Implement system security and access control

Assignment Help Computer Engineering
Reference no: EM133218815

Implement system security and access control in Linux operating system. You could also describe how the processes are managed after you have implemented your script.

Using Ubuntu OS, write and implement ONE (1) bash shell script (only one script should be written for whole Question 3). You are to use the root account to execute the script. The script will implement a modified version of Shortest Process Next (SPN) scheduling algorithm. The bash shell script should have the following specifications:

Question 1. The script will prompt the user to enter a text file (.txt) in the current folder (Note: each line of the text file consists of arrival time and service time of a process). As an example, if there are six processes, and the processes arrival time are 0, 1, 4, 5, 6, 9, and the service time are 3, 5, 5, 1, 3, 1, then the text file will have 6 lines, and the content of the text file will be as follow (use colon as delimiter between arrival time and service time):
0:3
1:5
4:5
5:1
6:3
9:1

Question 2. It will check whether the text file exist in the current folder, and if the text file does NOT exist, it will ask the user to re-enter the text file (it will keep asking until the user enter a text file that exists).

Question 3. It will read in the values from the text file and display the number of processes on the screen.

Reference no: EM133218815

Questions Cloud

Create a file called secret.txt : Create a file called secret.txt in your home directory containing your name and telephone number. Change the permissions of this file so that you can read
Importance of acknowledging nontraditional family structures : What is a definition of family that encompasses the different family structures prevalent today? Discuss the importance of acknowledging nontraditional family s
Summary of a cybersecurity it project management : Need a summary of a AI shopping system IT project management including Background, Vision, Mission, and Lead Time of the project
How does insulin decrease blood glucose levels : How does insulin decrease blood glucose levels How does glucagon increase blood glucose levels How does cortisol/corticsteroids increase blood glucose levels
Implement system security and access control : Implement system security and access control in Linux operating system. You could also describe how the processes are managed after you have implemented
What the method signature is : 1) what the method signature is, 2) what the method does, and 3) why would this method be useful (how could you use it)?
What programmingis and provide at least one example : what programmingis and provide at least one example of a program. Additionally, answer the following question with relevant justification for your opinion
What are four key enterprise applications : What are four key enterprise applications ? Using a local example , explain the role of knowledge management systems
How is hypothyroidism treated : What is meant by primary, secondary and tertiary hormonal disorders

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss different types of threats

Review several online newspapers, news sites, and professional magazines and locate examples of three different types of threats

  Write a return statement to complete the function definition

Function double takes a number and returns twice its value. Write a return statement to complete the function definition.

  How enterprise risk management empowers organizations

Write a research paper that explains how Enterprise Risk Management (ERM) empowers organizations to both avoid loss and capitalize on opportunity.

  Develop a daily production schedule for the buffalo plants

Formulate a linear programming model that can be used to develop a daily production schedule for the Buffalo and Dayton plants.

  What can be done to completely erase data

IT 357 - Data Recovery - What happens when a drive is formatted using default operating system formatting tools? Your answer should discuss what happens in terms of the actual activity at the disk level.

  Test the application by making up to ten futures value

Declare variables at the beginning of the main method for a row counter and a rectangular array of strings that provides for 10 rows and 4 columns

  Why a robust web presence matters to company executives

Analyze how social media provides a competitive advantage for an organization's Web strategy, given that many companies have started hiring personnel to handle Facebook and Twitter posts. Explain why a robust Web presence matters to company execut..

  What does the name ajax stand for

What does the name Ajax stand for? What is Ajax, and what does it do? Give an example of how Netflix® uses Ajax, and define why this makes the Web site faster.

  Solve the problem related to the hot liquid

A hot liquid (cp = 1000 J/kg·K) flows at a flow rate of 0.05 kg/s inside a copper pipe with an inner diameter of 45 mm and a wall thickness of 5 mm.

  Program to select numbers of three finalists

You have three identical prizes to give away and a pool of 10 finalists. The finalists are allocated numbers of 1 to 10. Write down a program to randomly select the numbers of 3 finalists to receive a prize.

  Discuss the overall process of developing new software

Discuss the overall process of developing new software. Also note the differences between software development and methods. Explain and backup your responses.

  Demonstrate the ability to assemble already-written classes

CSC151 : Demonstrate the ability to assemble already-written classes into a larger, more complicated program.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd