What scenarios could occur as a result of changing the runlevel of the system?

What will be an ideal response?


When the runlevel is changed, init calls the rc script with the new runlevel as parameter (such as /etc/init.d/rc 3). The /etc/init.d/rc script examines the /etc/init.d/rccurrentrl.d/ and /etc/init.d/rcnewrl.d/ directories and determines what to do.
For example, suppose you change from runlevel 5 to runlevel 3. There are three possible scenarios that could occur as a result:
•  There is a Kxx link for a certain service in /etc/init.d/rc5.d/ and there is an Sxx link in /etc/init.d/rc3.d/ for the same service. In this case, the service is neither started nor stopped because the service should run in both runlevels. Therefore, the service's script in /etc/init.d/ is not called at all.
•  There is a Kxx link for a certain service in /etc/init.d/rc5.d/, but there is no corresponding Sxx link in /etc/init.d/rc3.d/. In this case, the script /etc/init.d/service is called with the stop parameter and the service is stopped.
•  There is an Sxx link in /etc/init.d/rc3.d/ and there is no corresponding Kxx link for the service in /etc/init.d/rc5.d/. In this case, the script /etc/init.d/service is called with the start parameter and the service is started.

Computer Science & Information Technology

You might also like to view...

To confirm the authenticity of a document, you can attach a ________, which is an electronic stamp that displays information about the person or organization

A) digital signature B) digital certificate C) binary certificate D) binary signature

Computer Science & Information Technology

A set of declarations grouped under one selector is called a declaration block

Indicate whether the statement is true or false

Computer Science & Information Technology

A graphic created with Adobe Flash has the extension ____.

a. FLA b. FLS c. SWF d. MFL

Computer Science & Information Technology

The process of integrating the governance of the physical security and information security efforts is known in the industry as __________.

A. convergence B. combination C. intimation D. optimization

Computer Science & Information Technology