+1-415-670-9189
info@expertsmind.com
Write a script for user maintenance
Course:- Operating System
Reference No.:- EM13942994




Assignment Help
Assignment Help >> Operating System

You now need to write a script for user maintenance. Write a script that will perform the following tasks:

  • Prompt the system administrator for all valid input parameters
  • Generate a menu to ask which task is needed to be performed
  • Create a UNIX group
  • Drop a UNIX group
  • Create a user
  • Drop a user

Note that as part of the Create User section, a UNIX group many be identified that does not already exist, so that group will need to be created as part of the process.

A third script that you need to write will kill all of the processes associated with a user. The following are the requirements:

  • Prompt the system administrator for the target user name
  • List the running processes for that user
  • Confirm with the system administrator before killing the processes
  • Kill the processes after confirmation

It is very important to note with this task that you should only kill processes for a user and his or her running processes; do not arbitrarily kill running daemons.

  • Include a discussion about the difference between user processes and daemons.
    • What are daemons, and what are they used for?
    • What are the consequences of killing a daemon using this script?

Must be APA formated double spaced with references and be original work




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Operating System) Materials
Create and implement the class myArray that solves the array index out of bound problem and also permit the user to start the array index starting at any integer, positive or
Identify the common targets of malware. Explain why these targets are so attractive to hackers and what they benefit from each. Determine the best practices that should be im
As we all know about problems with people and passwords and how technology can mitigate some of them. What types of problems do you assume implementing these technologies for
Compare the differences between MAC and H-MAC. Explain why using H-MAC is more secure than MAC? Be prepared to fully support your argument. Give examples of commonly used MACs
At the least, you need to iterate the questions a couple of times for yourself. Write down your answers, then set them aside for a couple of days and come back to them. If y
Assume when a child process is forked, a parent may wait for the successful completion of the child via the wait service so that return result of that application can be read
Assume that word 0 is part of a hole and that the highest word in memory contains valid tries are needed in the page table if traditional(one-level) paging is used? how ma
Suppose that the UNIX system call unlink(¢¢/usr/ast/bin/game3¢¢) were executed in the context. Describe carefully what changes are made in the directory system.