Vm machine and provide a screenshot

Assignment Help Basic Computer Science
Reference no: EM131587909

Please provide screenshots for each part. Some syntax may need to be corrected if necessary. Comment is needed for each part.

Log in to your VM machine and provide a screenshot of your work and make sure to use MS word to comment in each screenshot. It's not enough to past the execution of the command to get a full credit. 

In this homework lab, you will manage processes. You will view running processes several ways and examine their priorities. You will run a sample program, observe it, and then set it to run in the background. While it is running, you will monitor it, then send a kill signal to its job ID. You will schedule processes to run once at a specified time, then subsequently set it up to run at specified intervals.

Log in to the VM machine and start working.

Part 1: View the current processes using the ps command. The -aux option will show ALL of the processes running on the system. View all processes using the ps -aux | more command piped into the more command. View all of the processes using the pstree command. View the current processes using the top command. The top command shows current processes in real time and stays active until ended with the CTRL+C keystroke. Use CTRL+C to end the command. Clear the screen.

Part2: Run the yes command in the foreground by typing yes and then stop it using the CTRL + C keystroke. Run it and send output to /dev/null using yes > /dev/null. The shell prompt will not return until the process is stopped, again using CTRL+C. RUN the process in the background by adding the ampersand metachracter (&) to the last command. A space before the ampersand is optional. Now you get the job and PID output [1] 2218 and prompt returns.

Part 3: Check the job by typing the jobs command. Another way to check it is use the ps command; type that next. Send a kill signal to the yes process using its job number. Type kill %1. Use the jobs command to verify the termination of the process. View the list of available kill signals by typing kill -l. Clear the screen when you are finished.

Part 4: Use the ps -l command to view the nice values of the currently running processes. Record the nice value and the priority of the ps command. Clear the screen.

Part 5: Make a simple batch file named atbatch and schedule it to run the atfile using the at command. To create the file use the cat command as follows: cat > atbatch. On the next line, echo "This file was created by the at command" > atfile. Use CTRL+C to close the atbatch file. Use the date command to get time. Use the t command to run the command in one minute from the time shown. The command will be at 5:25 AM -f atbatch. The job will be confirmed. After a minute, type cat atfile and you should see that atfile was created with the line, "This file was created by the at command".

Reference no: EM131587909

Questions Cloud

How would you explain the chicken-egg conundrum : How would you explain the "chicken/egg" conundrum as to which disorder came first, the mental illness or the addiction?
Service catalog and service level agreements : An important aspect of service management is creating a service catalog. The service catalog describes the services managed by the IT organization.
Societal concerns or issues related to the topic : Review the topics in the course and choose a topic to focus your research paper on.
Discuss review of integrated intelligence and crime analysis : Write a summary review of Integrated Intelligence & Crime Analysis
Vm machine and provide a screenshot : Log in to your VM machine and provide a screenshot of your work and make sure to use MS word to comment in each screenshot.
Describe and analyze the broad range of talent management : Describe and analyze the broad range of talent management efforts that use software applications to help you Director to make an educated decision.
Why you believe the behavior identified could be deemed : Take a contrary view and discuss why you believe the behavior identified could be deemed as not being a restraint of trade. Justify your response.
Select two historical perspectives on human sexuality : Select one contemporary cultural perspective on human sexuality listed in the text (e.g., sexual revolution, gay activism, sex research).
Discuss and explain the term social institution : Write a 1,050- to 1,250-word paper in which you discuss and explain the term social institution, as it applies to organized crime

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd