Working with UNIX Text Editors - Essay Example

Comments (0) Cite this document
This device uses a combination of computer key strokes to execute a certain command. UNIX text editor does not allow the user to incorporate interactive fonts and graphics into user file…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Working with UNIX Text Editors
Read TextPreview

Extract of sample "Working with UNIX Text Editors"

Working with UNIX Text Editors Working with UNIX Text Editors UNIX text editor is a visual command editor that is found in almost every UNIX systems. This device uses a combination of computer key strokes to execute a certain command. UNIX text editor does not allow the user to incorporate interactive fonts and graphics into user file. Some of the key features of the VI editor include commanding and writing modes. The command mode operates when the user pres the escape button, this allow navigation of cursor across the entire file. The command mode also includes both the dd and the X keys. When the dd key has been pressed it command the system to erase the entire materials within a line while on the contrary, the X erases each character at a time. The writer mode allows the operator to enter the text on the system, the write mode uses the lower case letters, and this is because the visual editor is more sensitive to lower case letters (Peek, Peek, Robbins, Lamb, Rosenblatt & Dougherty, 2000).
1. Explain how to access VI and create new documents, or open an existing document
Two ways might be used to create or open the file using the Visual text editor (VI). Some of those ways include; typing the word VI on the computer command space and saving the file using the most appropriate name that one has chosen. The file might be open by tying the VI and the name that one used to save the document. The second way of creating and accessing the document is by typing the name VI, this is accompanies by the file name. For example, if one wants to create or open a file named as Joe, one may type vi/home/Joe to access that particular file (Peek, Peek, Robbins, Lamb, Rosenblatt & Dougherty, 2000).
2. Outline the common navigations commands used with VI
Some of the common navigation commands utilized by VI include but not limited to; b, 1, j, k, (,), W, 1G, W, U, B, F and D. The command implies that one should move left, while 1 means that there should move one character on the right, the character J means one line downward movement while k implies one line upward movement. The command, (, means the beginning of the sentence while,), means the quell of a sentence. The command w means a word should be written. On the other hand, the command, Ctrl>U make the screen to move the screen halfway while command B moves the entire screen upwards. Command F moves the screen downwards and finally command D makes the screen to move halfway (Sco Group, Inc, 2005).
3. Discuss the VI modes of operations
The VI has three modes of operation namely; input, command and line operation modes. The input mode is used for entering a text into a given file. This mode requires the user to type the word VI into the command prompt. The command mode helps to make interpretation on the material that have been typed on the command file. The command mode is launched by pressing the escape button (ESC). The line operation mode allows the cursor to navigate to the next line; it may be launched by typing colon or a back slash on the command space (Peek, Peek, Robbins, Lamb, Rosenblatt & Dougherty, 2000).
4. Discuss the benefits of using a command based editor
Unlike Microsoft word document, the command editor has the ability of handling large and numerous files. Command based editor allows the user to execute complex operations and allow manipulation of data to meet the user’s needs. In addition, it minimizes time wastage because of its higher speed. It also gives the user a chance to have control of the system as compared to GUI (McElhearn, 2005).
McElhearn, K. (2005). The MAC OS X command line: UNIX under the hood. San Francisco: Sybex.
Peek, J., Peek, J., Robbins, A., Lamb, L., Rosenblatt, B., & Dougherty, D. (2000). The UNIX CD bookshelf. Beijing: OReilly.
Sco Group, In. (2005).vi command summary. Retrieved :< http://osr600doc.sco. com/en/FD_create/vi_summary.html>. Read More
Cite this document
  • APA
  • MLA
(“Working with UNIX Text Editors Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Working with UNIX Text Editors Essay Example | Topics and Well Written Essays - 500 words. Retrieved from
(Working With UNIX Text Editors Essay Example | Topics and Well Written Essays - 500 Words)
Working With UNIX Text Editors Essay Example | Topics and Well Written Essays - 500 Words.
“Working With UNIX Text Editors Essay Example | Topics and Well Written Essays - 500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Working with UNIX Text Editors

UNIX Operating System History

...that was programmed by Stephen Bourne deputed at Bell Laboratories (Verma, n.d). Likewise, Bourse shell was an integrated function of the UNIX operating system. Moreover, Kourne shell that was subset of Bourne shell was coded by IBM. However, Kourne shell is not supported by all platforms and is not portable as well. Furthermore, C shell was programmed by Bill joy who is also the inventor of Vi text editors (Verma, n.d). While working at the University of California, he augmented the Bourne shell by integrating more features by modifying some legacy features. Likewise, the C shell cannot be similar to C programming language, as both of them are separate objects. If we...
10 Pages(2500 words)Essay

MSc Practical UNIX Security

...Vulnerabilities This section outlines some security and privacy related problems and issues. These issues are UNIX related and involve some potential security attacks which can be seen on UNIX system: Buffer overflow attacks: In this type of attack the client memory buffer is filled up to stop the system working as well as preventing it from processing any further request. In this kind of attack the system working is badly affected as well as system is not able to response user actions (Sheer, 2002) and (Ott et al., 2002). Setuid programs: A program that has the capability to execute without some core rights in an attempt to control UIDs of a different user. In this kind...
8 Pages(2000 words)Essay

Practical UNIX Security

..., the threat may easily allow unauthorized access of an intruder who can modify unauthorized data along with disruption of services. Moreover, the Microsoft domain server is also vulnerable to ‘mod_fcgid’ stack based buffer overflow attacks that are caused by reprehensible bounds inspection from the module named as ‘fcgid_header_bucket_read()’. A hacker may send a uniquely constructed Fast CGO data, in order to execute the arbitrary code on the apache server running on a windows based server. Consequently, the application will crash (, ISS X-Force Database: apache-fcgid-bo(63303): Apache mod_fcgid module fcgid_header_bucket_read() buffer overflow ). Remedial Action In order to eliminate this threat, whether in windows environment or...
10 Pages(2500 words)Assignment

Practical UNIX Security

...?Running Head: UNIX Security UNIX Security Unix is the operating system which was foremost developed in 1960s and is under regular development since that time. Operating system can be understood as the group of programs responsible for making the computer work (Peek Jerry, 2002). It is a multi-user, stable, multi tasking system for severs, laptops and desktops. Unix systems are also equipped with graphical user interface in the same way as Microsoft Windows, which gives an easy to use atmosphere. However, knowledge of unix is essential for operating Unix systems as it is not covered by a graphical program, for instance,...
10 Pages(2500 words)Assignment

Positional Parameters (UNIX)

...OF PHOENIX ONLINE Introduction to Unix POS/420 r4 Walt Saiko POS 420 Introduction to UNIX of Phoenix Online Week 3 Individual Assignment Date 20 September 2008 Problem Description: Project 5.2 Page 198 The first exercise involved interaction with the user in the form of giving the user instructions to enter five parameters, the positional parameters are used here and the user is prompted to enter the correct number of arguments. The first terminal window is my script, displayed by typing "cat Project5-2". The second and third screen show two consecutive runs of the script, one with insufficient argument and another with correct arguments. Project 6-2 (page...
2 Pages(500 words)Article

Linux vs HP-UNIX

...of tasks associated with them. For example, the immediate bottom half handler works its way through the immediate tasks queue (tq_immediate) which contains tasks that need to be performed immediately. (Rusling, David 1999) Shell The shell application inside the UNIX Plan9 system are set up for standard input and output connection to the editable text of the window with such features as its own private bitmap and multiplexed access to the keyboard, mouse and other graphical resources. The UNIX shell is commonly defined as the command line which provides the user interface for the actual operating system. By executing input commands, the shell will then execute those...
4 Pages(1000 words)Essay

Unix Vs. Windows for distributed environments as well. The above points do not mean that windows do not provide networking solutions. The upper advantage of UNIX over windows based solutions lies in the fact that in order to operate across a network using windows, one would have to usually install additional software in order to communicate with other network resources, while UNIX provides all such tools beforehand at the time of installation (KernelThread, 2006). A common misconception, owing to the use of internet through Windows by most users would lead most to believe that Internet works on Windows as the foundation. However, industry statistics suggest that as mush as 80-90% of web...
2 Pages(500 words)Essay


..., will find the 3D desktop interface quite a charming working tool with host of features to tinker with. 4. The desktop with the 3D interface works faster than the traditional interface. The UNIX operating system enables the speed to increase as the system is an upgraded version. 5. The 3D interface is a creative means to perform both graphic and text tasks. The graphics, especially, come out in a very presentable 3 dimensional format that comes out poignant in PowerPoint presentation. This is a far improvement over the 2D interface. Disadvantages 1. The 3D interface is considered weak to maintain the strength of the network. Its feasibility and overall practicability is...
8 Pages(2000 words)Essay


...numerous commands at ago, hence manage to accomplish extremely intricate tasks that would have taken competing systems involvement of other extra resources. It has heightened stability and flexibility, which is an extremely helpful trait to global ventures that seek for effectiveness in powering respective web as well as mail services or products. It characterizes numerous devices due to its compatibility (UNIX, 2009). References (2009). Remote users connect to UNIX with reflection x advantage 2.0. (cover story). UNIX Update, 20(6), 1-3. Liu, Y., Yue, Y., & Guo, L. (2011). UNIX operating system: The development tutorial via UNIX kernel services....
2 Pages(500 words)Essay


...The chapter ‘Marketing: Providing Value to explains the concept of marketing in a simple and effective manner as well as related terms and concepts which are aimed at creating superior value for the customers. A layman would think of marketing as similar to advertising or an activity that focuses only on buying and selling- in reality, it is about maintaining strong relationship to the customers by providing them value. The concept of marketing places the needs of the customers at the top and then satisfies their needs by providing desired products and services while ensuring the involvement of the entire organization. In order to implement this marketing concept, the target market is identified first and segmentation is carried... chapter...
1 Pages(250 words)Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Working with UNIX Text Editors for FREE!

Contact Us