Describe the various unix run levels

Assignment Help Operating System
Reference no: EM132087776

The first script that needs to be written is automating the shutdown procedure. Write a script that will perform the following tasks:

Prompt the system administrator for all valid input parameters.

Ask if a wall needs to be sent, and if yes, send the message.

Ask if this is a shutdown or reboot, and process appropriately.

In addition, take this opportunity to describe the various UNIX run levels, what each level is used for, and how to boot to a specific run level.

You should also take this opportunity to create the template for your entire class project (also known as the key assignment), and create a Word document that you will add to for each remaining assignment.

Each week, you will add to this document and submit it for grading. As a preview, each section will contain the following:

UNIX Programming (Week 1 IP)

A script to automate the shutdown process

A description of UNIX run levels

UNIX Processes (Week 2 IP)

A script to automate user and group maintenance

A script to kill the processes (and session) of a user

Introduction to Perl (Week 3 IP)

A menu-driven Perl program for various UNIX commands

A discussion about Perl variables

Writing Perl Programs (Week 4IP)

A Perl program that can be used to create and drop users and groups

A discussion about Perl's usage or regular expressions

UNIX Tools (Week 5 IP)

A completed Perl program

A discussion about compiling a C program

The MS Word document should follow this format:

UNIX Systems Programming Project document shell

Title page

Course number and name

Project name

Student name

Date

Table of contents

Use autogenerated TOC


Separate page

Maximum of 3 levels deep

Update TOC

Section headings (create each heading on a new page with "TBD" as content, except for sections listed under "Add the following new content" in the assignment description)

UNIX Programming

UNIX Processes

Introduction to Perl

Writing Perl Programs

UNIX Tools

For this week's assignment, add the following new content:

UNIX Programming

A script to automate the shutdown process

A description of UNIX run levels

Reference no: EM132087776

Questions Cloud

Differences between a requested performance analysis : What are the differences between a requested performance analysis and a non requested performance analysis when it comes to the design and planning phases.
Write description of the health service needs : In the first two written assignments, you selected one vulnerable population in need of a new program or service in your community.
Conglomerate type diversification : Provide 3 reasons why firms have moved away from unrelated, conglomerate type diversification.
What is a franchise : What is a Franchise? What are the downfalls of buying an existing business?
Describe the various unix run levels : Describe the various UNIX run levels, what each level is used for, and how to boot to a specific run level.
Distinguish between statistical and clinical significance : Would it be possible to have research study results that supported the acceptance of the null hypothesis and demonstrate clinical significance?
Investigate the current state of net neutrality : Investigate the current state of net neutrality. What is the current status of ISPs right to offer a fast lane
Describe the downside of working with a supplier : Describe the downside of working with a supplier exposed as having used unethical practices. How does this potentially damage a firm?
Describe roles and responsibilities within an organization : What types of cybersecurity vulnerabilities can a supplier of computer services introduce into a customer organization?

Reviews

Write a Review

Operating System Questions & Answers

  Write a paper to compare and contrast functionality of linux

Write a paper to compare and contrast the functionality of Linux, Windows (7 or higher), and Android operating systems in the following categories(also discuss which one is friendlier): User Interface

  Eexplain four security strategies used for firewalls

Examine and explain four security strategies used for firewalls. Explain the two that you would highly recommend being implemented. Provide a rationale for your response.

  Eight servers running red hat linux

There are eight servers running Red Hat Linux (RHL) 7.3 and two running RHL 8.0.At this point, the two servers running version 8.0 are only test servers.

  To determine the values to be printed in the first column

The values in the first column will include 1*start, 2*start, and so on up to 10*start. This will be done using a for loop. In addition, myNumber should appear in the first column in the appropriate row

  Explain the difference between a cpu-bound process

Explain the difference between a CPU-bound process and an I/O bound process in terms of the length of CPU burst and the length of I/O burst. Why is it important for the operating system to select a good mix of I/O bound and CPU bound processes?

  What data security measures are utilized in your workplace

Why is it important for an organization to follow a standard systems acquisition process?

  Write memo describing three properties of given file systems

write a short memo describing three properties of each of these file systems:FAT16, FAT32, NTFS, and EXT2. Relate the properties to the objectives of all file systems discussed in the chapter.

  Explain page trace analysis using fifo

Increase size of memory so it contains four page frames for public use. Using same page request as above and FIFO, do another page trace analysis and calculate the failure and success ratio.

  Whether the cache misses in each category will increase

For each condition listed below, say whether the cache misses in each category will increase, decrease, or stay the same

  List command for changing hostname of linux machine to chip

The Washington University FTP server is to be installed on a Linux machine. Provide the command and steps required to install the server and make the services.

  Identify several advantages of open-source operating systems

Identify several advantages and several disadvantages of open-source operating systems. Include the types of people who would find each aspect to be an advantage or a disadvantage.

  Identify the operating system

An operating system is defined as the following: A software that manages the hardware and software of a system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd