Creation of a fully functional script

Assignment Help Computer Engineering
Reference no: EM131944697

Final Project Guidelines

Overview - The final project for this course is the creation of a fully functional script, and the demonstration of successful use and navigation of the Linux operating system.

You will complete this project in Codio in the unit titled "Final Project." As you work on this project, you must complete the "Getting Your Bearings" section in one session. You must also complete the "Executing Tasks" section in one session: You will submit a log file of commands generated by the Linux operating system, and that log of commands will reset when you exit the system. Therefore, plan accordingly and create your log file prior to exiting the system. (See the Codio website for more information on downloading log files.) This project has directions that include naming conventions for files and directories. Following these naming conventions is important. In the event that your instructor needs to check the directory structure or check your files inside of the Codio environment, having consistent directory and file names will make them easier to find.

In this assignment, you will demonstrate your mastery of the following course outcomes:

  • Select appropriate commands for navigating, creating, and organizing the Linux directory structure.
  • Execute tasks using basic Linux utilities and commands that search, redirect, and manipulate input and output.
  • Interpret output from executing basic commands for determining status and verifying expected results.
  • Create a basic Linux script combining multiple commands that simplifies a repeatable task.

Scenario - You are starting a new position at an oil and gas company called SNHU-Pipeline Company. They are a well-established company that has been in business for 50 years. So, when it comes to technology, SNHU-Pipeline Company has been slow to evolve, especially in its employee computers and operating systems. As a 100% Microsoft Windows shop, SNHU-Pipeline Company is looking for ways to cut costs, improve reliability, and improve performance for end users and applications services.

Recently, management has learned that you have a background in Linux operating systems and wants to get your thoughts on how they can achieve their goals for end-user enhancements.

Prompt - Management would like to see some example artifacts of Linux being utilized. They have also requested that you develop a backup script showing the capabilities an end user can have in providing themselves a way to back up their own files.

Specifically, the following critical elements must be addressed:

Getting Your Bearings: In this section of the final project, you will demonstrate your ability to execute commands to verify and confirm the status of the directory, files, and user account. At the end of this section, you will create a log file that will include a list of all the commands you used to complete these steps.

I. Navigate: The first step in this process, which you will provide evidence for in your log file, is to view the following using Linux commands:

A. Current directory

B. Current user

C. Directory contents

II. Command list information: Your next step will be to utilize a resource inside the Linux operating system that can provide you with more information for how to utilize commands.

A. Utilize a command to access key command information that would inform which command switch to use to show all files in the directory, including hidden files.

B. Review the directory contents again utilizing a command with a switch that includes hidden files.

III. Locate a file: Locate and open a file in the Linux workspace directory that contains the following text string: last backup.

IV. File permissions: Locate the whoownsme.txt file and confirm that all users have the ability to execute the file.

V. Running processes: View all the processes running in the system in order of priority.

VI. Log file: Utilize a Linux command to create a log file that contains all of the commands you have utilized up to this point, and ensure all of the commands utilized in critical elements I through V are listed. Title this file Bearings_Log_File.txt, and download this file for submission.

Executing tasks: In this section of the project, you will demonstrate your ability execute Linux commands to create files and create and organize the Linux directory structure. At the end of this section, you will create a log file that will include a list of all the commands you used to complete these steps.

VII. In the workspace directory, create new directories titled NEW, BACKUP, and OLD.

VIII. Create files: For this section, you will need to create files using five different methods in preparation for scripting in the following section. Ensure that you place them in the directory titled "NEW":

A. A text file with five lines of text that you chose, titledPersonal_Content.txt

B. A text file listing the quantity of operating system free space, titledFree_Space_Content.txt

C. A text file listing the directory contents of your workspace directory and showing all file permissions, titled: Directory_Content.txt

D. A text file with the concatenated output of the Directory_Content.txt file (Title the newfileCopied_Content.txt.)

E. A text file showing the current month, day, and time (Title this fileTime_File.txt.)

IX. Modify and move files: Utilize Linux commands to rename files and copy them to a different directory in preparation for the backup script in the following section. Rename the files by adding the suffix "_OLD" to them, and move the files from the "NEW" directory to the "OLD" directory.

Remember that your modified files should use an appropriate naming convention: XXXX_XXXX_OLD.txt. Ensure that your modified files reside in the OLD directory, and that your original files reside in the NEW directory.

X. Log file: Create a log file of all the commands you have utilized up to this point. Title this file Tasks_Log_File.txt, and download it for submission.

Script: In this section of your final project, you will write a basic script to create and back up files. You will create this script with the vi editor. The script will combine multiple commands and simplify a repeatable task. Your script should be named Firstname_Lastname.BASH. Your script and your Linux directory structure should demonstrate that you have correctly written the script to do the following:

XI. Create files: In this section, you will demonstrate your ability to utilize various Linux commands to create text files. Create these files in the NEW directory. Ensure that the commands in your log file show that the following three text files were created using three different methods. Create the following files:

A. A text file listing the quantity of operating system free space, titled Free_Space_Content.txt

B. A text file listing the directory contents of the OLD folder, titled OLD_Content.txt

C. A text file showing the current month, day, and time (Title thisfileTime_File.txt.)

XII. Modify and Move files: Utilize Linux commands to copy files to a different directory and rename them.

A. Copy the following selected files from the OLD directory to the BACKUP directory. Ensure that you change the filename suffix from XXX_OLD to XXX_BACKUP.

i. Free_Space_Content_OLD.txt

ii. Directory_Content_OLD.txt

iii. Time_File_OLD.txt

B. Move all files from the NEW directory to the BACKUP directory (no renaming necessary). Clean up the Linux directory structure by deleting the items in the NEW directory.

