Preview

Nt1310 Unit 6 Research Paper

Good Essays
Open Document
Open Document
567 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 6 Research Paper
Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used. o - Process is running on a processor s – Sleeping: process is waiting for an event to complete r - run-able: process is on run queue. z - Zombie state: …show more content…
To kill a process you could type kill 101. The '101' would be the pid (process ID) number. If the process gets hung and doesn’t listen to this kill command, you can also type kill -9 101. The -9 pulls the plug, this command is not recommended because it can leave some locked files or child processes behind. Kill -l provides a quick look at available signals, names and pid's Job control is the process of running job processes in your current shell, in your current login session. There are several shell commands you can use to manipulate these jobs even though you close your session or current shell. Jobs may continue to run. This is why there are commands to manipulate any process you might have left behind. You can start a job in either the foreground or background. If you run a job in the background and then close your current shell, you cannot bring that job back to the foreground. But, that background job can continue to produce output to a file To start a job in the foreground, type in the command at the UNIX prompt and hit return. There are two ways to start a job in the background. First, you can choose the command from your root menu or you can type in the command at the UNIX prompt followed by the ampersand

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 1 Question Paper

    • 4923 Words
    • 20 Pages

    The size parameter reset the default buffer size but did not disable access to the…

    • 4923 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    Paper II - Section : II Embedded Systems INDEX No 1 2 3 4 5 6 7 8 9 10 Toggle Port LED Simulate Binary Counter at Port Generate delay using TIMER_0 Stepper Motor (clockwise/Anticlockwise) Generating square wave at port pin Generating Triangular wave at port pin Sine wave generation using look-up table Microcontrollers communicating over a serial link Read switch-status from i/p port and display at o/p port Using Input Capture Pin (ICP), measure pulse width & display at o/p port Topic Date 6-9-2010 9-9-2010 17-9-2010 24-9-2010 8-10-2010 15-10-2010 15-10-2010 29-10-2010 22-11-2010 24-11-2010 Page 02 03 04 06 07 09 10 11 13 15 Sign…

    • 742 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 2 Term Paper

    • 422 Words
    • 2 Pages

    The Joint Capabilities Integration and Development System (JCIDS), Defense Acquisition System (DAS), and Planning, Programming, Budget, and Execution (PPBE) System support Force Management. The purpose of the JCIDS is a need driven, capabilities assessment. The DAS provides effective, affordable, and timely weapon systems to the warfighters. The PPBE is the most important process of Force Management because it connects strategy and force structure to resources.…

    • 422 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Visual Promethee main window is displayed that uses a typical spreadsheet to manage the data of effectiveness multi-criteria problem (Figure 4.7). The main window contain all the data have related to the PROMETHEE method (preference function, statistics and evaluation, weights…), this information can be easily input and defined by the decision maker.in addition to that Visual PROMETEE can provide additional features like quantitative criteria as well as qualitative criteria. Besides Visual PROMETHEE software can also handle the definition of variable thresholds in the preference functions (q, p, s), can also…

    • 388 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Network attached storage (NAS) is basically a server that acts as hard drive that’s attached to a network (Johnson). This connection to a network allows anyone who is also connected to the network the ability to access the hard drive. The NAS come in many sizes and different capabilities. The network connection that the NAS uses can be almost any that are available. The standard Ethernet connection is the most common connection by there are also systems that use a wireless connection or even a fiber optic connection for extremely fast transfer speeds.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Unit 3 network discovery

    • 1031 Words
    • 5 Pages

    What is the PID number? Why are these numbers useful when you run processes in the background? Which utility displays the PID numbers of the commands you are running?…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The possibility of explorer appcrash issues with the module shell32.dll being responsible in Windows operating systems is very common. Once that happens it will become immensely difficult, to even perform the simplest of functions in Windows.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hw3 7

    • 1263 Words
    • 5 Pages

    A PID number is an identification number assigned to a command running in the background, which can be used to differentiate between commands. The PS (process status) utility…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    The qtm.dll is one of the most important modules in the Windows operating systems. The Windows registry is the location of the file. You might see that you start getting qtm14.dll errors if the file is missing or damaged. You will need to find a qtm14.dll fix to resolve the issues.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to Ebbinghaus’s research, what is the pattern in which memory for meaningless information is forgotten?…

    • 329 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 9 Final Paper

    • 381 Words
    • 2 Pages

    Questions: Many local governments in the United States operate public libraries that provide books, reference materials, Internet access, public meeting space, genealogical assistance, and other information/education services at no charge. Answer the following questions:…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    I am currently placed at Eagle Academy, a charter school, in East Toledo where I observe 6th and 7th grade Early World history. Mr. Story is the only social studies teacher at the school which means he teaches a whole timeline of events from ancient civilizations, eastern and western hemisphere history, the founding and establishment of America and the Modern World which is a lot of content to know what to teach and design lesson plans for! There are more boys than girls in each of the classes I observe. Since moving on to the third part of this course, I developed three supporting questions to answer while observing Mr. Story that reflect to the essential question which is “How do we design instruction that sticks? to answer while…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chapter3 OS Essentials

    • 619 Words
    • 3 Pages

    3.8 Construct a process tree similar to Figure 3.9. To obtain process information for the UNIX or Linux system, use the command ps -ael. Use the command man ps to get more information about the ps command. On Windows systems, you will have to use the task manager.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Windows Hacking Tricks

    • 1055 Words
    • 5 Pages

    what i prefer is %temp% " without quotes.. at Start -> Run.. this opens ur temp folder n den u cal erase it nearly…

    • 1055 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Job Analysis and Other Terms

    • 3148 Words
    • 13 Pages

    Job Analysis is a systematic exploration, study and recording the responsibilities, duties, skills, accountabilities, work environment and ability requirements of a specific job. It also involves determining the relative importance of the duties, responsibilities and physical and emotional skills for a given job. All these factors identify what a job demands and what an employee must possess to perform a job productively.…

    • 3148 Words
    • 13 Pages
    Good Essays

Related Topics