About linux operating system

Assignment Help Operating System
Reference no: EM13778135

Anyone good with Linux Operating System?

your netlab workstation then ssh to server.cnt1015.local with your college username (the account you used for the quizes).
Create a directory called final in your home directory.
Inside final create directories called backup, main, SysInfo, & files
Inside the main directory create a file called boot.both which contains a recursive listing of all the files and directories inside the directory /boot and includes any error messages.

Copy the script snooze from /home/stuff, put it in your main directory.

Run snooze.

While it is running:
Put it into the background in a suspended state.
Run the command which shows which jobs are running in the background, putting the output in a file called sleepingjobs in your main directory.
Return snooze to the foreground and let it finish running.

Copy only the files with an "s" and a "p" adjacent regardless of case (i.e sp , SP, sP, or Sp) to the directory files from the directory /usr/share/system-config-printer

Create a file called userinfo in backup.
On the first line put the home directory of the user games.
On the second line put the login shell of the user root.
On the third line put the members of the group wheel seperated only by a comma.


Set permissions on the file userinfo so that it is owned by the group cnt1015.

Inside the backup directory create a recursive copy of the /usr/share/doc/HTML directory

Create an alias called now which shows the date & time as YYYY/MM,DD-HH:MM (ex: 2014/10,16-18:50) making sure the alias survives a re-login.

Perform a recursive long listing on /boot redirecting stdout to a file called ls.out in the main directory and redirecting stderr to a file called ls.err in the main directory.

Create a file called num.lines in your main directory which has the numbers of lines in the file /etc/httpd/conf/httpd.conf

Search for the term audio in the file /etc/httpd/conf/magic, sending the results to a file called magic.audio in main.

Create a file called if.info in the SysInfo directory which contains the network information on the eth0 network device and only the information for that device.

Find the IP address of the server spam.cnt1015.local and put it in the file spam.ip under the main directory.

Capture your routing table information into the file routeinfo in the SysInfo directory.

Find the secondary DNS server address and put it in a file called nameserver2 in the SysInfo directory.

Capture the output of the command that tests ICMP availability for the IP address 127.0.0.1 three times and put that output in a file called nettest under the main directory.

Make a script called hello, in the main directory.
Set permissions so you can read, edit and run but the group and others only have read permissions.
The scrip needs to take a name passed into it.
The output from the script should be:

Hello XXXXXX.

You are logged in as yyyyyyy.
Where XXXXXX is a name you passed in and yyyyyy is the username you are logged in as"

ex:

Hello Sean.

You are logged in as scpayne.

Run the script you created in step 18 and capture the output to a file called hello.out in the main directory.

Determine which users are logged into the system and capture it to a file called notify in the main directory.

Determine how many regular users exist on the system and put that number in a file called numusers in the main directory.

Determine the percentage of used space, in human readable format, in /boot and put that in a file called usedspace under the main directory. ( ie, if the used space is 30%, just have 30% in in the file.)

Make a hidden directory in your backup directory called hiddenbackups that only your user has permissions to access.

Get a list of all users with a UID between 400-499, sort it numberically in reverse order on the GID field putting the result in a file called sortedusers in your main directory.

Make a file called groups.6-10, in the main directory, containing the 6th - 10th groups (lines 6-10) found in /etc/group.

EXTRA CREDIT (10 points)

Make a script called info.sh, in the main directory.
Set permissions so you can read, edit and run but the group and others only have read permissions.
If you pass in a 1, it will tell you the date using YYYY-MM-DD (ie 2013-07-30).
If you pass in a 2, it will tell you the time (ie HH:MM:SS).
If you pass in a 3, it will tell you the date & time (2013-07-29--09:31:01).
If you pass don't pass anything in or you pass in something other than 1,2,or 3 it will tell you you need to pass in 1-3.

 

Reference no: EM13778135

Questions Cloud

Multiple choice questions for basic medical language : What is the term meaning pertaining to within the skin .
What is erisa when and why was it enacted : What is FICA? What percent do the employer and the employee pay? What is ERISA? When and why was it enacted? What do you feel is the future of Social Security, and why
Definition of e-health by focusing on advances : 1. Provide a definition of e-health by focusing on advances and trends that have been made in this area since the year 2000. 2. Provide descriptive examples of the application and beneficiaries of e-health.
Specialized models versus an extensive system modeling : Explain the advantages of specialized models versus an extensive system modeling.
About linux operating system : your netlab workstation then ssh to server.cnt1015.local with your college username (the account you used for the quizes).Create a directory called final in your home directory.
Values of having a diverse workforce : Identify five main points you plan to make about the values of having a diverse workforce, and present a detailed sample agenda for your meeting.
Dissertation chair or dissertation committee : Explain why you selected each person and what role (i.e., dissertation chair or dissertation committee member) you think each would play on your committee.
Calculate the volume of concentrated reagent : Calculate the molarity and calculate the volume of concentrated reagent 18M H2SO4 required to prepare 225 ml of 2.0M solution.
Medium portrayal of sexuality : Examine the medium's portrayal of sexuality in older adults by answering the following questions. Also, attach or provide the url of your article, cartoon, or advertisement with your assignment submission. answer these 2 questions.

Reviews

Write a Review

Operating System Questions & Answers

  Question about misused applications

Corporations sometimes buy expensive applications, and then under utilize these. In a sense, economic downturn has been beneficial, as many corporations are starting to more regularly

  Combining voice, video and data communications

Discuss the advantages and disadvantages to combining voice, video, and data communications into one interface such as Skype.

  Starting from the current head position

Starting from the current head position, what is the total distance (in cylinders) that the disk arm moves to satisfy all the pending requests for each of the following algorithms

  Illustrate how many entries are there in logical address

Consider a computer system with 48-bit logical address and 4-KB page size. System supports up to 1 GB of physical memory. Illustrate how many entries are there in each of the following?

  Cpu scheduler objectives 1 understand cpu scheduler 2

objectives ltbrgt1. understand cpu scheduler ltbrgt2. implement an algorithm ltbrgt3. empirical analysis of an

  Software faults - windows xp

Analysis shows that there are about five faults per 1000 lines of code in carefully made programs, which means that one million lines of codes will have 5000 faults.

  Give three advantages of virtual machine

In different communications models, communication may take place using either "message passing" or "shared memory". Distinguish between "message passing" and "shared memory", illustrating your answer with a diagram Give three advantages of virt..

  What is a structural hazard in operating systems

What is a structural hazard in operating systems?

  Assessing security risks

In your new position at XYZ Company, you have been asked to lead a risk assessment group. As part of your assignment to assess security risks for the computing infrastructure.

  Operating system forensics

Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you conside..

  Identify which library procedures issue system call

Is a programmer required to identify which library procedures issue system calls? Clarify your answer.

  Socket programming in unix using c programming

Identify the values of pidat lines A, B, C, and D and write an echo server using socket programming in UNIX using C programming.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd