How many users are on the local system

Assignment Help Computer Engineering
Reference no: EM132217602

1. Is each of the following an absolute pathname, a relative pathname, or a simple filename?

a. milk_co

b. correspond/business/milk_co

c. /home/max

d. /home/max/literature/promo

e. ..

f. letter.0210

2. List the commands you can use to perform these operations:

a. Make your home directory the working directory

b. Identify the working directory

3. If the working directory is /home/max with a subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents.

4. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system.

a. Which character is used to separate fields in /etc/passwd?

b. How many fields are used to describe each user?

c. How many users are on the local system?

d. How many different login shells are in use on your system? (Hint: Look at the last field.)

e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, your system uses shadow passwords and stores the encoded passwords elsewhere. Does your system use shadow passwords?

Reference no: EM132217602

Questions Cloud

Calculate the average of the values contained in the integer : Calculate the average (as a double) of the values contained in the integer variables num1, num2, num3 and assign that average to the double.
Write a program that prints the 128-character ascii table : Write a program that prints the 128-character ASCII table. It should print the table in eight tab-separated columns.
Write a statement that increments the value of the int : Write a statement that increments the value of the int variable total by the value of the int variable amount.
Prompt the user for a string that contains two strings : Report an error if the input string does not contain a comma. Continue to prompt until a valid string is entered.
How many users are on the local system : Which character is used to separate fields in /etc/passwd? How many fields are used to describe each user? How many users are on the local system?
Write a loop that subtracts 1 from each element in lower : Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the element.
Implement a recursive descent parser for a logic calculator : The program should not exit when it encounters an error in the expression. Rather, it should output error information and then accept the next expression.
Explain what needs to be done to defend accounts : Eplain What You Have to do to Defend Accounts. Explain what needs to be done to defend accounts .
Give the associated range of destination host address : Consider a datagram network using 8-bit host addresses, i.e., IP addresses range from 0 to 255.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the envisioned system

In a few sentences, tell what is the envisioned system? the most important functions of the system, and the most significant effects of the system?

  Perform one of the tools functions

Perform one of the tool's functions. Paste each screen shot to the Lab 01 Kali Installation word processing document.

  What are the problems associated with critical region

What are the problems associated with critical region? How to overcome the problem using semaphores and monitors

  How are the enterprise software tools

How are enterprise software tools/enterprise resource planning used in helping to decrease the cost of designing and implementing new systems.

  Show your current directory and put into output

Place 3 lines into $output with your name, your major, your expected graduation date.

  How many vertices has the graph

A planar graph has only triangles and fivegons as faces; each edge separates a triangle and a fivegon. Each vertex is adjacent to two triangles.

  Demonstrate and test the function with a complete program

Write a function named replaceSubstring. The function should accept three C-string or string object arguments.

  Prove that greedy approach to fractional knapsack problem

Prove that the greedy approach to the Fractional Knapsack problem yields an optimal solution.

  Design the circuit in problem for a twos complement transfer

Problem: There are two four-bit registers, A and B, built out of SR flip-flops. There is a control signal C. The following operations are needed.

  Write all appropriate connectivities on the erd

Use the following business rules to draw the fully labeled Crow's Foot ERD in Visio. The diagram must include all entities, attributes, and relationships.

  Explain in brief the meaning of line with visi technology

Problem Explain in brief the meaning and significance of line with VISI technology. What are the various line widths currency being used?

  Find the minimized boolean function

Construct a truth table and find the minimized Boolean function to implement the logic telling Tyrone when to buy. Draw a circuit diagram for the Boolean function.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd