What benefits linux offers to a company

Assignment Help Computer Engineering
Reference no: EM132353394

Assignment: Task: Section A: Install Linux

Linux technical expertise is essential in today's computer workplace as more and more companies switch to Linux to meet their computing needs. Thus, it is important to understand how Linux can be used, what benefits Linux offers to a company, and how Linux has developed and continues to develop.

In this assignment, you are required to install a Fedora Linux operating system (Latest Version) on a virtual machine (e.g., Microsoft Hyper-V, VMWare Player or Oracle VM VirtualBox) on your operating system as a guest. You should also find the minimum hardware requirements for most operating systems on the vendor's website. For example, the Fedora Linux operating system minimum hardware requirements documented at docs.fedoraproject.org. You should document the installation process with the screenshot. Based on your experience and research, you should be able to answer the following questions in section B.

Note: Use the latest version of Fedora OS. (3 Marks)

Section B: Profile the System

After installation is completed, write a script called your LastName_StudentID.sh to obtain following options information:

1. Get information about your operating system,

2. Get information about hosts

3. Network interface and routing information

4. Display a list of users currently logged on display a list of recently logged in users,

5. The display used and free memory information,

6. Display if the Linux operating system is installed on physical or Virtual machine.

Note: You can use vim or Nano text editors to write your script.

You can use sudo yum install nano/vim command to install Nano or Vim text editor.

Section C: File Management

Write a shell script to create a directory called "lastName_StudentID" and ask the user if he/she wants to copy a file to ***** directory.
You should find out that the file has read, write and execute permission. If the file has write permission then copy the file to the directory; denied otherwise.

Section D: Pipe

Suppose we have a file called ‘lastName_StudentID_hotel.txt' with 100 lines of hotel names, each name on a line. Write a script to print the hotel names from line number 20 to line number 30 inclusive. Store the results in a file called ‘lastName_StudentID_Hotls.txt'. Sort the file in alphabetical order.

Presentation: You should submit your assessment in a single word document which contains all components of your assignment. Use screenshots to provide evidence and details of the work you have done to complement your written answers. You should reference where appropriate using an approve referencing style to support your work.

Reference no: EM132353394

Questions Cloud

What are cultural considerations when working with clients : What are cultural considerations when working with clients in the substance use disorder field? What first steps might you take with these clients?
Find the tangent line and normal plane : MA5000 Mathematical and Numerical Methods Assignment, Kingston University London, UK. Find the tangent line and normal plane to C at the point
Explain the typical operation of a data warehouse : Explains the typical operation of a data warehouse and data marts, along with operational considerations and constraints. Discusses how DreamHome could benefit.
How they may impact your counseling approach : CNL-509-Identify your personal biases and how they may impact your counseling approach. The point is not to project them onto your clients
What benefits linux offers to a company : Linux technical expertise is essential in today's computer workplace as more and more companies switch to Linux to meet their computing needs.
What protocols are supported by the network : Perform a baseline study for the network at your workplace or school. Create a list of all network devices (servers, routers, bridges, switches, hubs).
What are the reverse social engineering attacks : Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful.
Write a paper on important suggestions from plan you select : Search the Internet for IT governance planning. Select a specific governance plan that exists at a company or a plan framework from an organization.
Cause and effect essays examine causes describe effects : Cause and effect essays examine causes, describe effects, or do both. essay addressing one of the prompts below A serious illness, Poverty or Affluence

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd