List the files in the current directory

Assignment Help Operating System
Reference no: EM132187680

Question: Working on the Command Line

These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following and write down the commands.

Lab 2.1 Manage Files

STEP 1. Open a terminal window.

STEP 2. Display your current directory.

STEP 3. Using an absolute pathname, switch to the /etc directory.

STEP 4. Using a relative pathname, move to the /etc/skel directory.

STEP 5. Using a relative pathname, move up one directory.

STEP 6. List the files in the current directory.

STEP 7. Perform a "long display" listing of the files in the current directory.

STEP 8. List all the files in the current directory that begin with the letter s.

STEP 9. Run the command that will determine the type of contents in the /etc/group file.

STEP 10. Display only the last five lines of the /etc/group file.

STEP 11. Execute the command to return to your home directory.

STEP 12. Make a directory named data in the current directory.

STEP 13. Copy the /etc/passwd file into the data directory.

STEP 14. Copy the /etc/ppp directory into the current directory (and ignore any "Permission denied" error messages).

STEP 15. Rename the ppp directory that is located in the current directory to peers.

STEP 16. Update the timestamp of the data/passwd file to the current date and time.

STEP 17. Create a new empty file named test in the data directory.

STEP 18. Delete the data/passwd file.

STEP 19. Delete the peers directory.

Lab 2 Using Shell Features

STEP 1. Open a terminal window.

STEP 2. Display the value of the HOME variable.

STEP 3. Display all the shell variables and values.

STEP 4. Display the value of the TEST variable. (Note that this variable currently has no value.)

STEP 5. Change the current shell so that an error message will be displayed when an undefined variable is used.

STEP 6. Modify the PATH variable to include the /opt directory.

STEP 7. Create a new environment variable named EVENT and set it to the value "now" by using a single command.

STEP 8. Display all the environment variables.

STEP 9. Create an alias in the current shell for the ls command so it will run the command ls -a.

STEP 10. Display all the aliases for the current shell.

STEP 11. Remove the fgrep alias from the current shell.

STEP 12. Display a list of previously executed commands.

STEP 13. Re-execute the last ls command from the history list.

STEP 14. Change the maximum number of commands stored in the history list for the current shell to a value of 2000.

STEP 15. Execute the ps -fe command and pipe the output to the less command.

STEP 16. List all filenames in the /etc directory structure (including subdirectories) that are group owned by the lp group.

STEP 17. Display all the files in the /etc/passwd file that contain at least three sequential numbers.

STEP 18. Display the /etc/passwd file with all occurrences of root replaced with XXXX.

Lab 2 Compressing Files

STEP 1. Open a terminal window.

STEP 2. While using the verbose feature, create a tar file named ppp.tar that contains the contents of the /etc/ppp directory. (Ignore any error messages.)

STEP 3. List the contents of the ppp.tar file.

STEP 4. Create a directory named tar_data in the current directory.

STEP 5. Extract the contents of the ppp.tar file into the tar_data directory.

STEP 6. Compress the ppp.tar file by using the gzip command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.gz.

STEP 7. Compress the ppp.tar file with the bzip2 command but don't overwrite the existing ppp.tar file; rather, create a new file named ppp.tar.bz2.

STEP 8. Compare the size of the ppp.tar.gz and ppp.tar.bz2 files to determine which one is smaller.

STEP 9. Delete the ppp.tar file.

STEP 10. Unzip the ppp.tar.gz file.

Reference no: EM132187680

Questions Cloud

Develop a request for proposal plan : Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery.
What is the weighted average cost of capital : What is the weighted average cost of capital and What is the salvage cash flow of the new equipment? Include the income tax effect
Develop a chain of custody form to be used within a business : In your investigative journal, develop a chain of custody form to be used within a business based on forensic notes for the final project.
Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.
Overview of key issues addressed in the section : Analysis and Critical Thinking Thoughtful analysis is performed to help situate the evidence within the team argument and provide engagement with the topic
What you have done and comment on your work : Additionally, using your Week 3 discussion submission attachment (your spreadsheet using the SUM function), create two new tabs.
Evaluate alternatives to the company self-hosting the site : Discuss what it will take to build a Web architecture, move an existing Website with minimal downtime, and provide a disaster recovery solution to ensure.
Describe the principle of least privilege : Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd