Describe the way that shells implement I/O redirection.

What will be an ideal response?


Most shells implement I/O redirection by using dup () (or dup2 () ) to duplicate the file descriptors
opened by the parent shell. The child shell can then close the parent’s file descriptors and use its
own, having modified them as required by redirection or pipe symbols. This way the file
descriptors belonging to the parent shell are unaffected by the child shell.

Computer Science & Information Technology

You might also like to view...

Describe how a database designer typically identifies the set of functional dependencies associated with a relation.

What will be an ideal response?

Computer Science & Information Technology

Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Spreadsheet programs typically include a library of formulas known as ________

A) functions B) commands C) tasks D) computations

Computer Science & Information Technology

Which of the following happens whenthe Cover Page button is used in the Pages group on the Insert tab??

A. ?Styles used for the header and footer on the cover page are not allowed to be reused for the other pages of the document. B. ?A section break is inserted automatically after the cover page. C. ?The cover page takes page number as 1 by default. D. ?The pages following the cover page are numbered using roman numerals.

Computer Science & Information Technology