Compare cron, anacron, and systemd timer units

Assignment Help Operating System
Reference no: EM131226698

Question 1:

An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux currently offers not one service but potentially three—cron, anacron, and systemd timer units.

In about a page compare and contrast all three systems. Illustrate your discussion by using the system files /etc/anacron and /etc/crontab and by constructing equivalent systemd service and timer files.

Question 2:

The web administrator of your organisation needs to login remotely to the machine that is running the organisation’s public web site. You tell her that the only way to login is via The Secure Shell—which she knows nothing about! Assuming she is logging in via a Linux boxwrite a help document for her containing the following—

a. A short introduction to SSH, explaining why it is the preferred way of logging into a remote machine—this explanation will need to discuss symmetric and asymmetric key encryption.

Question 3:

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the files he has been working on for the week backed up automatically that evening to the DVD!

Verified Expert

Linux has three main timer units namely Cron, Anacron and Systemd. There is a distinct set of features that all of these time schedulers in Linux are built with. However, it is a fact that all of these three are merely timers and the application of their usage is quite different from each other. Cron is a time based task scheduler program in Linux. Cron is specifically used in the environment where the system has to be scheduled to very specific times, generally precisely to the minutes and seconds. Tasks can run on particular dates, or repeat at periods as little as consistently. Cron likewise permits clients in extensive national systems to assign the time zone under which their tasks fall, to guarantee fitting execution utilizing local times. Anacron can be considered as ‘Cron’ for laptops and desktops, as it processes in the same way as the Cron.

Reference no: EM131226698

Questions Cloud

Promotions and transfers of employees : Fiji Airways has embarked on promotions and transfers of employees within the company to mitigate its potential labour shortage. Discuss the advantages offilling positions with current employees rather than recruiting from externalsources. Illustr..
What is the load factor of the hash table : Find the average number of key comparisons in a successful search in the hash table. You can assume that a search for each of the nine keys is equally likely - What is the load factor of the hash table?
Describe the ethical model being used by the company : Describe the motivational practices used by the organization to promote better strategy execution. Include some illustrative examples in your response.
Improve employees performance : Question: Besides giving employees feedback, what other steps a manager can take to improve employees' performance? Discuss your answer.
Compare cron, anacron, and systemd timer units : An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux curre..
What is the cost of equity capital for vwx : Explain homemade leverage and why it matters. What is the cost of equity capital for VWX? Using the M&M Proposition I with taxes, calculate the value of the firm at each debt level.
Diagnosing the change : Select a Diagnostic Model (see Chapter Five) that you utilize to review aspects of change activities and actions that have been taken by the companies chosen. Here we are looking at the "parts" of the companies as well as their strategies, as surm..
Key human resources concerns and considerations : What are key human resources concerns and considerations related to compensation when an organization expands and moves into two or more geographical markets?
Selection methods barry ilaisa : Identify the selection methods Barry Ilaisa used for hiring salespeople? Did he go about using these methods in the best order? Explain your answer.

Reviews

Write a Review

Operating System Questions & Answers

  Successful operating systems company

As the chief engineer at a highly successful operating systems company, you must make tough choices regarding engineering tradeoffs every day. As a former Linux administrator, your goal is to make the lives of other administrators easier while ens..

  Illustrate how many entries are there in logical address

Consider a computer system with 48-bit logical address and 4-KB page size. System supports up to 1 GB of physical memory. Illustrate how many entries are there in each of the following?

  Compare and contrast the two varieties of distribute os

Compare and contrast the two varieties of distrubted operating systems discussed in this chapter: a process-based DO/S and an object-based DO/S.

  Role and responsibilities of a network administrator

Create a job description of the role and responsibilities of a network administrator. Provide a detailed list of personal traits and skills necessary for a person to be a highly effective network administrator.

  Differences between the internet, intranets, extranets

Discuss similarities and differences between the Internet, intranets, extranets. Define e-Commerce and discussow can e-Commerce businesses be categorized?

  Discussion about wireless networking technologies

Your corporation has just occupied an old historic building in which fifteen workers will work. Due to historic building codes, the corporation is not permitted to run cables inside walls or ceilings.

  Question about data communications

A 4480 octet datagram is to be transmitted and requires to be fragmented because it will pass through an Ethernet with a maximum payload of 1500 octets.

  Applying forensic science to computers

In our first seminar, we will learn how to acquire, authenticate, and analyze digital evidence. We will compare the technology and law for different countries.

  How much should a company invest in it

How much should a company invest in IT? How does a company know if it under-invests or over-invests in IT? If you haven''t heard of the "IT-productivity paradox,

  Define the term context switch

Define the term context switch. Explain how context switching takes place. (use a diagram, with two processes)

  In a powerpoint presentation of 10-15 slides with 200-250

in a powerpoint presentation of 10-15 slides with 200-250 words of speaker notes per slide complete the

  Ethical issues of web site design

Analyze the user interaction interface of a typical website that you might wish to improve and design in terms of any ethical considerations that might require to be addressed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd