List the files in the current directory

Assignment Help Operating System
Reference no: EM132187680

Question: Working on the Command Line

These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following and write down the commands.

Lab 2.1 Manage Files

STEP 1. Open a terminal window.

STEP 2. Display your current directory.

STEP 3. Using an absolute pathname, switch to the /etc directory.

STEP 4. Using a relative pathname, move to the /etc/skel directory.

STEP 5. Using a relative pathname, move up one directory.

STEP 6. List the files in the current directory.

STEP 7. Perform a "long display" listing of the files in the current directory.

STEP 8. List all the files in the current directory that begin with the letter s.

STEP 9. Run the command that will determine the type of contents in the /etc/group file.

STEP 10. Display only the last five lines of the /etc/group file.

STEP 11. Execute the command to return to your home directory.

STEP 12. Make a directory named data in the current directory.

STEP 13. Copy the /etc/passwd file into the data directory.

STEP 14. Copy the /etc/ppp directory into the current directory (and ignore any "Permission denied" error messages).

STEP 15. Rename the ppp directory that is located in the current directory to peers.

STEP 16. Update the timestamp of the data/passwd file to the current date and time.

STEP 17. Create a new empty file named test in the data directory.

STEP 18. Delete the data/passwd file.

STEP 19. Delete the peers directory.

Lab 2 Using Shell Features

STEP 1. Open a terminal window.

STEP 2. Display the value of the HOME variable.

STEP 3. Display all the shell variables and values.

STEP 4. Display the value of the TEST variable. (Note that this variable currently has no value.)

STEP 5. Change the current shell so that an error message will be displayed when an undefined variable is used.

STEP 6. Modify the PATH variable to include the /opt directory.

STEP 7. Create a new environment variable named EVENT and set it to the value "now" by using a single command.

STEP 8. Display all the environment variables.

STEP 9. Create an alias in the current shell for the ls command so it will run the command ls -a.

STEP 10. Display all the aliases for the current shell.

STEP 11. Remove the fgrep alias from the current shell.

STEP 12. Display a list of previously executed commands.

STEP 13. Re-execute the last ls command from the history list.

STEP 14. Change the maximum number of commands stored in the history list for the current shell to a value of 2000.

STEP 15. Execute the ps -fe command and pipe the output to the less command.

STEP 16. List all filenames in the /etc directory structure (including subdirectories) that are group owned by the lp group.

STEP 17. Display all the files in the /etc/passwd file that contain at least three sequential numbers.

STEP 18. Display the /etc/passwd file with all occurrences of root replaced with XXXX.

Lab 2 Compressing Files

STEP 1. Open a terminal window.

STEP 2. While using the verbose feature, create a tar file named ppp.tar that contains the contents of the /etc/ppp directory. (Ignore any error messages.)

STEP 3. List the contents of the ppp.tar file.

STEP 4. Create a directory named tar_data in the current directory.

STEP 5. Extract the contents of the ppp.tar file into the tar_data directory.

STEP 6. Compress the ppp.tar file by using the gzip command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.gz.

STEP 7. Compress the ppp.tar file with the bzip2 command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.bz2.

STEP 8. Compare the size of the ppp.tar.gz and ppp.tar.bz2 files to determine which one is smaller.

STEP 9. Delete the ppp.tar file.

STEP 10. Unzip the ppp.tar.gz file.

Reference no: EM132187680

Questions Cloud

Develop a request for proposal plan : Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery.
What is the weighted average cost of capital : What is the weighted average cost of capital and What is the salvage cash flow of the new equipment? Include the income tax effect
Develop a chain of custody form to be used within a business : In your investigative journal, develop a chain of custody form to be used within a business based on forensic notes for the final project.
Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Reviews

Write a Review

 

Operating System Questions & Answers

  Microsoft traditional and current name resolution approaches

Determine Microsoft traditional name resolution approaches and Microsoft current name resolution approaches also discuss the differences between them?

  Driver issues with guest operating systems

The VirtualBox Interface has two panes, the Right Hand pane contains a list of the Virtual Machine's generic (old) hardware.

  Implement distributed system facility

In this assignment you will implement a distributed system facility based on Client-Server programming -  The client and server processes will be on different machines. In this case, the server is a stateful server.

  Six of the best practices should be general practices

The management team for MWS has asked for a simple but thorough checklist describing best practices for securing the operating systems used in the company. Six of the best practices should be general practices

  Focuses on software development process and life cycle model

Discuss how would you address this certification issue with your hypothetical firm for your system that you are trying to certify at the top secret level?

  Describe process management and memory management

Describe the process management and memory management activities performed by the Operating System?

  Information technology security

Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.

  Define the impact on the popularity of the operating system

Early versions of UNIX were available only with a command-driven interface. In more recent years, graphical user interfaces have become popular.

  Contrast file systems with disadvantages of database systems

Contrast File Systems with the Disadvantages of Database Systems. Identify three criteria that could be important to a small- or a mid-size business.

  Write down three parts of linux kernel version number

Write down the three parts of Linux kernel version number, and which is least probable to change? What are "BogoMIPS", and what is their significance?

  Discuss role played by scheduler in ensuring serializability

Discuss role played by a scheduler in ensuring serializability of transactions. Explain the difference between serial transaction and serializable transaction.

  Creating pseudocode

Create pseudocode for the Citron Car rental policy, Standard transmission is available only for A, B, and C. Automatic transmission is available for all cars.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd