Change the primary group of the user wsmith to root

Assignment Help Basic Computer Science
Reference no: EM132757436

Write commands to accomplish the following:

a. generate a user with a login name of bsmith, a UID of 733, a GECOS field entry of "accounting manager," and a password of Gxj234

b. Delete the user jdoe, but leave the home directory intact

c. Change the properties of the existing user wjones such that the user has a new comment field of "shipping" and an account expiry of March 23, 2032

d. Lock the account of wjenkins

e. Change the password of bsmith to We34Rt

f. Change the properties of the existing user tbanks such that the user is a member of the managers group and has a login name of artbanks

g. generate user with the same UID and primary group as root and a login name of wjones

h. Change the primary group of the user wsmith to root

i. Add the users tbanks and jdoe to the group acctg.

Reference no: EM132757436

Questions Cloud

Discuss the issue under lying social responsibility of firm : Describe the financial Management in terms of three decisions that confront a financial manager. Discuss the issue under lying social responsibility of the firm
What is the? semi-annually compounded interest rate : A major property developer is concerned about lack of sales due to local economic conditions. To ensure that his condos are? occupied.
Define in terms on financial managment corporate governance : Define in terms on financial managment Corporate governance, capital gain, yield to maturity, preferred stockholder, common stockholder
What is the level of safety stock if lead-time could be high : Spencer Industries annually buys 900,000 units of Part XY. The EOQ is 2,000 units. Spencer Industry's average usage equals 3,000 units/day.
Change the primary group of the user wsmith to root : generate a user with a login name of bsmith, a UID of 733, a GECOS field entry of "accounting manager," and a password of Gxj234
What advantages does a virtual close provide : This enables them to close their books nearly instantaneously any time during the year. What advantages does a virtual close provide?
Would expect price of a ten-year floating-rate bond : Would expect price of a 10-year floating-rate bond to be more or less sensitive to changes in interest rates than price of a 10-year maturity fixed-rate bond?
What security properties does a one-time pad cipher : What security properties does a one-time pad cipher provide and what under what assumptions? Explain why each assumption is needed in detail
What amount should be reported as share premium at year-end : What amount should be reported as share premium at year-end? What amount should be reported as total shareholders' equity at year-end?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Double spaced paper on digital steganography

Double spaced paper on Digital Steganography, written in APA format, showing sources and a bibliography

  Government surveillance and personal privacy

Between the two seemingly opposing sides, what is your standpoint? How would you mediate the conflicting perspectives under the light of Christianity?

  Determining the role of societal values

Elaborate in detail the role of societal values and social myths utilizing examples as well as importance of critical thinking. Provide references in APA format.

  Operations of some of malicious software

What are some of the characteristics and operations of some of the malicious software that exists today?

  Draw an inheritance hierarchy for students

(Student Inheritance Hierarchy) Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig.

  Processing software to create and format documents

Use word processing software to create and format documents. Use technology and information resources to research issues in information systems. Write clearly and concisely about introductory information systems topics using proper writing mechanics..

  Find the diagonal entries of p

Find an invariant probability whose support is R1 and another whose support is R2. Find all invariant probabilities.

  How would you classify operating systems

How would you classify operating systems. Give at most five classifications

  Conductivity of intrinsic semiconductors

Briefly describe the effect of temperature on the conductivity of intrinsic semiconductors.

  Security protocols works

Describe in detail how each of the three security protocols works - SSL, Convergence, and DANE.

  What was the growth rate of capital intensity

For the years 1948-1973, output per person in the private sector grew 3.3 percent, labor composition grew 0.2 percent, and total factor productivity grew.

  Human computer interface

Everything we touch that is electronic has a Human to Computer Interface (HCI). Some companies put a lot of effort into the user experience.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd