KIT501 ICT Systems Administration Fundamentals Assignment

Assignment Help Programming Languages
Reference no: EM133140256

KIT501 ICT Systems Administration Fundamentals - University of Tasmania

Practical

Goal

The main purpose of this first UNIX tutorial is to ensure that you have a basic familiarity with the UNIX system and some general-purpose UNIX commands.

1. Introducing UNIX Operating System

UNIX Overview
An Operating System (OS) is a set of computer software routines that sits between application programs and hardware devices. An OS provides common services (such as Save, Save As, Print) to applications, which allow applications to access hardware devices. An OS offers a graphical user interface (GUI) and/or command-line user interface (CUI) to computer users, which allow users to run applications (or system programs) for various tasks.

UNIX arrived earlier than Microsoft Windows and Mac OS, and has been a platform for serious work:

• The Internet with the TCP/IP communication protocol suite were first ported to UNIX.
• Unix/Linux has been the dominating Server Operating System for worldwide server computers.
• Enterprise-scale databases as well as general e-commerce have been deployed on UNIX

• Written in C (a high-level programming language) so can run on nearly all hardware platform.

UNIX System Administration
• Allocate/close user accounts
• Maintain file system
• Manage disk space
• Maintain security
• Take backups
• (others - handle hardware devices, reinstall OS, etc)

A UNIX system administrator uses or develops shell scripts for automating regular operations. Shell programming or shell scripting will be introduced later in this course.

UNIX User Accounts
UNIX is security-conscious and can be used only by people who maintain an account with the system. The system administrator has a special user account, called root. The root user (also called super- user) has near-absolute power. Some programs can only be run from this account, eg, the program that creates user accounts.

The administrator opens a user account by providing a meaningful string (username) and an un- meaningful string (password). Users are expected to change their passwords immediately after first login. After this, you are the only person who knows your plain-text password, because UNIX only records encrypted passwords in a file (the UNIX shadow file, /etc/shadow) which can only be read by the system administrator.

The following instructions assume you are using an ICT lab desktop machine. Your personal machine will differ depending on which ssh client you have installed.

On Microsoft Windows:

1. Find the application named Secure Shell Client.

2. On the Secure Shell Client, click on Quick Connect, enter the UNIX host/server name (ictteach.its.utas.edu.au), your username, and choose Password as the authentication method. Click on Connect.

3. If the application asks you to save the new host key to the local database, click on Yes.

4. Enter your UTAS password (if your UTAS password is the same as your ICT password) and then click on OK.

5. Now that you are on your UNIX host, you can start to practice UNIX commands. Before this, you can use the small popup window to add a profile: enter the UNIX host name (ictteach) and click on Add to Profiles. Next time you want to set up a connection to the same host you can simply click on Profiles, then on the host name, enter your ICT password, and then you are on your UNIX host. If by the time you finish reading this paragraph the small popup window has disappeared, you can click on "Profiles" then click on "Add Profile" to do this.

6. If the text in front of you appears too small, you can make it larger by clicking on Edit, then on Settings, Global Settings, Appearance, Font to set a larger font size.

Attachment:- UNIX Operating System.rar

Reference no: EM133140256

Questions Cloud

Method of embedding different CSS styles : What are the characteristics of each method of embedding different CSS styles? Which method is most frequently used in website and why?
Provide example of encapsulation and polymorphism : Explain and provide an example of polymorphism. Explain and provide an example of encapsulation.
Computer and email acceptable use policy : our job is to develop a computer and internet security policy for the organization. Computer and email acceptable use policy. Internet acceptable use policy
Wireless communication : Wireless Topology Paper: Wireless communication, generally, useless three configuration topologies (
KIT501 ICT Systems Administration Fundamentals Assignment : KIT501 ICT Systems Administration Fundamentals Assignment Help and Solution, University of Tasmania - Assessment Writing Service
Identify recent cyber security attack : Identify a recent cyber security attack. Provide?a brief overview of potential incident response plan requirements and processes
Risk description and risk response plan : Draft a risk management plan provide the Team information, project description, the scope, cost, and schedule, Include the Risk Description, Risk Response Plan
Describe the role of systems analyst : Describe the role of a systems analyst. Describe the job of a project manager. What are the five types of information-systems users?
What is rad software development- lean methodology unique : What is RAD software development? What makes the lean methodology unique? What is the relationship between HTML and CSS in website design?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write a haskell program to calculates a balanced partition

Write a program in Haskell which calculates a balanced partition of N items where each item has a value between 0 and K such that the difference b/w the sum of the values of first partition,

  Create an application to run in the amazon ec2 service

In this project you will create an application to run in the Amazon EC2 service and you will also create a client that can run on local machine and access your application.

  Explain the process to develop a web page locally

Explain the process to develop a Web page locally

  Write functions

These 14 questions covers java class, Array, link list , generic class.

  Programming assignment

If the user wants to read the input from a file, then the output will also go into a different file . If the user wants to read the input interactively, then the output will go to the screen .

  Write a prolog program using swi proglog

Write a Prolog program using swi proglog

  Create a custom application using eclipse

Create a custom Application Using Eclipse Android Development

  Create a application using the mvc architecture

create a application using the MVC architecture. No scripting elements are allowed in JSP pages.

  Develops bespoke solutions for the rubber industry

Develops bespoke solutions for the rubber industry

  Design a program that models the worms behavior

Design a program that models the worm's behavior.

  Writing a class

Build a class for a type called Fraction

  Design a program that assigns seats on an airplane

Write a program that allows an instructor to keep a grade book and also design and implement a program that assigns seats on an airplane.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd