What command do you use to create the user codstudent9

Assignment Help Computer Engineering
Reference no: EM133398840

Questions:

1 You are tasked to find out the basic information about the user Tom. Tom is currently logged in to the system. What command do you use to complete the task? (Please pay attention to the uppercase and lowercase of the text)

2 Your current directory location is [home/COD/linux_ You want to know the owner of the following directory: [shared/files What command do you use to complete the task? (Please pay attention to the uppercase and lowercase of the text)

3 Your current directory location is /home/COD/Iinux. You want to View all processes running on the system right now and who is the owner of each of those processes. What command do you use to complete the task?

4 You want to switch from your current regular user shell into the root user shell. What command can you use to switch the shell?

5 You are currently logged in as user Tom. You want to View the content of the system file fete/shadow file. What command can you use to complete the task without switching to the root user (one-line command only)?

6 What command do you use to create the user CODstudent9 ?

7 What command do you use to set (or reset) the password for user named CODstudentQ ?

8 What command do you use to delete the user CODstudentQ and also delete any personal data for the user?

9 What command do you use to add a CODLll'lUX group and assign the GID of 30000?

10 What command do you use to add CODstudent1 and CODstudent2 users to CODLinux supplementary group?

 

 

Reference no: EM133398840

Questions Cloud

Describe what environment variables are : describe what environment variables are and briefly how an operating system, sys admins, and developers use them. In a second paragraph report the value
Need an argument essay outline : Need an Argument Essay Outline
How many substrings are there given a string is length 100 : How many substrings are there given a string is length 100? How many substrings are there given a string is length ny?
What is the name of the library : What is the name of the library? What considerations are made by the library before copying a single property? In other words, what are the rules that
What command do you use to create the user codstudent9 : What command do you use to create the user CODstudent9 ? What command do you use to set (or reset) the password for user named CODstudentQ ?
What is the certainty equivalent of that decision : MET AD 616 Enterprise Risk Analytics, Boston University - What is the investor's optimal decision under the EMV rule? What is the EMV of the investment
Use a command to display a calendar of three months starting : you are asked to carry out some practical activities to manipulate files using Linux. Include either screenshots or output from the command line to document
List the four basic principles that all ethical schools : What is ethics? List the four basic principles that all ethical schools of thought share. Compare the difference between serious game and simulation
Difference between economic value and social value : Discuss the difference between economic value and social value or the shared value creation framework.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd