Name two ways you can identify the PID number of the login shell.

What will be an ideal response?

$ ps
PID TTY TIME CMD
15223 pts/5 00:00:00 bash
15254 pts/5 00:00:00 ps
$ echo $$
15223

Computer Science & Information Technology

You might also like to view...

In a flow chart, you would use a(n) ________ shape to indicate where a process is implemented in the chart

Fill in the blank(s) with correct word

Computer Science & Information Technology

During a specific incident response and recovery process action, the response team determines that it must first speak to the person ultimately responsible for the data. With whom should the response team speak first?

A. data owner B. system owner C. data custodian D. data user

Computer Science & Information Technology