. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy.
|
|
- Kristopher Gaines
- 5 years ago
- Views:
Transcription
1 . Fill in the Blank: A directory named mydir has just been... Success: 64 questions added as a copy. A directory named mydir has just been created with the touch command. Nochmod commands have been issued for the file. An ls -ld mydir shows the following: -rwx-wxr-- 1 mancini faculty 770 Jan mydir What was the value of the umask? Evaluation Method Exact Match 043 Case Sensitivity 2. Short : A link in /etc/rc5.d is named S85http... A link in /etc/rc5.d is named S85httpd. What can you tell about the purpose of the file and when it will be used? How do you know this information? It will be used when the system transitions to run level 5 from a lower run level. (You know this because of the link's location in rc5.d and the first letter of its name.) It will run after any links in this directory which have names containing the numbers 0-84, and it will start the http daemon.
2 3. Multiple Choice: All of the following are included in... All of the following are included in the Linux file system EXCEPT The items in all of the other answers are included in the file system Representations of input and output devices Representations of processes Kernel data structures 4. Multiple Choice: An account has a UID of 175. What typ... An account has a UID of 175. What type of account is it most likely to be? A user account A system account A pseudo-user account
3 It is equally likely to be any of these three types of accounts 5. Multiple Choice: An account has a UID of 7. What type... An account has a UID of 7. What type of account is it most likely to be? A system account A pseudo-user account A user account It is equally likely to be any of these three types of accounts 6. Multiple Choice: An account has a UID of 75. What type... An account has a UID of 75. What type of account is it most likely to be?
4 A pseudo-user account A system account A user account It is equally likely to be any of these types of accounts 7. Fill in the Blank: An ordinary file named myfile has jus... An ordinary file named myfile has just been created with the touch command. No chmod commands have been issued for the file. An ls -l myfile shows the following: --w-rw-r-- 1 mancini faculty 770 Jan myfile What was the value of the umask? Evaluation Method Exact Match 402 Case Sensitivity 8. Multiple Choice: As part of your new job, you will nee...
5 As part of your new job, you will need to maintain a distro of Linux which you have not used before. Which man is most likely to help you learn where different types of information are stored in this distro? hier fs locations filesystem 9. Short : Compare and contrast top and ps. When... Compare and contrast top and ps. When would it be better to use which tool? top and ps both list running processes. top is updated dynamically (every ten seconds by default) and so is better if you wish to see how processes are operating over a period of time. ps just provides a single, static, snapshot. The downside of top is that it is CPU intensive and might cause problems as a consequence 10. Short : Describe the difference in usage betw...
6 Describe the difference in usage between the terms "gigabyte" and "gibibyte." : A gigabyte might (depending on context) either mean 2 30 bytes or 10 9 bytes. There has been a push to disambiguate the term gigabyte by having it refer ONLY to 10 9 bytes; the term gibibyte was introduced to mean specifically 2 30 bytes. 11. Fill in the Blank: Despite common wisdom, it is sometime... Despite common wisdom, it is sometimes a good idea to write passwords down. Provide one justification for this statement. Discuss ways to keep written passwords secure. Evaluation Method Exact Match One possible answer: It is good to have a root password written down in the event that the sole person who knows the password is incapacitated or is fired. The password may be placed in a tamper-evident, serial-numbered baggie and then in a safe to make it less likely that someone unauthorized will read the password. Case Sensitivity
7 12. Short : Examine the man page for the shadow s... Examine the man page for the shadow standard file format. (Hint: Do NOT look at the man page for the shadow library call.) Enter below the three-word description shadow given in the NAME section of the man page. encrypted password file 13. Multiple Choice: If the user does not choose an OS to... If the user does not choose an OS to boot to during system startup, you would like the computer to boot to the second partition. What would you type in the appropriate configuration file to accomplish this? default=1 default=2 partition=1 partition=2
8 14. Fill in the Blank: In what directory are the password-re... Evaluation Method Exact Match In what directory are the password-related files typically located? /etc Case Sensitivity 15. Short : List five duties typically assigned t... List five duties typically assigned to a system administrator. s may vary. Possible answers include: s may vary, but could include: (De-)provisioning accounts Adding and removing hardware Performing backups Installing, upgrading, and removing software
9 Monitoring the system Troubleshooting Maintaining local documentation Monitoring security Fighting fires and other duties as assigned 16. Matching: Match each run level with its most ty... Match each run level with its most typical meaning. Each run level will be used exactly once. Match Items Items A. - A. A. off B. - B. Use X Windows login C. - C. reboot D. - D. A typical default run level 0 B. 5 C. 6 D. 2 E. - E. E.
10 single-user mode Matching: Match each signal to the appropriate... Match each signal to the appropriate description. Match Items Items A. - A. A. Signal sent when you hit CTRL^C B. - B. Forces kernel termination of process C. - C. Suspends a process D. - D. "Unpauses" a process INT B. KILL C. STOP D. CONT 18. Ordering: Place the following bootstrap process...
11 Place the following bootstrap processes in the order in which they would occur Display Order 1. Execute system startup scripts 2. Read bootloader from the master boot record 3. Detect and configure devices 4. Load and initialize the kernel 5. Create kernel processes Correct Order 2. Read bootloader from the master boot record 4. Load and initialize the kernel 3. Detect and configure devices 5. Create kernel processes 1. Execute system startup scripts 19. Short : Short answer: Describe what would hap...
12 Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: cat myfile head The first ten lines of myfile will be displayed 20. Short : Short answer: Describe what would hap... Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: uniq myfile > head The contents of the file myfile (with adjacent duplicate lines represented only once) will be put into the file head, overwriting that file's original contents, 21. Short : Short answer: Describe what would hap...
13 Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: date >> head The current date and time will be appended to the file head. 22. Short : Short answer: Describe what would hap... Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: whoami tee /dev/tty cat > temp The userid would appear on the user's screen and also be put into a file called temp, overwriting temp'soriginal contents. 23. Short : State three advantages of sudo over su. State three advantages of sudo over su.
14 One possible answer: Fewer people need to know the root password, so it is easier to change the password and he password will need to be changed less often due to personnel changes. All uses of sudoare logged. The /etc/sudoers file provides easy documentation of who is allowed to do what. One sudo file can be used to control access to an entire network. 24. Multiple Choice: Suppose a file had the following perm... Suppose a file had the following permissions: r-xrwxr-x Assume that the permissions will not be changed by anyone. Would the user be able to write to the file, and why or why not? The user would not be allowed to write to the file since the user's permissions take precedence over the group's or other permissions for the file's owner. The user would not be allowed to write to the file since two of the three write permissions are denied for the user, and when there is a conflict, majority rules. The user would be allowed to write to the file because a file's owner is automatically allowed to do whatever they want with it. The user would be allowed to write to the file because the user's group is allowed to write to it, and the user is a member of that group. 25. Multiple Choice: Suppose an ls -l of a file shows the...
15 Suppose an ls -l of a file shows the following: -rwx mancini faculty 770 Jan addresses The owner of the file wishes to rename the file to addresses.old and issues the following command: mv addresses addresses.old The command is not successful. Which of the following is the most likely reason for the failure? The directory in which addresses is located does not grant the user write permission. The user does not have write permission to the file addresses. The file addresses.old already exists. Linux file names can not contain periods. 26. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am whoami" I am whoami
16 27. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo 'I am whoami' (Note: The punctuation marks are single quotes.) I am whoami 28. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo `I am whoami` (Note: The punctuation marks are back ticks.) -bash: I: command not found
17 29. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo I am `whoami` (Note: The punctuation marks are back ticks.) I am jsmith 30. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am $whoami" I am me
18 31. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo 'I am $whoami' (Note: The punctuation marks are single quotes.) I am $whoami 32. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am `$whoami`" (Note: The outer punctuation marks are double quotes; the inner ones are back ticks.) -bash: me: command not found
19 33. Multiple Choice: Suppose that you wish to boot from a... Suppose that you wish to boot from a USB drive instead of from the hard drive from which you normally boot. You might have to configure an option in which of the following locations in order to accomplish this? BIOS NBR RAM autoexec.bat 34. Fill in the Blank: Suppose you wish to have all non-hidd... Suppose you wish to have all non-hidden files in AND UNDER the current directory to have the following permissions:
20 Evaluation Method rwxr-x--x You wish to set the permissions with a single command at the command line, and you wish to use numeric representations of permissions. What could you type at the command line to accomplish this? Case Sensitivity Exact Match chmod -R 751 * Case Sensitive 35. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y Evaluation Method Exact Match What type of file is depicted? A symbolic (soft) link Case Sensitivity 36. Fill in the Blank: The output of an ls -l includes the f...
21 The output of an ls -l includes the following: Evaluation Method Exact Match lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y What is the name of the original file? Y Case Sensitivity 37. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: Evaluation Method Exact Match lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y What command was used to create the file depicted here? (Your answer must include not only the name of the command, but also any options and arguments needed.) ln -s Y X Case Sensitivity
22 38. Fill in the Blank: The output of an ls -l includes the f... Evaluation Method Exact Match The output of an ls -l includes the following: brw-rw root X 2, 0 Feb 13 12:51 xd0 What type of file is xd0? A block device file Case Sensitivity 39. Fill in the Blank: The output of an ls -l includes the f... Evaluation Method Exact Match The output of an ls -l includes the following: crw root root 10, 175 Feb 13 12:51 agpgart What type of file is depicted? A character device file. Case Sensitivity
23 40. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: drwxr-xr-x 6 root root 120 Feb 13 12:51 di What type of file is depicted? Evaluation Method Exact Match A directory Case Sensitivity 41. Short : What are two reasons one might choose... What are two reasons one might choose to use Linux instead of Windows on a server? (Note: the reasons must indicate a knowledge of Linux vs. Windows. Reasons such as the following will NOT be given credit: Because it is already on the computer, or Because my boss said so. )
24 : Reasons may vary, but could include: Linux is an open source OS; Windows is closed source Linux may be no cost; Windows will have a licensing fee Linux typically requires fewer resources (storage, memory, CPU) than Windows 42. Short : What could you type at the command li... What could you type at the command line to display all of the processes being run on the system, listed in alphabetical order of username ps -ef sort 43. Short : What could you type at the command li... What could you type at the command line to show the usernames and GECOS information for all users, without showing any other information. cat /etc/ passwd cut -d: -f1,4
25 44. Short : What information is contained in the... What information is contained in the MBR? Which partition to boot from on that device. 45. Fill in the Blank: What is the default boot loader for... What is the default boot loader for most Intel-based UNIX and Linux systems? Evaluation Method Exact Match Exact Match Exact Match Exact Match Exact Match The Grand Unified Boot Loader Grand Unified Boot Loader GRUB The Grand Unified Bootloader Grand Unified Bootloader Case Sensitivity
26 46. Fill in the Blank: What is the most common absolute path... What is the most common absolute path to the directory which contains temporary files and to which anyone logged in may write? Evaluation Method Exact Match /tmp Case Sensitivity 47. Short : What is the name of the process which... What is the name of the process which has the PID 1? init
27 48. Multiple Choice: What is the significance of the numbe... What is the significance of the number 2 in the following output of the ls -l command: brw-rw root floppy 2, 84 Feb 13 11:51 fd0u1040 It is the major device number It is the minor device number It is the size of the file in blocks It is the size of the file in kilobytes 49. Fill in the Blank: What would you type at the command li... What would you type at the command line to change the permissions for the file temp to the following, using numeric representations of permissions? -rws--xr-t (Hint: Note the capitalization.)
28 Evaluation Method Case Sensitivity Exact Match chmod 5714 temp Case Sensitive 50. Short : Where is the bootloader located? Where is the bootloader located? In the first 512-byte block (also called the master boot loader) of the boot device 51. Multiple Choice: Which of the following accounts has s... Which of the following accounts has superuser privileges? User smith with UID 0 User admin with UID 1
29 User administrator with UID 3 User root with UID 2 User jones with UID 4 None of the listed accounts would have superuser privileges 52. Multiple Choice: Which of the following can NOT be del... Which of the following can NOT be deleted with the rm command used without any options? A directory A named pipe A block device file A character device file 53. Multiple Choice: Which of the following is NOT a locat...
30 Which of the following is NOT a location from which GRUB might read its default boot configuration? /boot/grub/grub.ini /boot.grub/menu.1st /boot/grub/grub.conf All of the above are possible locations from which GRUB might read its default boot configuration 54. Multiple Choice: Which of the following is NOT a short... Which of the following is NOT a shortcoming of Linux's traditional access control system? All of the other answers are shortcomings of Linux's traditional access control system. There is no easy way to specify something like, Users of these four accounts may back up system. There is minimal auditing support. For example, you can t easily tell what membership to a group permits a user to do. Many access-control rules are built into the code of individual daemons and command; not easily customized
31 55. Multiple Choice: Which of the following is correct? Which of the following is correct? There is one MBR on a boot disk, but each partition can have its own second-stage boot launcher. There is one second-stage boot launcher on a boot disk, but each partition can have its own MBR. Each partition can have its own MBR and second-stage boot launcher. There is only one MBR and second-stage boot launcher on a boot disk. 56. Multiple Choice: Which of the following will change th... Which of the following will change the run level to 4?
32 telinit 4 runlevel 4 run level 4 tell init Short : You (as administrator) notice that a... You (as administrator) notice that a process is consuming large amounts of CPU time and appears to be slowing the system down. What steps should you take? First determine what the process is: whether it is a user or a system process, whether it is a benign CPU hog, a piece of malware, or a misbehaving system process, and let it run as is, renice it, or kill it as appropriate. 58. Multiple Choice: You have changed the umask value from...
33 You have changed the umask value from 231 to 423 and you now wish to restore the older value. Which command should you issue? umask 231 set umask=231 umask=231 set umask Multiple Choice: You have tried to mount /dev/sd2 to t... You have tried to mount /dev/sd2 to the /var directory but are unable to do so. Which of the following is NOT a possible reason you were unsuccessful? The directory /var did not exist. The /var directory existed but was not empty. You are not in the root account and forgot to precede the appropriate command with sudo. All of the other choices could be reasons why the command did not work. 60. Multiple Choice: You want to determine the major devic...
34 You want to determine the major device number for one of your drives. You should issue an ls - l of which directory to make this determination? /dev /drivers /devices /drives 61. Multiple Choice: You wish to set up a dual boot system... You wish to set up a dual boot system with Linux and Windows. Which boot loader should you use? GRUB Windows boot loader Windows boot loader or GRUB work equally well It depends on which versions of Windows and Linux you are installing
35 62. Multiple Choice: You wish to unmount /dev/sda1 from /e... You wish to unmount /dev/sda1 from /etc. Which of the following commands would accomplish this? sudo umount /etc sudo unmount /etc sudo umount /dev/sda1 /etc sudo unmount /dev/sda1 /etc 63. Fill in the Blank: You would like to give the user 10 se... You would like to give the user 10 seconds to choose which OS to boot to in a multiboot system. What command should you add to the appropriate configuration file to permit this?
36 Evaluation Method Exact Match timeout=10 Case Sensitivity 64. Fill in the Blank: what is the ultimate ancestor of all... Evaluation Method Exact Match Exact Match Exact Match what is the ultimate ancestor of all user processes? init the init process init process Case Sensitivity Select: All None Select by Type: Delete Points Update Hide Details
37 Consider the following command output when you answer the next questions: What command (with what arguments) was used to generate this output? : ps ef Why is netns in square brackets? : Because it is a kernel process What are the command name and the PID for the parent of the ps ef process? : bash and 1212 Someone has logged in with their own username and then su ed into the administrative account. What is their non administrative account's name? : student Chapter 5 Consider the following output: What is the process ID of the PARENT of the firefox process? : 2053 What is the name of the command that is the PARENT of the firefox process?
38 : bash Which process(es) have had either nice or renice used on it/them? : shotwell (PID 4423) and firefox (PID 4563) Which process has the least access to the CPU? : shotwell (PID 4423) Consider the following output: What was typed at the command line to generate this output? (Include any flags or arguments as well as the name of the command.) : ps fl Which process has been suspended? : shotwell (PID 4423) Chapter 6
Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of
Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of 2015. The materials for this course are still being developed.
More informationPermissions and Links
Permissions and Links The root account Setuid and Setgid Permissions Setting Setuid and Setgid with chmod Directory Access Permissions Links o Two Types of Links o The ln command o Removing a link The
More informationGetting Started with Linux
Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences
More informationCST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1
Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for
More informationINTRODUCTION TO LINUX
INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free
More informationUsing grub to Boot various Operating Systems
Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........
More informationPlease choose the best answer. More than one answer might be true, but choose the one that is best.
Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationThis is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB
This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make
More informationLinux basics U3A in Bath. Linux Principles. by Andy Pepperdine
Linux Principles by Andy Pepperdine This paper is intended to provide the reader with an understanding of the principles on which a Linux system operates and can be maintained. There is so much in the
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website
More informationLab E2: bypassing authentication and resetting passwords
Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More informationLinux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester
Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationThis is Worksheet and Assignment 12. Disks, Partitions, and File Systems
This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program
More informationUnix as a Platform Exercises. Course Code: OS-01-UNXPLAT
Unix as a Platform Exercises Course Code: OS-01-UNXPLAT Working with Unix 1. Use the on-line manual page to determine the option for cat, which causes nonprintable characters to be displayed. Run the command
More informationChapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories
Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the
More informationHands-on Keyboard: Cyber Experiments for Strategists and Policy Makers
Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity
More informationcommandname flags arguments
Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands
More informationLinux Interview Questions and Answers
Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a
More informationCommand-line interpreters
Command-line interpreters shell Wiki: A command-line interface (CLI) is a means of interaction with a computer program where the user (or client) issues commands to the program in the form of successive
More informationPL-I Assignment Broup B-Ass 5 BIOS & UEFI
PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka
More informationCISC 220 fall 2011, set 1: Linux basics
CISC 220: System-Level Programming instructor: Margaret Lamb e-mail: malamb@cs.queensu.ca office: Goodwin 554 office phone: 533-6059 (internal extension 36059) office hours: Tues/Wed/Thurs 2-3 (this week
More informationUnix Filesystem. January 26 th, 2004 Class Meeting 2
Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationEmbedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island
Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationTable of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs
Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing
More informationCSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80
CSE 303 Lecture 2 Introduction to bash shell read Linux Pocket Guide pp. 37-46, 58-59, 60, 65-70, 71-72, 77-80 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Unix file system structure
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationUNIX File Hierarchy: Structure and Commands
UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin
More informationSystems Programming/ C and UNIX
Systems Programming/ C and UNIX Alice E. Fischer September 6, 2017 Alice E. Fischer Systems Programming Lecture 2... 1/28 September 6, 2017 1 / 28 Outline 1 Booting into Linux 2 The Command Shell 3 Defining
More informationA Brief Introduction to the Linux Shell for Data Science
A Brief Introduction to the Linux Shell for Data Science Aris Anagnostopoulos 1 Introduction Here we will see a brief introduction of the Linux command line or shell as it is called. Linux is a Unix-like
More informationOperating Systems Linux 1-2 Measurements Background material
Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationOverview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions
Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationOperating Systems, Unix Files and Commands SEEM
Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs
More informationEssential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02
Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationChapter 6. Boot time configuration. Chapter 6 Boot time configuration
Chapter 6. Boot time configuration Chapter 6 Boot time configuration Last revised: 20/6/2004 Chapter 6 Outline In this chapter we will learn about: How the system boots How to configure the boot loaders
More informationfind Command as Admin Security Tool
find Command as Admin Security Tool Dr. Bill Mihajlovic INCS-620 Operating Systems Security find Command find command searches for the file or files that meet certain condition. like: Certain name Certain
More informationLinux Command Line Primer. By: Scott Marshall
Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and
More informationThe Unix Shell & Shell Scripts
The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises
More informationWelcome to Linux. Lecture 1.1
Welcome to Linux Lecture 1.1 Some history 1969 - the Unix operating system by Ken Thompson and Dennis Ritchie Unix became widely adopted by academics and businesses 1977 - the Berkeley Software Distribution
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationFiles and Directories
CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on
More informationGNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018
GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux
More informationOutline. Structure of a UNIX command
Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory
More informationADVANCED LINUX SYSTEM ADMINISTRATION
Lab Assignment 1 Corresponding to Topic 2, The Command Line L1 Main goals To get used to the command line. To gain basic skills with the system shell. To understand some of the basic tools of system administration.
More informationSystem Administration
Süsteemihaldus MTAT.08.021 System Administration UNIX shell basics Name service DNS 1/69 Command Line Read detailed manual for specific command using UNIX online documentation or so called manual (man)
More information2) clear :- It clears the terminal screen. Syntax :- clear
1) cal :- Displays a calendar Syntax:- cal [options] [ month ] [year] cal displays a simple calendar. If arguments are not specified, the current month is displayed. In addition to cal, the ncal command
More informationLinux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage
Linux+ Guide to Linux Certification, Third Edition Chapter 2 Linux Installation and Usage Objectives Install Red Hat Fedora Linux using good practices Outline the structure of the Linux interface Enter
More informationUnix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.
Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,
More informationThe Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu
The Early System Start-Up Process Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu 1 Boot Process Booting is the initialization of a computerized system In Linux,
More informationBooting up and Shutting down A primer for troubleshooting
Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and
More informationFull file at https://fratstock.eu
Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised
More informationFile permission u owner of file/directory (user) g group of the file/directory o other a all
File permission u owner of file/directory (user) g group of the file/directory o other a all Permission Types: permission octal value Meaning Read (r) 4 The file can is read only, for directory it's contain
More informationStop all processes and then reboot - same as above startx. Log in as superuser from current login exit
Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all
More informationUnix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech
Unix File System Class Meeting 2 * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System The file system is your interface to: physical
More informationUnix Introduction to UNIX
Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various
More informationContents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...
Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing
More informationPESIT Bangalore South Campus
INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1
More informationLinux/Citrix Virtual Environment Documentation
Linux/Citrix Virtual Environment Documentation Purpose This document provides information on creating a bootable Ubuntu flash drive, customizing the interface, and using basic commands. Contents Bootable
More informationLinux & Shell Programming 2014
Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:
More informationQUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2)
BANK ON & SHELL PROGRAMMING-502 (CORE PAPER-2) TOPIC 1: VI-EDITOR MARKS YEAR 1. Explain set command of vi editor 2 2011oct 2. Explain the modes of vi editor. 7 2013mar/ 2013 oct 3. Explain vi editor 5
More informationLPIC 102. be familiar with standard runlevels in a Linux system
LPIC 102 The boot process, init and runlevels 1 Aim After successfully working through this exercise, You will: be familiar with standard runlevels in a Linux system be able to rescue a system without
More informationCSE 390a Lecture 2. Exploring Shell Commands, Streams, Redirection, and Processes
CSE 390a Lecture 2 Exploring Shell Commands, Streams, Redirection, and Processes slides created by Marty Stepp, modified by Jessica Miller & Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture
More informationOutline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components
UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas
More informationStudent Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3.
Student Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3. Enter stargate.ncc.edu in the text field labeled Host Name: 4. Enter the
More informationOracle 1Z Enterprise Linux System Administration. Download Full Version :
Oracle 1Z0-403 Enterprise Linux System Administration Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-403 B. It does not provide any protection to remote X connections. C. It allows
More informationInstallation of the OS
Lab 1 Installation of the OS 1.1 Objectives The goal of this first session is to install a Debian/Linux operating system from scratch on a Intel x86- based computer. The installation will be made on a
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals
More informationPresented by Bill Genske Gary Jackson
Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,
More informationWeek 2. Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands
Week 2 Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands mkdir, cd, cls, del, copy, attrib, date, path, type, format, exit. Basic commands in LINUX - cat, ls, pwd,,
More informationCommon UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface
Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,
More informationCSE 303 Lecture 4. users/groups; permissions; intro to shell scripting. read Linux Pocket Guide pp , 25-27, 61-65, , 176
CSE 303 Lecture 4 users/groups; permissions; intro to shell scripting read Linux Pocket Guide pp. 19-20, 25-27, 61-65, 118-119, 176 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Lecture
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationAccess Control. Steven M. Bellovin September 13,
Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware
More informationOverview of the UNIX File System
Overview of the UNIX File System Navigating and Viewing Directories Adapted from Practical Unix and Programming Hunter College Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing
More informationLinux & Shell Programming 2014
Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)
More informationIntroduction: What is Unix?
Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix
More informationM.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming
IIMII 003-007303 M.C.A. (Sem.-lll) (CBCS) Examination November-20 13 CCA-3003 Operating System and LinuxlUnix programming Faculty Code: 003 Subject Code: 007303 Time: 2'/' Hoursl ITotal Marks: 70 I. Attempt
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon
More informationAccess Control. Steven M. Bellovin September 2,
Access Control Steven M. Bellovin September 2, 2014 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware
More informationChapter 1 - Introduction. September 8, 2016
Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help
More informationExam Linux-Praxis - 1 ( From )
Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail
More informationStd: XI CHAPTER-3 LINUX
Commands: General format: Command Option Argument Command: ls - Lists the contents of a file. Option: Begins with minus sign (-) ls a Lists including the hidden files. Argument refers to the name of a
More informationUnix File System. Learning command-line navigation of the file system is essential for efficient system usage
ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find
More informationIntroduction to the UNIX command line
Introduction to the UNIX command line Steven Abreu Introduction to Computer Science (ICS) Tutorial Jacobs University s.abreu@jacobs-university.de September 19, 2017 Overview What is UNIX? UNIX Shell Commands
More informationUnix System Architecture, File System, and Shell Commands
Unix System Architecture, File System, and Shell Commands Prof. (Dr.) K.R. Chowdhary, Director COE Email: kr.chowdhary@iitj.ac.in webpage: http://www.krchowdhary.com JIET College of Engineering August
More informationCompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL
CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL Chapter System Architecture (Domain 101) THE FOLLOWING COMPTIA LINUX+/LPIC-1 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 101.1 Determine and Configure hardware
More information5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9
File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations
More information