Updating YUM in Linux
This article will teach us how to update YUM in Linux and how to install, update, remove, find and manage packages on a Linux system. We have also seen the difference yum update
between and in Linux yum upgrade
.
yum update command in Linux
yum update
The command (modified as yellow-dog updater) is an open source command used in Linux. Using yum update, we can easily install, update, and remove software packages on Linux systems.
Let us understand how to use yum command for different purposes in Linux. Before using yum update command, we need to install yum update package using following command.
Step 1:
$ sudo apt-get update -y
Step 2:
$ sudo apt -y install yum
After running the above command, the yum update package will be installed on your Linux system.
Install the package using the yum command
If we want to install a package called Firefox, we can do so using the yum command. The following yum command will automatically find and install the required Firefox package.
$ yum install Firefox
The above command will ask for confirmation from the user before installing the Firefox package on the system. If we want to avoid this and automatically install the package without asking for confirmation, we need to use the -y option as shown below.
$ yum -y install firefox
Remove packages using yum command
We can remove any package using yum command in Linux. If we want to remove Firefox package that we installed, we use the following command.
$ yum -y remove firefox
The above command will remove the Firefox package including all its dependencies. We have also used the -y option here.
Run this command without asking for confirmation before removing the package.
Update packages using yum command
We can also use yum command to update any package in Linux.
For example, we have a package called MySQL and we want to update it to the latest version. We can update it to the latest version using the following command. e We installed the Firefox package, we use the following command.
$ yum update mysql
Get information about any package using yum command
Using yum command, we can also get information about any package before installing it.
For example, if we want to install Firefox package on Linux, let’s first learn about the package. We can get information about Firefox package by running the following command.
$ yum info Firefox
The difference between yum update and yum upgrade
yum update
The yum upgrade command updates all installed packages to the latest versions available in the repository. The yum upgrade command does the same.
The difference between these commands is that when we use yum upgrade
the remove command, it removes all obsolete packages from the system after installing the packages whereas yum update
remove does not remove obsolete packages from the system after installing the packages.
I hope this article helped you understand yum update
the use of command and the difference between yum update
and in Linux.yum upgrade
For reprinting, please send an email to 1244347461@qq.com for approval. After obtaining the author's consent, kindly include the source as a link.
Related Articles
How to decompress x.tar.xz format files under Linux
Publish Date:2025/04/08 Views:186 Category:OPERATING SYSTEM
-
A lot of software found today is in the tar.xz format, which is a lossless data compression file format that uses the LZMA compression algorithm. Like gzip and bzip2, it supports multiple file compression, but the convention is not to compr
Summary of vim common commands
Publish Date:2025/04/08 Views:115 Category:OPERATING SYSTEM
-
In Linux, the best editor should be vim. However, the complex commands behind vim's powerful functions also make us daunted. Of course, these commands do not need to be memorized by rote. As long as you practice using vim more, you can reme
Detailed explanation of command return value $? in Linux
Publish Date:2025/04/08 Views:58 Category:OPERATING SYSTEM
-
? is a special variable. This variable represents the return value of the previous command. That is to say, when we run certain commands, these commands will return a code after running. Generally, if the command is successfully run, the re
Common judgment formulas for Linux script shell
Publish Date:2025/04/08 Views:159 Category:OPERATING SYSTEM
-
In shell script programming, predicates are often used. There are two ways to use predicates, one is to use test, and the other is to use []. Let's take a look at how to use these two methods through two simple examples. Example 1 # test –
Shell script programming practice - specify a directory to delete files
Publish Date:2025/04/08 Views:98 Category:OPERATING SYSTEM
-
Usually, in Linux system we need to frequently delete some temporary files or junk files. If we delete them one by one manually, it will be quite troublesome. I have also been learning shell script programming recently, so I tried to write
Use of Linux command at - set time to execute command only once
Publish Date:2025/04/08 Views:158 Category:OPERATING SYSTEM
-
This article mainly involves a knowledge point, which is the atd service. Similar to this service is the crond service. The functions of these two services can be similar to the two functional functions of javascript. Those who have learned
Use of Linux command crontab - loop execution of set commands
Publish Date:2025/04/08 Views:170 Category:OPERATING SYSTEM
-
Compared with at , which executes a command only once, crontab, which we are going to talk about in this article, executes the set commands in a loop. Similarly, the use of crontab requires the support of the crond service. The service is s
Linux practice - regularly delete files under the directory
Publish Date:2025/04/08 Views:198 Category:OPERATING SYSTEM
-
Since we want to delete the files under the directory regularly, we need to use the Linux crontab command. And the content format of each work routine is also introduced in the format of each crontab work. Similarly, we need to use shell sc
How to use the Linux file remote copy command scp
Publish Date:2025/04/08 Views:151 Category:OPERATING SYSTEM
-
Scp copies files between two hosts over the network, and the data is encrypted during transmission. Its underlying layer uses ssh for data transmission. And it has the same authentication mechanism and the same security level as ssh. When u