Operate and perform simple os administration

Assignment Help Computer Network Security
Reference no: EM132286639

Assignment: Role of Operating Systems and Command Line Interface (CLI)

Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Describe the role of Operating Systems (OS) and its different subsystems in controlling computer hardware
b. Demonstrate competency in the use of a command line interface to operate and perform simple OS administration

Purpose of the Assignment:

The assignment focuses on two aspects, the role of OS as an interface between the user and the computer hardware, and the use of command line interface. It helps the students to understand the different types of OS and their relative performances. Also it assists the students in gaining competency in using UNIX/LINUX commands to perform simple OS administration.

With this assignment, students will learn how to research and comprehend the basic concepts of OS, and appreciate the differences and similarities in the interfacing role they play on various computing and communication devices. Also, they will appreciate the ease of using GUI over CLI.

Assignment 1

Section 1: Operating Systems(OS)

1. If you are to develop an Operating system for some of the house-hold appliances such as Oven, Washing Machine, Refrigerator etc. then what innovative/new service would you wish to include along with the existing OS features? 5 marks

2. To what extent are the two OS's (Linux/Unix and Windows), are essentially the same, and importantly different?

3. Discuss in detail how an OS,along with its subsystem managers control the computer hardware.

4. Is batch processing still relevant? Justify with examples

5. Industry estimates predict there will be over 20 Billion Internet of Things (IoT) devices shipping by the year 2020 (source: Gartner.com). Most IoT devices will involve some type of network connectivity (e.g., WiFi, Bluetooth LE, Zigbee, 6LoWPAN, Ethernet), and many also will include a Graphical User Interface (GUI). These devices usually also perform some functions other than network communication and user interaction, such as data acquisition (sensors), appliance control (home automation), and DSP (security systems). Because of this processor load, all but the simplest IoT devices will require 32-bit microprocessors/microcontrollers in order to provide the necessary address space and processing power. There already is strong migration from 8-bit and 16-bit to 32-bit microprocessors, due to requirements for enhanced device functionality as well as the attractive cost/performance attributes of new 32-bit microprocessors. The predicted IoT growth promises to sharply accelerate this migration! The migration to 32-bit processors is clear, but what about the software side?

Research to identify a suitable OS for such IoT devices. Justify your answer with relevant examples.

Section 2: OS Administration using Command Line Interface (CLI)

Refer to theman command to understand the syntax and parameters for the commands that you would be using in this section.

- This section has queries that can be answered using basic Unix commands. You all have to demonstrate the following Unix/Linux commands in the lab to your tutor before week 6 and paste the screen shots of the execution of all commandsin the same word file that has section 1 of the assignment.

Questions:

1. You would like to change your password. How do you do it? Change it to mypssd. Logout, then log back in to make sure it worked. Change it back to something only you know.

2. Assume you have lost track of where you are in the computer system directory. How do you return to your home directory? Assuming you don't remember the full pathname of your home directory, how can you get there?

3. In your account, create a new directory, called temp.dir. Copy the two files /etc/hosts and /etc/fstab into it as hosts and fstab respectively (Create them in case they don't exist).

4. From your home directory, create a second directory, called temp2.dir. Copy the content of temp.dir into it.

5. Remove the entire temp.dir and temp2.dir. Report if you can remove them.

6. You have a file called list.names in your directory. How can you find out the last time you wrote to that file?

7. Some files begin with a dot (.). These are called hidden files. How can you list them?

8. Create a file called myfile, with length zero.

9. Now rename myfile to hisfile.

10. Do a long listing of all files in the /bin directory and place it into file hisfile.

11. Who is logged on to the system at the moment?

12. My friend just created a file in his/her directory. Can I go and change permissions on it? Why, or why not?

13. I just created a new file in my directory, but I would like it to have rwx permissions for me, and r permissions for everyone else. What command can I use to change those permissions?

14. I have a file with permissions rwxrwxr-x. I want it to have rwxr-xr-x permissions. Which two commands can be used to change the permissions on it?

15. Take the same file. I want to remove all execute permissions for everyone, except myself. Again, which command can be used to achieve my goal?

Verified Expert

Work is about the operation system i.e Linux and Unix.Where different questions was asked and based on the question appropriate answers was provided, the ans was related to internal functionality of the window and Linux operating system i.e. task manager back up, system restore etc.

Reference no: EM132286639

Questions Cloud

What business form you have selected and why : Explain the legal name for you as the owner based on your business form (ex: Partner, Member, Shareholder, etc.).
How gender and gender roles are portrayed in the media : Write a paper that should be no less than seven pages long, excluding the title and reference page(s). You should research the topic using library resources.
Capsim of too much versus too little inventory : Can someone explain the balancing act in Capsim of too much versus too little inventory?
Who want to pursue an international strategy : What do you think are the biggest challenges facing businesses who want to pursue an international strategy?
Operate and perform simple os administration : MN404 Fundamentals of Operating Systems and Programming - Role of Operating Systems and Command Line Interface (CLI)
What would you consider the most important leader traits : What would you consider the most important leader traits that are needed to be able to successfully implement EBL (evidence-based leadership)
List the current capacity available for the equipment : Whenever Jason Roberts thought about going to work on Friday morning, List the current capacity ( hours) available for the equipment.
What evidence do we have that it improves policing : Is it a good strategy for improving policing? What are the underlying assumptions of this approach? What evidence do we have that it improves policing?
Provide a test of the understanding and analytical skills : Provide a test of the understanding and analytical skills acquired by students.

Reviews

len2286639

4/17/2019 10:44:41 PM

Grades HD D Section -1 Excellent research work and focused discussions and analysis Sound references from reputed journals. Good research work and discussions are relevant and soundly analysed. Good references Section 2 Perfect usage of commands for the given tasks Commands used are relevant Viva Voce Logic is clear and easy to follow with strong arguments Consistency logical and convincing IEEE Reference style Clear styles with excellent source of references. Clear referencing style

len2286639

4/17/2019 10:44:32 PM

Reference style Follow IEEE Transactions on Networking reference style (should have both in-text citation and reference list) Minimum of 5 references are a must 3marks Viva Voce / Demonstration Tutor will assess your understanding of work carried out for this assignment. This will be done during week -6 and Week 7 lab classes. 7 marks Total 55marks

len2286639

4/17/2019 10:44:24 PM

Marking criteria: Questions Description Marks Section 1 1. Innovative/unique feature/ service for a house appliance. 2. Compare and contrast the features of the two OS 3. Describe the role of Operating Systems (OS) and its different subsystems in controlling computer hardware 4. Relevance of Batch Processing with an example 5. Suitable OS with an application 5 marks 5+5 marks 5 marks 5 marks 5 marks Section 2 All the Unix commands in this section have to be implemented and demonstrated on the virtual OS in the lab class. Students who fail to demonstrate and /or remain absent for demonstration will not be awarded marks for section 2. 15 marks

len2286639

4/17/2019 10:44:04 PM

Submit a word document that contains the screen shots of the answers to all the questions in section2 (Unix exercises) along with the answers for questions in section 1. All screen shots submitted on Moodle must carry your unique id such as MITID, names etc. All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd