Methods to create user and group accounts

Assignment Help Basic Computer Science
Reference no: EM131060719

In this week's lab we used three methods to create user and group accounts. The first method was to directly modify 3 files that are associated with user and group configurations. The second method was to use commands to create users and groups. The third method was by use of the gnome GUI.

In the first method we opened up the /etc/passwd, /etc/shadow, and /etc/group file. We directly edited these files to reflect the information the system needs to correlate the new users with the various group associations. The only purpose I could see using this method other than for training purposes is to possibly troubleshoot issues with creating new users in the more automated method.

In the second method we used the useradd command to create the user. This method is great for mass account creations because it automates many of the functions for you such as creating the home directory, transferring ownership from root to the user, and copying the /etc/skel files. In the event of mass account creation such as company mergers and acquisitions, this method could easily be incorporated into a script and ran against a document with a list of accounts to be created effectively automating the vast majority of the work load for you.

In the third method we used the GUI to add users. This is by far the most simple (conceptually) but labor and time intensive for bulk creation. I would use this method if I needed to create one or two accounts or did not have a comfortable understanding of command lines.

Reference no: EM131060719

Questions Cloud

Sensitivity of ocf to changes in the variable cost figure : We are evaluating a project that costs $520,000, has a six-year life, and has no salvage value. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 73,000 units per year. Price per unit is $45, varia..
Correct order of operations for entering formulas : 3. What is the correct order of operations for entering formulas into Excel?
How to design an experiment using the scientific method : How to design an experiment using the scientific method. The primary structures in plant cells, animal cells, and bacterial cells and the role of each structure.
Calculate annual compound growth rate of the house price : According to public records, the estate is owned by Robert G. Goldstein, executive vice president and president of global gaming operations at Las Vegas Sands Corp, and his wife Sheryl, who purchased the house in 2007 for $17.4 million.” Calculate th..
Methods to create user and group accounts : In this week's lab we used three methods to create user and group accounts. The first method was to directly modify 3 files that are associated with user and group configurations. The second method was to use commands to create users and groups. T..
Explain how auditing and auditors deal with such issues : BUACC3741: Auditing - Explain how auditing and auditors deal with such issues and why should we trust directors? How are shareholders' protected?
Calculate the maximum tensile stress smax due to the moments : Determine the orientation of the neutral axis and calculate the maximum tensile stress σmax due to the moments M0.
Identify the variables that are critical in addressing issue : Briefly summarize the purpose of your paper by introducing the case (the situation chosen) that you are analyzing and studying, and what are you trying to achieve from your study.
Calculate the standard of deviation : Fast Eddie’s Used car will sell you a 1992 Ford Escort for $3,000 with no money down. You agree to make weekly payments for 2 years, beginning one week after you buy the car. Compute monthly HPR, make sure to include dividend. Calculate arithmetic me..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Rss feed for research

Plagiarizing is serious. Not giving credit in our work where we find our information is considered stealing. Read about a journalist that lost his job for plagiarizing from a blog. Websites are especially difficult to cite correctly.

  Proposed solution for converged network solution

This is an individual project. Each student must complete a Case Study that provides the requirements analysis and a proposed solution for converged network solution. The target audience will be the organization's Chief Information Officer (CIO)..

  Write a program to allow additional items and prices

Write a program to allow additional items and prices to be input by the user and added to the end of the Cowboy.txt. Include a method to terminate the process.

  Single core (cpu) architecture is able to multi

Single core (CPU) architecture is able to multi____? What two registers are always required in moving data to and from memory?

  Determine the period of the signal

Determine the period of the signal. Be sure to mention the units of the period. Describe this signal in a complex exponential form

  Vulnerability testing of key and strategic government

You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks. However, the city recently appointed a new and very controversial police chief.

  Specific areas for improvement

To work to improve the employee's performance by naming specific areas for improvement, developing a plan aimed at improving these areas, supporting the employee's efforts at improvement via feedback and assistance, and ensuring the employee's inv..

  Explain why there is a chance that the social security trust

1. Explain why there is a chance that the social security trust fund may be depleted by 2035. Does this mean that social security will be bankrupt and will not be able to make any payments to retirees after 2035?2. Consider the savings-investm..

  Implement threads and a gui interface

Required data structure - the advanced data structure I want you to implement is a multi-tree with the following levels:

  Designing a cloud-based solution for travel

Capture requirements and build a business model. Describe the architectural implications of the solution.

  Event drive programming

Lets look at event drive programming. What is an event driven program? What are events associated with? What are examples of common events?

  The ciso for chase bank--using the resources available

Assume to you are the CISO for Chase Bank--using the resources available at PBSC library, find out what laws your state has passed to prosecute computer crime specifically for financial institutions. Create a PowerPoint presentation directed to..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd