Compare cron, anacron, and systemd timer units

Assignment Help Operating System
Reference no: EM131226698

Question 1:

An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux currently offers not one service but potentially three—cron, anacron, and systemd timer units.

In about a page compare and contrast all three systems. Illustrate your discussion by using the system files /etc/anacron and /etc/crontab and by constructing equivalent systemd service and timer files.

Question 2:

The web administrator of your organisation needs to login remotely to the machine that is running the organisation’s public web site. You tell her that the only way to login is via The Secure Shell—which she knows nothing about! Assuming she is logging in via a Linux boxwrite a help document for her containing the following—

a. A short introduction to SSH, explaining why it is the preferred way of logging into a remote machine—this explanation will need to discuss symmetric and asymmetric key encryption.

Question 3:

A user comes to you requesting that you create and implement a backup policy for his desktop machine. What he wants, is to be able to place a blank DVD in his Single-Sided DVD-burner at the end of the working day on a Friday and have all the files he has been working on for the week backed up automatically that evening to the DVD!

Verified Expert

Linux has three main timer units namely Cron, Anacron and Systemd. There is a distinct set of features that all of these time schedulers in Linux are built with. However, it is a fact that all of these three are merely timers and the application of their usage is quite different from each other. Cron is a time based task scheduler program in Linux. Cron is specifically used in the environment where the system has to be scheduled to very specific times, generally precisely to the minutes and seconds. Tasks can run on particular dates, or repeat at periods as little as consistently. Cron likewise permits clients in extensive national systems to assign the time zone under which their tasks fall, to guarantee fitting execution utilizing local times. Anacron can be considered as ‘Cron’ for laptops and desktops, as it processes in the same way as the Cron.

Reference no: EM131226698

Questions Cloud

Promotions and transfers of employees : Fiji Airways has embarked on promotions and transfers of employees within the company to mitigate its potential labour shortage. Discuss the advantages offilling positions with current employees rather than recruiting from externalsources. Illustr..
What is the load factor of the hash table : Find the average number of key comparisons in a successful search in the hash table. You can assume that a search for each of the nine keys is equally likely - What is the load factor of the hash table?
Describe the ethical model being used by the company : Describe the motivational practices used by the organization to promote better strategy execution. Include some illustrative examples in your response.
Improve employees performance : Question: Besides giving employees feedback, what other steps a manager can take to improve employees' performance? Discuss your answer.
Compare cron, anacron, and systemd timer units : An important service provided by any system is the ability to run a process on a predetermined schedule without human intervention. The “automation” of tasks can reduce the workload of the system administrator significantly. Unfortunately Linux curre..
What is the cost of equity capital for vwx : Explain homemade leverage and why it matters. What is the cost of equity capital for VWX? Using the M&M Proposition I with taxes, calculate the value of the firm at each debt level.
Diagnosing the change : Select a Diagnostic Model (see Chapter Five) that you utilize to review aspects of change activities and actions that have been taken by the companies chosen. Here we are looking at the "parts" of the companies as well as their strategies, as surm..
Key human resources concerns and considerations : What are key human resources concerns and considerations related to compensation when an organization expands and moves into two or more geographical markets?
Selection methods barry ilaisa : Identify the selection methods Barry Ilaisa used for hiring salespeople? Did he go about using these methods in the best order? Explain your answer.

Reviews

Write a Review

Operating System Questions & Answers

  Data abstraction for health it applications

Choose one database design model and discuss the benefits that model would bring to health information technology applications.

  Write a report outlining methods of acquiring image in linux

Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

  What scheme does the kernel in unix system v follow

What scheme does the Kernel in Unix System V follow while choosing a swap device among the multiple swap devices? 2) What is a Region?

  Steps add to the check list

According to your personal experience, what steps would you add to the check list and determine what steps would you leave out?

  Central role of information systems in organisations

Information systems have become so integrated into the UK society and economy that the cashless society is a realistic possibility within the next 25 years.

  How many worker threads do you need

COMP 3430 Operating Systems Assignment. How many worker threads do you need? Do you need more than the maximum number of clients? The same number? Will less do? Why

  How many probes will be needed on average to enter a symbol

If that one is also full, another is used, and so on, until an empty is found. If the fraction of the slots that are full is R, how many probes will be needed, on the average, to enter a new symbol?

  Delete all sub-directories within

Delete all sub-directories within "temp" directory if not empty. In Python program change the current working directory to [temp].

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  Why do you think that embedded systems are so popular

Why do you think that embedded systems are so popular? Is it because of how reliable they are? Are they also secure

  A plug in and a helper application

Discuss similarities and differences between a plug-in and a helper application?

  Ethics with computer hackers

White Hat Cracking engage security testing by arrangement. Grey Hat Cracking seeks to identify insecure systems and inform administrators or users of vulnerabilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd