Create a FIFO. Using the shell, demonstrate that two users can use this FIFO to communicate asynchronously.

What will be an ideal response?


Log in as one user and create a FIFO in /tmp so all users have permission
to access the FIFO.

$ id
uid=502(sam) ...
$ cd /tmp
$ mkfifo myfifo
$ cat > myfifo
Hi there, my name is Sam.

Log in from another terminal as another user and read the FIFO:

$ id
uid=503(max) ...
$ cd /tmp
$ cat < myfifo
Hi there, my name is Sam.
The first user can enter text into the FIFO at any time. As long as the first
user keeps the FIFO open, the second user can read the text by opening the
FIFO at any time.

Computer Science & Information Technology

You might also like to view...

A _____________ is a flow of characters or other data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Match each term with the correct statement below.

A. A situation where either the likelihood or impact of an occurrence can be justified B. The assessment of the overall likelihood and impact of a threat C. An intrinsic weakness that is currently not exploited by a threat D. Representation of the risk environment using an approach such as data flow or UML E. Adversarial action that could cause harm or an undesirable outcome F. Confidence that a given approach will produce dependable and intended outcomes G. Electronic or behavioral actions designed to prevent or mitigate an adverse event H. The degree of likelihood and impact that is considered acceptable before a response is required I. A set of formal organizational processes that is designed to slow down or minimize the impact of an adverse event

Computer Science & Information Technology

How do client OSs react when multiple RAs are received?

What will be an ideal response?

Computer Science & Information Technology

The Table pointer is used to draw a custom table on a slide

Indicate whether the statement is true or false

Computer Science & Information Technology