Chapter
1 page 13 add
Advanced Review Exercise
16. What is a macro virus and what makes it so troublesome?
Chapter 2 page 39 changed 12 to
12. How many man pages are
there in the Devices subsection of the system manual? (Devices
is a subsection of Special Files.)
Chapter 3 page 73 dropped exercise 12
Chapter 3 page 73 renumbered exercise 13 as exercise
12
Chapter 3 page 73 renumbered exercise 14 as exercise
13
Chapter 3 page 73 renumbered exercise 15 as exercise
14
Chapter 3 page 73 added exercise before exercise
16. New exercise numbered 15.
15. Assume that in exercise 8 Ace Electronics and the phone number
appear on adjacent lines. How can you find the phone number without using a
program that displays a large chunk of the file (for example an editor, more,
pg, cat,
or page? (Hint: use sed.)
Chapter 4 page 100 changed exercise 4
4. If your working directory is /home/alex with a subdirectory named
literature, give three sets of commands that you can use to create a
subdirectory under literature named classics. Also give several
sets of commands that you can use to remove the classics directory and
its contents.
Chapter 8 page 289 exercise 3 subsection b
Changed the last word on the line from Unfortunately to Unit.
Chapter
15 page 681 changed exercise 12 to
12. A process is using 100%
of the CPU time. How do you identify the process and determine if you should
kill it?
Chapter 15 page 682 added exercises 22-27
22. Use at to reboot the system
23.
Give a command that will make a level 0 dump of the /usr filesystem to
the first tape device on the system. What command would you use to take advantage
of a drive that supports compression? What command would place a level 3 dump
of the /var filesystem immediately after the level 0 dump on the tape?
24. Use an ACL to create a new directory /home/shared/billken so that
users Bill and Kendra can create files in the directory. Any new files or subdirectories
that either user creates should automatically be writable by either user. No
one else should have access to this directory or the files within it. Modify
this directory so that the group spiffy has read-only access to all files
and directories within billken.
25. A utility named /usr/bin/netclk accepts a connection over the network
and quits once the connection is dropped. How can you use the built-in functionality
of Solaris to make this program run so that it restarts automatically (without
modifying netclk)? (Hint: It should only run in multiuser mode)
26. A process is consuming a great deal of memory. How do you determine how
much physical memory it is using and what percentage this is of the total memory?
27. When a user logs in, you would like the system to check for a login name
in the local /etc/passwd file first and then to check NIS. How do you
implement this strategy?