Name two ways you can identify the PID number of the login shell.
What will be an ideal response?
$ ps
PID TTY TIME CMD
15223 pts/5 00:00:00 bash
15254 pts/5 00:00:00 ps
$ echo $$
15223
Computer Science & Information Technology
You might also like to view...
In a flow chart, you would use a(n) ________ shape to indicate where a process is implemented in the chart
Fill in the blank(s) with correct word
Computer Science & Information Technology
During a specific incident response and recovery process action, the response team determines that it must first speak to the person ultimately responsible for the data. With whom should the response team speak first?
A. data owner B. system owner C. data custodian D. data user
Computer Science & Information Technology