SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Project Title
A Presentation on VIM.
uses in Linux system
 What is VIM?
Vim is an open-source text editor designed for working with
programming code in Unix. An enhanced version of the Vi text
editor (also written vi and spoken aloud by enunciating the
two letters individually), Vim was developed by Bram
Moolenaar in 1991. The acronym stands for Vi improved.
 Why use VIM Editor
Vim is Free and Open Source
Vim is Always Available
Vim Is Well Documented
Vim Has A Vibrant Community
Vim Is Very Customizable and Extensible
Vim Has Portable Configurations
Vim Uses Less Amount of System Resources
Vim Supports All Programming Languages and File Formats
Vim is Very Popular in the Linux World
 Modes in VIM
There are two modes in vim. One is the command mode and another is
the insert mode.
• In the command mode, user can move around the file, delete text, etc.
• In the insert mode, user can insert text.
 Changing mode from one to another
• From command mode to insert mode type a/A/i/I/o/O ( see details below)
• From insert mode to command mode type Esc (escape key)
 Some useful commands for VIM
• Text Entry Commands (Used to start text entry)
• a Append text following current cursor position
• A Append text to the end of current line
• i Insert text before the current cursor position
• I Insert text at the beginning of the cursor line
• o Open up a new line following the current line and add text there
• O Open up a new line in front of the current line and add text there
 The following commands are used only in the commands mode.
Cursor Movement Commands
• h Moves the cursor one character to the left
• l Moves the cursor one character to the right
• k Moves the cursor up one line
• j Moves the cursor down one line
• ^F (CTRl F) Forward screenful
• ^B Backward screenful
• ^f One page forward
• ^b One page backward
• ^U Up half screenful
• ^D Down half screenful
• $ Move cursor to the end of current line
• 0 (zero) Move cursor to the beginning of current line
• w Forward one word
• b Backward one word
 Exit Commands
• :wq Write file to disk and quit the editor
• :q! Quit (no warning)
• :q Quit (a warning is printed if a modified file has not been saved)
• ZZ Save workspace and quit the editor (same as :wq)
 Text Deletion Commands
• x Delete character
• dw Delete word from cursor on
• db Delete word backward
• dd Delete line
• d$ Delete to end of line
• d^ (d caret, not CTRL d) Delete to beginning of line
 Yank (copy command)
• yy yank current line
• y$ yank to end of current line from cursor
• yw yank from cursor to end of current word
• 5yy yank, for example, 5 lines
 Paste
• p paste below cursor
• P paste above cursor
• u Undo last change
• U Restore line
• J Join next line down to the end of the current line
 Examples
Opening a New File:
• Step 1 type vim filename (create a file named filename)
• Step 2 type i ( switch to insert mode)
• Step 3 enter text (enter your Ada program)
• Step 4 hit Esc key (switch back to command mode)
• Step 5 type :wq (write file and exit vim)
Editing the Existing File
• Step 1 type vim filename (edit the existing file named filename)
• Step 2 move around the file using h/j/k/l key or any appropriate command
h Moves the cursor one character to the left
l Moves the cursor one character to the right
k Moves the cursor up one line
j Moves the cursor down one line
• Step 3 edit required text (replace or delete or insert)
• Step 4 hit Esc key (exit from insert mode if you insert or replace text)
• Step 5 type :wq
Linux text editors

Contenu connexe

Tendances

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSHHemant Shah
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblySam Bowne
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolVipin Rai
 
OS-Process Management
OS-Process ManagementOS-Process Management
OS-Process Managementanand hd
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linuxVarnnit Jain
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonHariharan Ganesan
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating SystemJanki Shah
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scriptingVIKAS TIWARI
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Shimona Agarwal
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Linaro
 

Tendances (20)

Introduction to SSH
Introduction to SSHIntroduction to SSH
Introduction to SSH
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in AssemblyPractical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
Practical Malware Analysis: Ch 6: Recognizing C Code Constructs in Assembly
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Shell programming
Shell programmingShell programming
Shell programming
 
operating system structure
operating system structureoperating system structure
operating system structure
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
OS-Process Management
OS-Process ManagementOS-Process Management
OS-Process Management
 
Networking in linux
Networking in linuxNetworking in linux
Networking in linux
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Linux and DNS Server
Linux and DNS ServerLinux and DNS Server
Linux and DNS Server
 
File Management in Operating System
File Management in Operating SystemFile Management in Operating System
File Management in Operating System
 
An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
 
Bash shell scripting
Bash shell scriptingBash shell scripting
Bash shell scripting
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Introduction to Ubantu
Introduction to UbantuIntroduction to Ubantu
Introduction to Ubantu
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_Trusted firmware deep_dive_v1.0_
Trusted firmware deep_dive_v1.0_
 
Linux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell ScriptingLinux systems - Linux Commands and Shell Scripting
Linux systems - Linux Commands and Shell Scripting
 

Similaire à Linux text editors

Similaire à Linux text editors (20)

lectuer 21-22.pptx
lectuer 21-22.pptxlectuer 21-22.pptx
lectuer 21-22.pptx
 
Vi editor Linux Editors
Vi editor Linux EditorsVi editor Linux Editors
Vi editor Linux Editors
 
Introduction to vi editor
Introduction to vi editorIntroduction to vi editor
Introduction to vi editor
 
Vi Editor
Vi EditorVi Editor
Vi Editor
 
07 vi text_editor
07 vi text_editor07 vi text_editor
07 vi text_editor
 
Vi editor
Vi   editorVi   editor
Vi editor
 
swl--3 (1).docx
swl--3 (1).docxswl--3 (1).docx
swl--3 (1).docx
 
Vi editor
Vi editorVi editor
Vi editor
 
1_Editors_in_Unix
1_Editors_in_Unix1_Editors_in_Unix
1_Editors_in_Unix
 
Tuffarsi in vim
Tuffarsi in vimTuffarsi in vim
Tuffarsi in vim
 
Presentacion vim
Presentacion vimPresentacion vim
Presentacion vim
 
Using vi editor
Using vi editorUsing vi editor
Using vi editor
 
Using VI Editor in Red Hat by Rohit Kumar
Using VI Editor in Red Hat by Rohit KumarUsing VI Editor in Red Hat by Rohit Kumar
Using VI Editor in Red Hat by Rohit Kumar
 
Unit 5 vim an advanced text editor
Unit 5 vim an advanced text editorUnit 5 vim an advanced text editor
Unit 5 vim an advanced text editor
 
Vim
VimVim
Vim
 
Using vi
Using viUsing vi
Using vi
 
Vim Editor And Basic Scripting (Ch-7)
Vim Editor And Basic Scripting (Ch-7)Vim Editor And Basic Scripting (Ch-7)
Vim Editor And Basic Scripting (Ch-7)
 
Text editor In RHEL
Text editor In RHELText editor In RHEL
Text editor In RHEL
 
Vim Basics
Vim BasicsVim Basics
Vim Basics
 
VI Editors
VI EditorsVI Editors
VI Editors
 

Dernier

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Linux text editors

  • 1. Project Title A Presentation on VIM. uses in Linux system
  • 2.  What is VIM? Vim is an open-source text editor designed for working with programming code in Unix. An enhanced version of the Vi text editor (also written vi and spoken aloud by enunciating the two letters individually), Vim was developed by Bram Moolenaar in 1991. The acronym stands for Vi improved.
  • 3.  Why use VIM Editor Vim is Free and Open Source Vim is Always Available Vim Is Well Documented Vim Has A Vibrant Community Vim Is Very Customizable and Extensible Vim Has Portable Configurations Vim Uses Less Amount of System Resources Vim Supports All Programming Languages and File Formats Vim is Very Popular in the Linux World
  • 4.  Modes in VIM There are two modes in vim. One is the command mode and another is the insert mode. • In the command mode, user can move around the file, delete text, etc. • In the insert mode, user can insert text.  Changing mode from one to another • From command mode to insert mode type a/A/i/I/o/O ( see details below) • From insert mode to command mode type Esc (escape key)
  • 5.  Some useful commands for VIM • Text Entry Commands (Used to start text entry) • a Append text following current cursor position • A Append text to the end of current line • i Insert text before the current cursor position • I Insert text at the beginning of the cursor line • o Open up a new line following the current line and add text there • O Open up a new line in front of the current line and add text there
  • 6.  The following commands are used only in the commands mode. Cursor Movement Commands • h Moves the cursor one character to the left • l Moves the cursor one character to the right • k Moves the cursor up one line • j Moves the cursor down one line • ^F (CTRl F) Forward screenful • ^B Backward screenful • ^f One page forward • ^b One page backward • ^U Up half screenful • ^D Down half screenful • $ Move cursor to the end of current line • 0 (zero) Move cursor to the beginning of current line • w Forward one word • b Backward one word
  • 7.  Exit Commands • :wq Write file to disk and quit the editor • :q! Quit (no warning) • :q Quit (a warning is printed if a modified file has not been saved) • ZZ Save workspace and quit the editor (same as :wq)  Text Deletion Commands • x Delete character • dw Delete word from cursor on • db Delete word backward • dd Delete line • d$ Delete to end of line • d^ (d caret, not CTRL d) Delete to beginning of line
  • 8.  Yank (copy command) • yy yank current line • y$ yank to end of current line from cursor • yw yank from cursor to end of current word • 5yy yank, for example, 5 lines  Paste • p paste below cursor • P paste above cursor • u Undo last change • U Restore line • J Join next line down to the end of the current line
  • 9.  Examples Opening a New File: • Step 1 type vim filename (create a file named filename) • Step 2 type i ( switch to insert mode) • Step 3 enter text (enter your Ada program) • Step 4 hit Esc key (switch back to command mode) • Step 5 type :wq (write file and exit vim) Editing the Existing File • Step 1 type vim filename (edit the existing file named filename) • Step 2 move around the file using h/j/k/l key or any appropriate command h Moves the cursor one character to the left l Moves the cursor one character to the right k Moves the cursor up one line j Moves the cursor down one line • Step 3 edit required text (replace or delete or insert) • Step 4 hit Esc key (exit from insert mode if you insert or replace text) • Step 5 type :wq