relative Path  Relative to your current location . : your current location .. : one directory above your current location pwd: gives you your current location  Example ls ./linux : lists the content of the dir linux ls ../../ : lists everything that is two dir higer  Similar to: Go Left/turn right/take the TSOL/go
  • 18. Relative & Absolute Path  Relative Path  Ablsoute Path pwd cd cd . mkdir mydir pwd pwd cd /Users/invite cd .. pwd pwd cd /Users cd .. pwd pwd cd / cd pwd cd /Users/invite cd ~/mydir
  • 19. Redirect, Append and Pipe Redirect and append  Output of command is displayed on screen.  Using “>”, you can redirect the output from screen to a file.  Using “>>” you can append the output to the bottom of the file. Pipe  Some commands require input from a file or other commands.  Using “|”, you can use output from other command as input to the command.  On MacOSX, The Pipe sign: (Shift+Alt+N: franc, Alt+7)
  • 20. Redirect, Append and Pipe Commands  head show first several lines and omit other lines.  tail show last several lines and omit other lines.  grep XXX File show lines matching pattern XXX in File
  • 21. Redirect, Append and Pipe  In home directory, type  Use pipe. ls -1 > sample.txt less redirect.txt less sample.txt grep Desk redirect.txt  Use redirect. grep –n Desk redirect.txt head -3 sample.txt man grep head -3 sample.txt > redirect.txt tail redirect.txt | grep Desk  Use append. rm sample.txt tail -3 sample.txt rm redirect.txt tail -3 sample.txt >> redirect.txt less redirect.txt
  • 22. Sorting Commands  sort Sorts using the first field of each line.  -n Sorts considering the numeric value of the strings  -k3 Sorts using the third field of each line  -rnk3 Sorts in reverse order, using the numeric value of the third field
  • 23. Redirect, Append and Pipe  Identify the largest file in a directory: ls –la /bin/ | sort –nk5 | tail -1
  • 24. Permission  All of files and directories have owner and permission.  There are three types of permission, readable, writeable and executable.  Permissions are given to three kinds of group. owner, group member and others. Example: ls -l .bash_profile -rw-r--r-- 1 cnotred cnotred 191 Jan 4 13:11 .bash_profile  r:readable, w:writable, x: executable
  • 25. Permission Command  chmod change file mode, add or remove permission  chown change owner of the file Example) chmod a+w filename add writable permission to all users chmod o-x filename remove executable permission from others chmod a+x Gives permission to the usser to execute a file  u: user (owner), g: group, o: others a: all
  • 26. Permission  Check permission ls –l .bash_profile cp .bash_profile sample.txt ls –l sample.txt  Remove readable permission from all. chmod a-r sample.txt ls –l sample.txt less sample.txt  Add readable & writable premissions to file owner. chmod u+rw sample.txt ls –l sample.txt less sample.txt rm sample.txt
  • 27. Process Management  Process is a unit of running program.  Each process has some information, like process ID, owner, priority, etc. Example) Output of “top” command
  • 28. Process Management Commands  kill Stop a program. The program is specified by process ID.  killall Stop a program. The program is specified by command name.  ps Show process status  top Show system usage statistics
  • 29. Process Management  Check your process. ps ps –u  Check process of all users. top (To quit top, press “q”) ps –e ps –ef  Find your process. ps –ef | grep cnotred
  • 30. Install Software Commands  Zypper  New installation command introduced first in 10.2 release  Transparant and simple  Function :  Install  Update  Search  Remove  Reduced Dependency Problem
  • 31. Install Software  Common paramater:  zypper # to print the list of available global options and commands  zypper help search # to print help for the search command  zypper lp # to see what patch updates are needed  zypper patch # to apply the needed patches  zypper se sqlite # to search for sqlite  zypper rm sqlite2 # to remove sqlite2  zypper in sqlite3 # to install sqlite3  zypper in yast* # to install all packages matching 'yast*'  zypper up # to update all installed packages with newer versions, where possible
  • 32. Text Editor pico  Programs & configuration files are text file.  There are two popular text editors, vi and Emacs.  Although they are very powerful and useful, it is also true that they are complicated for beginners and difficult to learn.  pico is an easy and simple alternative.
  • 33. Text Editor Commands  Arrow-keys Move cursor  CTRL+a Move to the beginning of the current line.  CTRL+e Move to the end of the current line.  CTRL+v Move forward one page.  CTRL+y Move backward one page.  CTRL+w Search for text.  CTRL+d Delete the current character.  CTRL+k Remove (cut) current line or selected text.  CTRL+u Paste (uncut) last cut text at the cursor position.  CTRL+o Save (output) the file.  CTRL+x Exit Pico, saving the file.  Autre: xemacs, emacs
  • 34. Text Editor  Create the file Hello pico hello.pl  Write hello.pl as follows. #!/usr/bin/perl print “Hello Worldn”;  Make il executable chmod u+x hello.pl  Run it! ./hello.pl
  • 35. Foreground and Background  Running job has two modes, “foreground” and “background”  If program is running as “background”, the program keeps running even after your session was closed  If program is running as “foreground”, Ctrl-C stop program Ctrl-Z let program background
  • 36. Foreground and Background  To run programs in background mode, use “&” [nomura@ssc-1]$ command &  To get background job back into foreground mode, use “fg” command. [nomura@ssc-1]$ fg
  • 37. Remote Login & File Transfer • rshd, telnetd, ftpd, sshd are server program and provide similar services, remote login & file transfer. • The major difference is security level. rshd < telnetd + ftpd < sshd Commands Client Server  rsh & rcp  rshd  telnet & ftp  ssh & scp  telnetd & ftpd  sshd
  • 38. Remote Login & File Transfer Remote login & file transfer system are based on server and client model. client program on your machine ask sever program certain service remote machine. For example, telnet server provides remote login service. ftp server provides file transfer service. Sample client programs; WS FTP FTP client Internet Exploror HTTP client Eudora POP, SMTP client
  • 39. Tutorial of Unix/Linux END Company LOGO