Why does every unix system have -etc-profile

Assignment Help Computer Engineering
Reference no: EM131875172

Problem

1. You have to toggle repeatedly between /usr/include and /usr/lib. What shortcut will you use?

2. How do you copy all files from henry's home directory even if you don't know its absolute pathname?

3. Why does every UNIX system have /etc/profile? When is this file executed?

4. If you have the files .bash_profile and .profile in your home directory, will Bash read them both on login?

5. A shell script also runs the login file. True or false?

Reference no: EM131875172

Questions Cloud

Discuss the role of advanced nursing practice on ACO : Identify and discuss the role of advanced nursing practice in accountable care organizations (ACO), and how an expanded role for nursing could improve.
Senior managers of brick and mortar stores : 1. How would you advise your senior managers of brick and mortar stores to respond to showrooming?
Which environment variables are set by reading -etc-passwd : Which environment variables are set by reading /etc/passwd? Why are all environment variables represented in a fixed format regardless of the shell you use?
What does a professional code of ethics reflect : What does a professional code of ethics reflect? How can enforcement be made meaningful? Must a profession, "police" its standards? Why or why not?
Why does every unix system have -etc-profile : Why does every UNIX system have /etc/profile? When is this file executed? A shell script also runs the login file. True or false?
Write a first response to three of the poems : write a "first response" to three of the poems. The first response is explained on page 4 of our textbook.
Achieve strategic competitiveness : How can Apple and Samsung achieve strategic competitiveness and above average returns over the other?
Company that fits each of the business level strategies : What is their mission, who are their customers and what needs do they satisfy, and what are their core competencies to accomplish this?
How can you prevent your files from being overwritten : How can you prevent your files from being overwritten using the redirection symbols? How will you overwrite a file when needed?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create graph the demand data for yardarts

how to create Graph the demand data for YarDarts.

  Compute how much federal and state tax you need to pay

Write down a Java application to calculate how much federal and state tax you require to pay. The program should accomplish the following task: ask your name, yearly income, federal tax rate, and state tax rate, and compute the tax you need to pay.

  Describe an algorithm for finding the maxima pairs of c

Given a collection C of n cost-performance pairs (c,p), describe an algorithm for finding the maxima pairs of C in O(n logn) time.

  Word processing desktop publishing and web authoring

word processing desktop publishing and web authoring software are the three most popular types of document production

  What is the effective access time in ns needed

assume the cache hit ratio is 0.8 and the main memory hit ratio is 0.7. What is the effective access time in ns required to access a referenced word on this system.

  Process of sorting through large amounts of data

Data mining is the process of sorting through large amounts of data and picking out relevant information. Everyone from financial analysts to scientists use it to extract information from enormous data sets. These large data sets and the trend of ..

  After reading about attacks on servers similar to the ones

1.after reading about attacks on servers similar to the ones used in one of your companys departments the cio has asked

  Manage and secure windows infrastructure to satisfy bluesky

to improve efficiency in its current infrastructure blue sky systems decided to upgrade their current infrastructure of

  Create a program named student java that will use arrays

Create a program named student1.java that will use array to store student names and grades assume each student has a student id that directly indexes a storage.

  Provide proper documentation as required in the pas

Provide proper documentation as required in the PAs. Provide proper indentation & programming style similar to the examples from the textbook, videos & PAs.

  Briefly explain some of the issues that a company may face

information systems use security policy write a paper consisting of 500-1000 words double spaced about your experience

  Discuss the advantages of the approach

Briefly explain the main problem addressed and why you have found it interesting - Classify to which topic from the aforementioned areas this paper belongs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd