[go: up one dir, main page]

0% found this document useful (0 votes)
7 views5 pages

Operating System1 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views5 pages

Operating System1 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Operating System

Course Code: R1UC403B


LAB REPORT FILE FOR
BACHELOR OF ENGINEERING & TECHNOLOGY

SCHOOL OF COMPUTING SCIENCE AND ENGINEERING

GALGOTIAS UNIVERSITY, GREATER NOIDA, U.P

Lab Report
SESSION: 2024-2025

SUBMITTED TO: SUBMITTED BY:


Dr. S Srinivasan Utkarsh Mishra
23SCSE1410053
Section – 16
Semester - IV
Command 1: mkdir
The mkdir command allows you to create directories from
within the terminal.

Command 2: whoami
The whoami command in Linux returns the current user’s
username. It stands for “who am I?” and it’s often used to
determine the current user’s identity in shell scripts or the
terminal.

Command 3: grep
The grep command is a powerful and versatile text search tool
in Linux and Unix-based operating systems. It can search for
specific patterns or strings in one or more files and filter the
output of other commands.

Command 4: ufw and iptables


UFW and IPTables are firewall interfaces for the Linux Kernel’s
netfilter firewall. IPTables directly passes firewall rules to
Netfilter while UFW configures the rules in IPTables, which
then sends those rules to Netfilter.
Command 5: alias
The alias command in Linux creates shortcuts for commands,
files, or text in the shell. This saves time when performing
repetitive tasks.

Command 6: whereis and whatis


The whereis and whatis commands are used in Linux to
search for information about programs and files.

The whereis command locates the binary, source, and


manual pages for a specific command or program, and the
whatis command displays a short description of a command
or program.

Command 7: dd
This command was created to convert and copy files from
multiple file system formats. In the current day, the command
is simply used to create bootable USB for Linux but there still
are some things important you can do with the command.
Command 8: ifconfig and traceroute
The ifconfig and traceroute commands manage network
interfaces and trace the route of network packets in Linux.

The ifconfig command will give you the list of all the
network interfaces along with the IP addresses, MAC
addresses and other information about the interface.
The traceroute command is used to trace the route of
network packets and determine the path they take to reach
a specific destination.

When working with traceroute, you can simply specify the


IP address, hostname, or domain name of the endpoint.

Command 9: chmod and chown


The chmod and chown commands are used to modify file
permissions and ownership in Linux.

The chmod command is used to change the permissions of a file


or directory, and the chown command is used to change the
ownership of a file or directory

The default syntax for both the commands is chmod <parameter>


filename and chown <user:group> filename
Command 10: top
The top command is like a CLI version of the task manager in
Windows.

The top command in Linux is a system monitoring tool that


displays real-time information about system processes and
resource usage. It provides a dynamic, real-time view of
system activity, including CPU usage, memory usage, and
process information.

You might also like