XIII. Execute the script: At this point, you will need to complete and execute the newly created script and complete a successful directory backup process.

XIV. Assess output: Finally, analyze the Linux directory structure and file contents to confirm successful script implementation. Ensure that you download your script and your Script_Assessment.txt file for submission.

A. Create a text file titled Script_Assessment.txt in the NEW directory; write a paragraph identifying the commands that you used in your script, and assess the success of your script.

Reference no: EM131944697

Questions Cloud

Distinguish ethics from law and policy : Distinguish ethics from law and policy. What role does maintenance of personal integrity play in the personnel security arena?
Impact of the greek financial crisis : impact of the Greek financial crisis on the Greek Super League (professional football) and undertake an analysis of the competitive environment
How long did blood sugar remain elevated and why : How quickly did the glucose levels rise in the blood following ingestion? How long did blood sugar remain elevated and why?
Explain the differences in the values of the betas : Explain what the values of the betas (the slope coefficients in the regression) indicate and discuss the factors that might explain the differences.
Creation of a fully functional script : IT 255 Final Project - The final project is the creation of fully functional script, and demonstration of successful use & navigation of Linux operating system
Relationship between oil-money and finance : Importance and relationship between OIL, MONEY, and FINANCE. Why are pipelines important? What is the oil glut that is being mentioned?
What is the role of personal selling in the strategy : Think about a company you believe employs a unique and creative marketing communication strategy. Answer the following questions:
Calculate npv of the fcf associated with each alternative : Beryl's Iced Tea currently rents a bottling machine for $53,000 per year, including all maintenance expenses. It Is considering purchasing a machine Instead.
Confidentiality of the peer review process impact patients : How does the confidentiality of the peer review process impact patients?

Reviews

len1944697

4/17/2018 1:00:09 AM

Final Project Rubric - Guidelines for Submission: Submit assignment as a Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Two history log files, Your script and Your Script_Assessment.txtfile. Log file provides evidence that all of the required navigation areas were viewed (100%). Utilized a command to access key command information that would inform which command switch to use to show all files in the directory, including hidden files (100%).

len1944697

4/17/2018 1:00:02 AM

Utilizes a command to review the directory contents again with a switch that includes hidden files (100%). Located and opened a file in the Linux workspace directory that contains the text string lastbackup (100%). Located the whoownsme.txt file and confirmed that allusers have the ability to execute the file (100%). Viewed an ordered list of computer processes in order of priority (100%) Directories titled NEW, BACKUP, and OLD were created in the workspace directory (100%) Utilized a Linux command to create a log file that contains all of the commands utilized up to this point, and ensured all of the commands utilized in critical elements I through Vare listed (100%) Files were created using five different methods and were placed in the NEW directory (100%) Moved the files from the NEW directory to the OLD directory and modified their file names by adding the suffix _OLD (100%)

len1944697

4/17/2018 12:59:54 AM

Utilized a Linux command to create a log file that contains all of the commands utilized up to this point, and ensured all of the commands utilized in critical elements I through V are listed (100%) Files were created using three different methods and were created in the NEW directory (100%) Copied the following selected files from the OLD directory to the BACKUP directory and changed the filename suffix from XXX_OLD to XXX_BACKUP (100%) Moved all files from the NEW directory to the BACKUP directory and cleaned up the Linux directory structure by deleting items in the NEW directory (100%)

len1944697

4/17/2018 12:59:48 AM

Completes and executes the script, and completes successful directory backup process (100%) Meets “Proficient” criteria, and assessment of the success of the script demonstrates a sophisticated awareness (100%) Submission is free of errors related to citations, grammar, spelling, syntax, and organization and is presented in a professional and easy-to-read format (100%)

Write a Review

Computer Engineering Questions & Answers

  Draw a network diagram

Draw a network diagram representing the following information: the project starts with three activities, A, B, and C, which can be done concurrently.

  What is the output of the given programs

What is the output of the following programs? (Please try to solve the problem without compiling and running the program.)

  Explain the concept of programmability

how this benefits the purchaser of a console gaming system, such as the XBox.

  State the salient features of cray xts supercomputer

State in brief the salient features of Cray XTS supercomputer; draw a schematic diagram of the 2D torus system interconnect.

  Write an html document to create a form

Write an HTML document to create a form with the following capabilities: A text widget to collect the user's name and Four 25-watt light bulbs for $2.39.

  Graph the amplitude-modulated pam signal

Repeat Illustrative Problem II with a rectangular pulse shape in the presence of AWGN for SNR values of 20, 10, 5, and 2 dB.

  Find all the pictures of real weasels

Use FTK to find all the pictures of real weasels and created a bookmark. Using the Report Wizard, create a report containing the bookmark you just created

  Why do need to worry about dataveillance on a personal level

Why do we need to worry about dataveillance on a personal level? Family level? Work level (either as an employee or as a business)?

  Communication among various constituents in terms of time

communication among various constituents in terms of time and place is key to project management consideration.

  You can easily and quickly deploy applications via a gui

1.you can easily and quickly deploy applications via a gui interface and push via a browser. historically many

  Questionsteve smith is a restaurant owner who wants to

questionsteve smith is a restaurant owner who wants to expend his 10000 to modernize his restaurant by adapting it more

  What is the primary responsibility of a firewall

What is the primary responsibility of a firewall? What are the three basic types of firewalls? What are the advantages of having a security policy in place?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd