What command do you use to create the user codstudent9

Assignment Help Computer Engineering
Reference no: EM133398840

Questions:

1 You are tasked to find out the basic information about the user Tom. Tom is currently logged in to the system. What command do you use to complete the task? (Please pay attention to the uppercase and lowercase of the text)

2 Your current directory location is [home/COD/linux_ You want to know the owner of the following directory: [shared/files What command do you use to complete the task? (Please pay attention to the uppercase and lowercase of the text)

3 Your current directory location is /home/COD/Iinux. You want to View all processes running on the system right now and who is the owner of each of those processes. What command do you use to complete the task?

4 You want to switch from your current regular user shell into the root user shell. What command can you use to switch the shell?

5 You are currently logged in as user Tom. You want to View the content of the system file fete/shadow file. What command can you use to complete the task without switching to the root user (one-line command only)?

6 What command do you use to create the user CODstudent9 ?

7 What command do you use to set (or reset) the password for user named CODstudentQ ?

8 What command do you use to delete the user CODstudentQ and also delete any personal data for the user?

9 What command do you use to add a CODLll'lUX group and assign the GID of 30000?

10 What command do you use to add CODstudent1 and CODstudent2 users to CODLinux supplementary group?

 

 

Reference no: EM133398840

Questions Cloud

Describe what environment variables are : describe what environment variables are and briefly how an operating system, sys admins, and developers use them. In a second paragraph report the value
Need an argument essay outline : Need an Argument Essay Outline
How many substrings are there given a string is length 100 : How many substrings are there given a string is length 100? How many substrings are there given a string is length ny?
What is the name of the library : What is the name of the library? What considerations are made by the library before copying a single property? In other words, what are the rules that
What command do you use to create the user codstudent9 : What command do you use to create the user CODstudent9 ? What command do you use to set (or reset) the password for user named CODstudentQ ?
What is the certainty equivalent of that decision : MET AD 616 Enterprise Risk Analytics, Boston University - What is the investor's optimal decision under the EMV rule? What is the EMV of the investment
Use a command to display a calendar of three months starting : you are asked to carry out some practical activities to manipulate files using Linux. Include either screenshots or output from the command line to document
List the four basic principles that all ethical schools : What is ethics? List the four basic principles that all ethical schools of thought share. Compare the difference between serious game and simulation
Difference between economic value and social value : Discuss the difference between economic value and social value or the shared value creation framework.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the url of the web site

What is the URL of the Web site? Is this page appealing or unappealing? List three reasons for your answer.

  Add the code to control the loop

Add the code to control the loop. You may use either a while loop or a do...while loop.

  What kind of tilings could be used to take advantage

Suppose we believe that one of two state dimensions is more likely to have. What kind of tilings could be used to take advantage of this prior knowledge?

  Compare an algorithm run in a parallel pipeline

Calculate the time unit and the number of processors needed for each type of systems in (i) using up to 20 processors and the size of data is n= 1000

  Discuss the listing rules governing listed companies

Discuss all three companies above and find (via electronic journals) the events that led up to the liquidation. Visit the CPA website; discuss APES 110 Code of.

  Create a application that contains two textboxes and buttons

Create a Windows application that contains two textboxes and two buttons. The textboxes should be used to allow the user to input two positive numeric values.

  Questionthe most important public consulting firm has been

questionthe most important public consulting firm has been tasked with implementing an online patient care system that

  What is a synonym for data transfer rate

What is a synonym for data transfer rate? Describe the client/server model and discuss how it has changed how we think about computing.

  Discuss intrusion prevention systems and detection systems

Review "A Survey of IT Early Warning Systems: Architectures, Challenges, and Solutions," This article addresses methods for network protection.

  Add a button element to the page

Add a button element to the page. The button label should be Change to Red and Make it Italic. Add JQuery code to the page so that when the button is clicked

  Create an empty dictionary called word_frequency

Write an if statement that checks whether the word is already in the dictionary. Create an empty dictionary called word_frequency.

  Questionconverting a networka recent university graduate

questionconverting a networka recent university graduate gets a job as network administrator for a mid-size company

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd