presentation notes

.docx

School

Florida State College at Jacksonville *

*We aren’t endorsed by this school

Course

4640

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

4

Uploaded by MateSeaLionMaster340

Report
About the unix boost processes - Booting (bootstrapping) is the process of getting a computer system ready. o Can be done automatically or manually o Cold boot: initiated when the computer is on o Warm boot/restart: reboot command from a running system From Power On to Loading the Kernel - Firmware (BIOS, ROM, NVRAM) stores the initial boot instructions, which is executed when starting the boot process - Boot instructions may also execute in response to a command o They are used to locate and start up the system’s boot program – Unix OS o The boot program loads the Unix kernel into memory and passes control of the system to it. - A system usually has multiple bootable devices. o Without instructions, the system uses the first bootable device that is found. - Kernel is the part of the Unix OS that runs at all times when the system is up. o It is traditionally stored in or linked to the root directory o Typical Kernel names and directory locations: o The kernel, when given control, runs its preparation and creates another process that will run the “init” program as the process with PID1 (process identifier 1) Booting to Multiuser Mode - Init is the ancestor of all subsequent Unix processes and the direct parent of user login shells. - Init activities: o (IMPORTANT) Verify the integrity of the local filesystems, beginning with the root filesystem. o Checking the integrity of the filesystems (using “fsck”) o Mounting local disks o Designating and initializing paging areas o Performing filesystem cleanup activities o Starting system server processes (daemons) for subsystems like printing, email, accounting, error logging, and “cron” o Starting networking daemons and mounting remote disks o Enabling user logins (starting “getty” processes and/or the graphical login interface on the system console and removing the file /etc/nologin, if present - These activities are carried out by means of system initialization scripts, which are shell scripts executed by init at boot time. - Once the activities are complete, so is the process and the system is said to be in multiuser mode.
Booting to Single-User Mode - The init program can place the system in single-user mode by not completing the initialization tasks required for multiuser mode. - Single-user mode (maintenance mode) is designed for admin and maintenance activities, requiring complete and unshared system control. - System might enter single-user mode automatically if it can’t handle problems in boot process o Instead of picking up the boot process where it left off, the system may be rebooted by command “reboot” or “telinit 6” - Single-user mode = minimal system startup. The search path + terminal type are often set incorrectly (no running daemons + many shutdown Unix facilities) + no network connection + files are mounted read-only. - Password protection for single-user mode o Most systems now require that the root password be entered before granting system access. o On some System V-based systems, this is done via “sulogin” program that is invoked automatically by “init” once the system reaches single user mode. o Summary of single-user mode password protection: - Firmware Passwords o Some systems also allow you to assign a separate password to the firmware initialization program. o On some systems, you must use commands within the firmware program itself to perform this operation o On Linux systems, commonly used boot-loader programs have configuration settings to do the above Starting a Manual Boot - If autobooting is not enabled when the computer is powered on, it can be done via commands. - Low-level boot commands for: - AIX:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: What is the Q1, Q2, Q3, upper and lower range of the following set? 297, 239, 195, 183, 276, 270,…
Q: Which philosophical principle is expressed in the following excerpt from the Declaration of…
Q: Find f(0) and then find the equation of the given linear function. x 1 2 3 4 f(x) 9 14 19 24 f(0) =…
Q: Calculate f f(x, y, z) dS For Is f(x, y, z) ds = x² + y² = 4, 0≤ z ≤ 9; f(x, y, z) = e-²
Q: A 17.0 μF capacitor is charged by a 130.0 V power supply, then disconnected from the power and…
Q: Suppose we have a set of data consisting of ordered pairs and we suspect the x and y coordinates are…
Q: Find the monthly payment (in $) and the total interest (in $) for a mortgage of $46,000 at 5 3/4 %…
Q: (Related to Checkpoint 16.1) (Dividend irrelevance of the timing of cash dividends) The Caraway Seed…
Q: What is the opportunity cost (amount & item) of the first 8,000 tons of bananas produced?…
Q: Let I be the flux of G = (4e³,9x³ex³,0) through the upper hemisphere S of the unit sphere. (a) Find…
Q: Evaluate the circulation of G = xyi + zj + 4yk around a square of side 4, centered at the origin,…
Q: Molecular hydrogen (H2) and molecular oxygen (02) can also react to form hydrogen peroxide (H202).…
Q: A large power reactor that has been in operation for some months is turned off, but residual…
Q: A copper rod of mass m = 1.08 kg rests on two horizontal rails a distance L = 0.923 m apart and…
Q: A ring and disc are both rolling without slipping so that both have a kinetic energy of 108. What is…
Q: How does the magnitude of the magnetic field along the axis of the coil depend on the distance from…
Q: Kathy Hansen has a revolving credit account. The finance charge is calculated on the previous…
Q: Perdue Company purchased equipment on October 1 for $50.980. The equipment was expected to have a…
Q: A 5.00-L tank contains helium gas at 1.50 atm. What is the pressure of the gas in mmHg?     1140…
Q: Bill Mitselfik borrowed ​$10,000 to be repaid in quarterly installments over the next five years.…
Q: How does health information technology influence end users (providers and patients)?
Q: A simple random sample of 17 different cereals is obtained, and the sugar content (in grams of sugar…