centos does not come with vim. The vi editor is installed by default in centos. You can use the "rpm -qa|grep vim" command to check whether vim is installed. If the system is not installed, you can use " Use the yum -y install vim*” command to install vim.
The operating environment of this article: centos 7 system, Dell G3 computer.
Does vim come with centos?
After we installed Centos, it installed the VI editor by default, but VIM was not installed.
Let’s take a look at how to install vim in Centos:
First use the command to check whether vim is installed: as follows:
[root@localhost conf]# rpm -qa|grep vim
If vim is not installed, use The following command can install vim:
[root@localhost conf]# yum -y install vim*
Using vim
It is divided into three modes, namely command mode (Command mode) and input mode (Insert mode) ) and bottom line command mode (Last line mode)
Command mode:
The user has just started vi/vim and entered the command mode.
In this state, keystrokes will be recognized by Vim as commands instead of character input. For example, if we press i at this time, we will not enter a character. i is treated as a command.
The following are some commonly used commands:
i Switch to input mode to enter characters.
x Delete the character at the current cursor position.
: Switch to bottom line command mode to enter commands on the bottom line.
If you want to edit text: Start Vim, enter command mode, press i to switch to input mode.
The command mode only has some of the most basic commands, so you still have to rely on the bottom line command mode to enter more commands.
Input mode
Press i in command mode to enter input mode.
In the input mode, you can use the following keys:
character keys and Shift combination to enter the characters
ENTER, Enter key, line feed
BACK SPACE, backspace key, delete the character before the cursor
DEL, delete key, delete the character after the cursor Character
arrow keys, move the cursor in the text
HOME/END, move the cursor to the beginning/end of the line
Page Up/Page Down, page up/down
-
Insert, switch the cursor to input/replace mode, the cursor will become a vertical line/underline
ESC, exit input mode and switch to command mode
Bottom line command mode
In command mode Press: (English colon) to enter the bottom line command mode.
Bottom line command mode allows you to enter single or multiple character commands, and there are many available commands.
In the bottom line command mode, the basic commands are (the colon has been omitted):
q Exit the program
w Save the file
Press the ESC key to exit the bottom line command mode at any time.
Recommended tutorial: "centos tutorial"
The above is the detailed content of Does centos come with vim?. For more information, please follow other related articles on the PHP Chinese website!

Use Ansible to implement automated management of CentOS. The specific steps include: 1) writing a playbook to define tasks, such as installing and configuring Apache; 2) executing the playbook through the SSH protocol to ensure consistency of system configuration; 3) using conditional judgment and loop functions to handle complex scenarios; 4) optimizing performance and following best practices, such as using asynchronous tasks and optimizing inventory files.

Frequently asked questions and answers to CentOS interview include: 1. Use the yum or dnf command to install software packages, such as sudoyumininstallnginx. 2. Manage users and groups through useradd and groupadd commands, such as sudouseradd-m-s/bin/bashnewuser. 3. Use firewalld to configure the firewall, such as sudofirewall-cmd--permanent-add-service=http. 4. Set automatic updates to use yum-cron, such as sudoyumininstallyum-cron and configure apply_updates=yes.

How to diagnose and solve common problems in CentOS system? First, check the startup log to solve the failure of system startup; second, check the network configuration file to solve the network problem; finally, use the Yum command to solve the package management problem. Through these steps, you can effectively diagnose and resolve common problems in CentOS systems.

CentOS server security reinforcement can be achieved through the following steps: 1. Keep the system software updated and use the "sudoyumupdate-y" command; 2. Disable unnecessary services, such as "sudosystemctldisablecups&&sudosystemctlstopcups"; 3. Configure SELinux as mandatory mode, use the "sudosetenforce1&&sudosed-i's/SELINUX=permissive/SELINUX=enforcing/g'/etc/selinux/config" command; 4. Regularly

Advanced command line management skills of CentOS include: 1. Use systemctl to manage system services, 2. Use top to monitor system resources, 3. Use yum to manage software packages, 4. Use find and xargs to batch process files, 5. Use rsync to optimize file copying. These techniques can improve productivity, solve common problems, and optimize system performance.

In CentOS, how to manage user accounts, permissions and services? 1. Use the useradd command to create a user, 2. Use the usermod and groupmod commands to manage user permissions, 3. Use the systemd to manage services, such as the systemctlstart/stop/status command. Through these steps, CentOS servers can be managed efficiently to ensure their safe and efficient operation.

The steps for backup and recovery in CentOS include: 1. Use the tar command to perform basic backup and recovery, such as tar-czvf/backup/home_backup.tar.gz/home backup/home directory; 2. Use rsync for incremental backup and recovery, such as rsync-avz/home//backup/home_backup/ for the first backup. These methods ensure data integrity and availability and are suitable for the needs of different scenarios.

Using Docker to containerize, deploy and manage applications on CentOS can be achieved through the following steps: 1. Install Docker, use the yum command to install and start the Docker service. 2. Manage Docker images and containers, obtain images through DockerHub and customize images using Dockerfile. 3. Use DockerCompose to manage multi-container applications and define services through YAML files. 4. Deploy the application, use the dockerpull and dockerrun commands to pull and run the container from DockerHub. 5. Carry out advanced management and deploy complex applications using Docker networks and volumes. Through these steps, you can make full use of D


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Atom editor mac version download
The most popular open source editor

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

Zend Studio 13.0.1
Powerful PHP integrated development environment

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

SublimeText3 Chinese version
Chinese version, very easy to use