Reference no: EM13761787
1. Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
2. Display the commands(s) used to do the following (and show the results): use the touch command to create the file letters. Next, use the dd command to make a backup of the file.
3. Display the commands(s) used to do the following (and show the results): use the command that gives you information about swap space and memory use.
4. Display the commands(s) used to do the following (and show the results): start the top utility. Notice that top is listed as one of the most active processes. Determine what CPU percentage is used by running top. Stop the top utility.
5. Display the commands(s) used to do the following (and show the results): use the command to determine which users have processes running on your system.
6. Display the commands(s) used to do the following (and show the results): log in as root and try using ifconfig, netstat, and route. Also, when you use ifconfig, record the "inet addr" (IP) value for eth0 (your Ethernet address) or for lo (your localhost loopback address), such as 127.0.0.1 for lo.
7. Display the commands(s) used to do the following (and show the results): log out of root and back in to your own account. Type the command to determine the PID of your Bash shell session and record the PID
8. Display the commands(s) used to do the following (and show the results): use the vi editor to create and save the famous_words file with the following contents (including misspellings):
We mst all hang togther or
Assuredly we shll all hang separately.
-- Ben Franklin
Make a copy of the document using the dd command and calling the copy famous_words.bak. Use a tool to check and correct the spelling errors in the famous_words document.
9. Display the commands(s) used to do the following (and show the results): use the cmp command to compare the famous_words and famous_words.bak files.
10. Display the commands(s) used to do the following (and show the results): start the top utility. Type ? after the utility starts. What information do you see? Press Enter and stop the top utility.
11. Display the commands(s) used to do the following (and show the results): run the man program with the argument df in the background. Record the PID of the process you have started.
12. Display the commands(s) used to do the following (and show the results): use the command to kill the process you started above.
13. Display the commands(s) used to do the following (and show the results): create a new or edit the phmenu.1 file and add a new section named SEE ALSO. Under this section, list the following files:
· phoneadd
· phlist1
14. Display the commands(s) used to do the following (and show the results): save and test the revised phmenu.1 file using the groff and man programs.
15. Edit the phmenu.1 file and add a new section named BUGS. Under this section, list a line that reads:
· None Known
16. Display the commands(s) used to do the following (and show the results): save and test the revised phmenu.1 file using the groff and man programs.
17. Display the commands(s) used to do the following (and show the results): edit the phmenu.1file and add a new section named AUTHOR. Under this section, list your name. Save and test the revised file using the groff and man programs.
18. Display the commands(s) used to do the following (and show the results): use the command that will enable you to view the documentation for ifconfig. Notice the many options for configuring your network connection.
19. Display the commands(s) used to do the following (and show the results): find out the IP address of a friend's computer or of a favorite website and use the command to poll that computer or website.
20. Display the commands(s) used to do the following (and show the results): use a command to view the contents of the /etc/init.d directory to see a listing of services you can start on your computer. Do you see the portmap file?
Program reads the contents of employees
: Design a program that reads the contents of the employees.dat file and prints all the data within it. Format the report as designated in the Printer Spacing Chart below.
|
Ethical issues in information systems
: Ethical Issues in Information Systems- Choose one (1) ethics issue, You may also use the Internet or the Strayer Library to research articles on ethical issues in information systems and choose one (1) ethics issue of interest to you
|
Explain areas of information technology as a metric
: The confidentiality, integrity, availability (CIA) triad represents generic security goals. CIA is typically applied to specific areas of information technology as a metric or guideline for establishing or maintaining security.
|
Network implementation plan
: Network Implementation Plan-After a network has been installed and becomes operational, the system must be maintained. An important part of an implementation plan is preparation for the operation of the network and the potential problems that migh..
|
Display the commands
: Display the commands(s) used to do the following (and show the results): see the df command to view file system use in megabytes.
|
Research organizational benefits of using databases and dbms
: Research organizational benefits of using databases and DBMS's. Supplement your research with a review of your lessons. Post a response to the discussion board: Respond to the following statements and, if appropriate, include personal experience as..
|
Crime and ethics based problems
: Some violations, although technically a crime, may be referred to as an administrative violation, which involves fines.
|
Define the protocol and what it is primarily used for
: Select a protocol of your choice. Research the standards and definitions of your selected protocol. Define the protocol and what it is primarily used for.
|
Explain control structures in php programs
: Define and design functions and control structures in PHP programs. Define variables, constants, and data types in a PHP environment.
|