Question

In: Computer Science

Linux Basics 1.In Linux what is a Window Manager –name a window manager that is commonly...

Linux Basics

1.In Linux what is a Window Manager –name a window manager that is commonly used?

2.If you were in a organisation that wanted to run a commercially backed distribution of Linux which one would you pick?

3.After the kernel is invoked at boot time, describe what happens?

4.Why is it common practice to use a boot loader?

5.Name two loaders used in Linux?

6.What is systemd? How is it used?

7.What does systemdreplace? Why was the choice made to replace the more traditional ways?

Solutions

Expert Solution

1.In Linux what is a Window Manager –name a window manager that is commonly used?

   Window managers in linux to manage the system windows which bring up with the application. Usually when you start an application, you will get a manager for your window which usually runs in the background and for the appearance and placement, these are responsible.

   Examle:
       Awesome WM- Its a Linux window managers that allow you to port the asynchronous XCB Library instead of the XLib
       This can be configurable, Rearranging and re-sizing panels are also available via the mouse.
       Multiples tags are allowed for keeping the workspace organized with the Awesome WM,
       and it is entirely extensible with the LUA.

2.If you were in a organisation that wanted to run a commercially backed distribution of Linux which one would you pick?
   I will pick CentOS, a distribution derived from the same sources used by Red Hat, maintained by a dedicated volunteer community of developers with both 100% Red Hat-compatible versions and an upgraded version that is not always 100% upstream compatible.

3.After the kernel is invoked at boot time, describe what happens?

   After kernel is loaded, it immediately initializes and configures the memory and different hardwares attached to the system, including processors, I/O subsystems, and storage devices. It then looks for the compressed initrd image in a predetermined location in memory, decompresses it, mounts it, and loads all necessary drivers.
   Then, it initializes virtual devices related to the file system, such as LVM or software RAID before unmounting the initrd disk image and freeing up all the memory the disk image once occupied. The kernel then creates a root device, mounts the root partition read-only, and frees any unused memory in the system.

4.Why is it common practice to use a boot loader?
   Bootloaders is used as a separate program in the program memory that executes when a new application needs to be reloaded into the rest of program memory. The bootloader will use a serial port, USB port, or some other means to load the application. Frequently a bootloader will always execute on restart to check if a new program is to be loaded or if the application is to be run.

5.Name two loaders used in Linux?
   1.LILO (LInux LOader)
   2.LOADLIN (LOAD LINux)

6.What is systemd? How is it used?
   1.Systemd is a Linux initialization system and service manager.
   2.It includes features like on-demand starting of daemons, mount and automount point maintenance, snapshot support, and processes tracking using Linux control groups.
   3.Itprovides logging daemon and utilities to help with common system administration tasks.

7. What does systemdreplace? Why was the choice made to replace the more traditional ways?
   Systemd init process starts serially like one task starts only after the last task startup was successful and it was loaded in the memory. This often resulted into delayed and long booting time. However, systemd was not designed for speed but for getting the things done neatly which in turns avoid all the UN-necessary delay.


Related Solutions

LAB 7.1 MANAGING USER ACCOUNTS STEP 1. Open a terminal window in linux.                               &n
LAB 7.1 MANAGING USER ACCOUNTS STEP 1. Open a terminal window in linux.                                         STEP 2. Execute the correct command to display user account information (including the login shell and home directory) for the bin account.                                         STEP 3. Execute the correct command to display user password information (including the encrypted password and password aging) for the bin account.                                         STEP 4. The command in step 3 should have failed. Execute the correct su command to change your account so...
1. What are narrow window studies and wide window studies in accounting research, and what are...
1. What are narrow window studies and wide window studies in accounting research, and what are they used for respectively. 2. List Fair value hierarchy according to IFRS 13, ASC 820-10
What is Linux Security?
What is Linux Security?
PLEASE USE LINUX/UNIX 1.Use either pico, vi, or cat to create the following file and name...
PLEASE USE LINUX/UNIX 1.Use either pico, vi, or cat to create the following file and name it as “mysedfile”: Name Class1 Class2 Class3 Tom 92 94 88 Nancy 91 85 95 Lisa 99 77 96 Jerry 84 98 90 2. Please use sed command(s) to complete the following tasks. display Tom’s record. display Lisa’s record. display both Tom’s and Lisa’s records. remove the blank line(s) from “mysedfile.” replace all the digits with *.
In linux , Using a simple text editor, create a text file with the following name...
In linux , Using a simple text editor, create a text file with the following name "Test" and content: GNU GENERAL PUBLIC LICENSE The GNU General Public License is a free, copy left license for the GNU General Public License is intended to guarantee your freedom to GNU General Public License for most of our software; it applies … 2-Write the command to create the text file. 3-Print the file permissions. 4-Create a directory named "361" 5-Copy file "Test" to...
Using Linux system, give the name (such as "eth0") and the MAC address (Ethernet Address) of...
Using Linux system, give the name (such as "eth0") and the MAC address (Ethernet Address) of each network interface on your computer. (Consider ‘netstat’ or ‘ifconfig’ or ‘ip’ command)
Investigate and draw the structure and provide the name for 3 common antioxidants that are commonly...
Investigate and draw the structure and provide the name for 3 common antioxidants that are commonly consumed and write a detailed description of how these antioxidants work. Then, provide a mechanism clearly illustrating how one of the antioxidants works. Please 3 common antioxidants, not 2.... Thanks.
Name the diseases most commonly found in a patient diagnosed with an obstructive disorder and in...
Name the diseases most commonly found in a patient diagnosed with an obstructive disorder and in a patient diagnosed with a restrictive disorder. Describe some pathological effects that each disease possesses.
Name a few factors that are commonly believed to be necessary for creative thinking to occur....
Name a few factors that are commonly believed to be necessary for creative thinking to occur. Which do you perceive of as relatively more important and which do you believe are not necessary? Why?
Sub HW4_1_1() 'a. Using the properties window in the VB editor assign ' the code name...
Sub HW4_1_1() 'a. Using the properties window in the VB editor assign ' the code name wsEx2 to the sheet with tab name Sheet1. 'b. Using VBA code and the code name for worksheet Sheet1, ' make this worksheet the active sheet. 'c. Declare a range variable and assign to this variable ' the range from A2 to A10 in the worksheet Sheet1. 'd. Write VBA code to create a range name and call it “Scores”. ' This range name...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT