Unix operating system, Operating System

Assignment Help:

A working Ubuntu Linux operating system.  You can use a Live-CD to complete this assignment.

Create an empty text file named assignment6.txt in your home directory.

Edit this file with Vi and on the first line type your full name.

Each problem below requires you to perform a task using unix shell commands in a terminal window.

As you complete each problem, copy the output that was generated in the terminal window into the assignment6.txt file.

When you have finished, save the file and submit it to the EMS.

Do not submit a Word document, submit only a plain text file.

Do not submit screen snapshots (image files). Simply select the desired text in the terminal window and copy-paste it into the assignment6.txt file.

1. Using your Linux system, create a new directory named Jazz.  In this new directory create a file named Miles.txt that contains these three lines:

Kind of Blue

Miles Ahead

In a Silent Way

Copy this file twice, creating two new files named  Coltrane.txt and  Brubeck.txt. Use the rsync command to backup the Jazz directory to a directory named BackupMusic in the /tmp directory. Use the --stats option so the output gives complete statistics upon completion. Paste the output produced from the command into the assignment6.txt file.


Related Discussions:- Unix operating system

Concepts of an address - data and control bus, Let us consider the operatio...

Let us consider the operation of the EPROM device in more detail. Consider the pining details below again   Before we examine the interface means of the EPROM, it is worth

What is page fault, Problem: a) The CPU can access 2 storage devices di...

Problem: a) The CPU can access 2 storage devices directly. What are these 2 storage devices? b) Define 2 key issues involved in memory management. c) How do processes sha

List antivirus techniques used for protection purposes, Question: a) Th...

Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe

Write knowledge base relevant propositional statement, Suppose a logic-base...

Suppose a logic-based agent in the wumpus world has found that locations (1,1) and (2,1) do not contain a stench, but that locations (3,1) and (2,2) do contain a stench. Can the ag

Intranet, how intranet can make your business effective

how intranet can make your business effective

Binary and data representation, Computing uses three number bases:- Binary ...

Computing uses three number bases:- Binary (base 2), Octal (base 8) and Hexadecimal (base 16). Binary has been described before, although various catchphrases are used to describe

Shared stack is used for parameter passing, Q. What protection problems may...

Q. What protection problems may occur if a shared stack is used for parameter passing? Answer: The contents of the stack could be conciliation by other process(es) sharing th

Explain load balancing client server components, Explain Load Balancing Cli...

Explain Load Balancing Client Server Components When migration functionality from the client - only model to the client - server model, care must be taken not over-or underutil

Write a script in linux to match a data directory, Write a script that uses...

Write a script that uses this idea to print output similar to the following: Files in this directory that match *~ : bash-scripts.html~ chimpanzee~ countdown~ countd

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd