. Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy.

Size: px
Start display at page:

Download ". Fill in the Blank: A directory named mydir has just been... Points:10. Add Question Success: 64 questions added as a copy."

Transcription

1 . Fill in the Blank: A directory named mydir has just been... Success: 64 questions added as a copy. A directory named mydir has just been created with the touch command. Nochmod commands have been issued for the file. An ls -ld mydir shows the following: -rwx-wxr-- 1 mancini faculty 770 Jan mydir What was the value of the umask? Evaluation Method Exact Match 043 Case Sensitivity 2. Short : A link in /etc/rc5.d is named S85http... A link in /etc/rc5.d is named S85httpd. What can you tell about the purpose of the file and when it will be used? How do you know this information? It will be used when the system transitions to run level 5 from a lower run level. (You know this because of the link's location in rc5.d and the first letter of its name.) It will run after any links in this directory which have names containing the numbers 0-84, and it will start the http daemon.

2 3. Multiple Choice: All of the following are included in... All of the following are included in the Linux file system EXCEPT The items in all of the other answers are included in the file system Representations of input and output devices Representations of processes Kernel data structures 4. Multiple Choice: An account has a UID of 175. What typ... An account has a UID of 175. What type of account is it most likely to be? A user account A system account A pseudo-user account

3 It is equally likely to be any of these three types of accounts 5. Multiple Choice: An account has a UID of 7. What type... An account has a UID of 7. What type of account is it most likely to be? A system account A pseudo-user account A user account It is equally likely to be any of these three types of accounts 6. Multiple Choice: An account has a UID of 75. What type... An account has a UID of 75. What type of account is it most likely to be?

4 A pseudo-user account A system account A user account It is equally likely to be any of these types of accounts 7. Fill in the Blank: An ordinary file named myfile has jus... An ordinary file named myfile has just been created with the touch command. No chmod commands have been issued for the file. An ls -l myfile shows the following: --w-rw-r-- 1 mancini faculty 770 Jan myfile What was the value of the umask? Evaluation Method Exact Match 402 Case Sensitivity 8. Multiple Choice: As part of your new job, you will nee...

5 As part of your new job, you will need to maintain a distro of Linux which you have not used before. Which man is most likely to help you learn where different types of information are stored in this distro? hier fs locations filesystem 9. Short : Compare and contrast top and ps. When... Compare and contrast top and ps. When would it be better to use which tool? top and ps both list running processes. top is updated dynamically (every ten seconds by default) and so is better if you wish to see how processes are operating over a period of time. ps just provides a single, static, snapshot. The downside of top is that it is CPU intensive and might cause problems as a consequence 10. Short : Describe the difference in usage betw...

6 Describe the difference in usage between the terms "gigabyte" and "gibibyte." : A gigabyte might (depending on context) either mean 2 30 bytes or 10 9 bytes. There has been a push to disambiguate the term gigabyte by having it refer ONLY to 10 9 bytes; the term gibibyte was introduced to mean specifically 2 30 bytes. 11. Fill in the Blank: Despite common wisdom, it is sometime... Despite common wisdom, it is sometimes a good idea to write passwords down. Provide one justification for this statement. Discuss ways to keep written passwords secure. Evaluation Method Exact Match One possible answer: It is good to have a root password written down in the event that the sole person who knows the password is incapacitated or is fired. The password may be placed in a tamper-evident, serial-numbered baggie and then in a safe to make it less likely that someone unauthorized will read the password. Case Sensitivity

7 12. Short : Examine the man page for the shadow s... Examine the man page for the shadow standard file format. (Hint: Do NOT look at the man page for the shadow library call.) Enter below the three-word description shadow given in the NAME section of the man page. encrypted password file 13. Multiple Choice: If the user does not choose an OS to... If the user does not choose an OS to boot to during system startup, you would like the computer to boot to the second partition. What would you type in the appropriate configuration file to accomplish this? default=1 default=2 partition=1 partition=2

8 14. Fill in the Blank: In what directory are the password-re... Evaluation Method Exact Match In what directory are the password-related files typically located? /etc Case Sensitivity 15. Short : List five duties typically assigned t... List five duties typically assigned to a system administrator. s may vary. Possible answers include: s may vary, but could include: (De-)provisioning accounts Adding and removing hardware Performing backups Installing, upgrading, and removing software

9 Monitoring the system Troubleshooting Maintaining local documentation Monitoring security Fighting fires and other duties as assigned 16. Matching: Match each run level with its most ty... Match each run level with its most typical meaning. Each run level will be used exactly once. Match Items Items A. - A. A. off B. - B. Use X Windows login C. - C. reboot D. - D. A typical default run level 0 B. 5 C. 6 D. 2 E. - E. E.

10 single-user mode Matching: Match each signal to the appropriate... Match each signal to the appropriate description. Match Items Items A. - A. A. Signal sent when you hit CTRL^C B. - B. Forces kernel termination of process C. - C. Suspends a process D. - D. "Unpauses" a process INT B. KILL C. STOP D. CONT 18. Ordering: Place the following bootstrap process...

11 Place the following bootstrap processes in the order in which they would occur Display Order 1. Execute system startup scripts 2. Read bootloader from the master boot record 3. Detect and configure devices 4. Load and initialize the kernel 5. Create kernel processes Correct Order 2. Read bootloader from the master boot record 4. Load and initialize the kernel 3. Detect and configure devices 5. Create kernel processes 1. Execute system startup scripts 19. Short : Short answer: Describe what would hap...

12 Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: cat myfile head The first ten lines of myfile will be displayed 20. Short : Short answer: Describe what would hap... Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: uniq myfile > head The contents of the file myfile (with adjacent duplicate lines represented only once) will be put into the file head, overwriting that file's original contents, 21. Short : Short answer: Describe what would hap...

13 Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: date >> head The current date and time will be appended to the file head. 22. Short : Short answer: Describe what would hap... Short answer: Describe what would happen if the following were executed. Assume the existence of any file mentioned: whoami tee /dev/tty cat > temp The userid would appear on the user's screen and also be put into a file called temp, overwriting temp'soriginal contents. 23. Short : State three advantages of sudo over su. State three advantages of sudo over su.

14 One possible answer: Fewer people need to know the root password, so it is easier to change the password and he password will need to be changed less often due to personnel changes. All uses of sudoare logged. The /etc/sudoers file provides easy documentation of who is allowed to do what. One sudo file can be used to control access to an entire network. 24. Multiple Choice: Suppose a file had the following perm... Suppose a file had the following permissions: r-xrwxr-x Assume that the permissions will not be changed by anyone. Would the user be able to write to the file, and why or why not? The user would not be allowed to write to the file since the user's permissions take precedence over the group's or other permissions for the file's owner. The user would not be allowed to write to the file since two of the three write permissions are denied for the user, and when there is a conflict, majority rules. The user would be allowed to write to the file because a file's owner is automatically allowed to do whatever they want with it. The user would be allowed to write to the file because the user's group is allowed to write to it, and the user is a member of that group. 25. Multiple Choice: Suppose an ls -l of a file shows the...

15 Suppose an ls -l of a file shows the following: -rwx mancini faculty 770 Jan addresses The owner of the file wishes to rename the file to addresses.old and issues the following command: mv addresses addresses.old The command is not successful. Which of the following is the most likely reason for the failure? The directory in which addresses is located does not grant the user write permission. The user does not have write permission to the file addresses. The file addresses.old already exists. Linux file names can not contain periods. 26. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am whoami" I am whoami

16 27. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo 'I am whoami' (Note: The punctuation marks are single quotes.) I am whoami 28. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo `I am whoami` (Note: The punctuation marks are back ticks.) -bash: I: command not found

17 29. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo I am `whoami` (Note: The punctuation marks are back ticks.) I am jsmith 30. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am $whoami" I am me

18 31. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo 'I am $whoami' (Note: The punctuation marks are single quotes.) I am $whoami 32. Short : Suppose for the following question th... Suppose for the following question that there is a variable called whoami that had the value me. Also suppose you are logged in as jsmith. What would be the output of the following command? echo "I am `$whoami`" (Note: The outer punctuation marks are double quotes; the inner ones are back ticks.) -bash: me: command not found

19 33. Multiple Choice: Suppose that you wish to boot from a... Suppose that you wish to boot from a USB drive instead of from the hard drive from which you normally boot. You might have to configure an option in which of the following locations in order to accomplish this? BIOS NBR RAM autoexec.bat 34. Fill in the Blank: Suppose you wish to have all non-hidd... Suppose you wish to have all non-hidden files in AND UNDER the current directory to have the following permissions:

20 Evaluation Method rwxr-x--x You wish to set the permissions with a single command at the command line, and you wish to use numeric representations of permissions. What could you type at the command line to accomplish this? Case Sensitivity Exact Match chmod -R 751 * Case Sensitive 35. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y Evaluation Method Exact Match What type of file is depicted? A symbolic (soft) link Case Sensitivity 36. Fill in the Blank: The output of an ls -l includes the f...

21 The output of an ls -l includes the following: Evaluation Method Exact Match lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y What is the name of the original file? Y Case Sensitivity 37. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: Evaluation Method Exact Match lrwxrwxrwx 1 root root 3 Feb 13 12:51 X -> Y What command was used to create the file depicted here? (Your answer must include not only the name of the command, but also any options and arguments needed.) ln -s Y X Case Sensitivity

22 38. Fill in the Blank: The output of an ls -l includes the f... Evaluation Method Exact Match The output of an ls -l includes the following: brw-rw root X 2, 0 Feb 13 12:51 xd0 What type of file is xd0? A block device file Case Sensitivity 39. Fill in the Blank: The output of an ls -l includes the f... Evaluation Method Exact Match The output of an ls -l includes the following: crw root root 10, 175 Feb 13 12:51 agpgart What type of file is depicted? A character device file. Case Sensitivity

23 40. Fill in the Blank: The output of an ls -l includes the f... The output of an ls -l includes the following: drwxr-xr-x 6 root root 120 Feb 13 12:51 di What type of file is depicted? Evaluation Method Exact Match A directory Case Sensitivity 41. Short : What are two reasons one might choose... What are two reasons one might choose to use Linux instead of Windows on a server? (Note: the reasons must indicate a knowledge of Linux vs. Windows. Reasons such as the following will NOT be given credit: Because it is already on the computer, or Because my boss said so. )

24 : Reasons may vary, but could include: Linux is an open source OS; Windows is closed source Linux may be no cost; Windows will have a licensing fee Linux typically requires fewer resources (storage, memory, CPU) than Windows 42. Short : What could you type at the command li... What could you type at the command line to display all of the processes being run on the system, listed in alphabetical order of username ps -ef sort 43. Short : What could you type at the command li... What could you type at the command line to show the usernames and GECOS information for all users, without showing any other information. cat /etc/ passwd cut -d: -f1,4

25 44. Short : What information is contained in the... What information is contained in the MBR? Which partition to boot from on that device. 45. Fill in the Blank: What is the default boot loader for... What is the default boot loader for most Intel-based UNIX and Linux systems? Evaluation Method Exact Match Exact Match Exact Match Exact Match Exact Match The Grand Unified Boot Loader Grand Unified Boot Loader GRUB The Grand Unified Bootloader Grand Unified Bootloader Case Sensitivity

26 46. Fill in the Blank: What is the most common absolute path... What is the most common absolute path to the directory which contains temporary files and to which anyone logged in may write? Evaluation Method Exact Match /tmp Case Sensitivity 47. Short : What is the name of the process which... What is the name of the process which has the PID 1? init

27 48. Multiple Choice: What is the significance of the numbe... What is the significance of the number 2 in the following output of the ls -l command: brw-rw root floppy 2, 84 Feb 13 11:51 fd0u1040 It is the major device number It is the minor device number It is the size of the file in blocks It is the size of the file in kilobytes 49. Fill in the Blank: What would you type at the command li... What would you type at the command line to change the permissions for the file temp to the following, using numeric representations of permissions? -rws--xr-t (Hint: Note the capitalization.)

28 Evaluation Method Case Sensitivity Exact Match chmod 5714 temp Case Sensitive 50. Short : Where is the bootloader located? Where is the bootloader located? In the first 512-byte block (also called the master boot loader) of the boot device 51. Multiple Choice: Which of the following accounts has s... Which of the following accounts has superuser privileges? User smith with UID 0 User admin with UID 1

29 User administrator with UID 3 User root with UID 2 User jones with UID 4 None of the listed accounts would have superuser privileges 52. Multiple Choice: Which of the following can NOT be del... Which of the following can NOT be deleted with the rm command used without any options? A directory A named pipe A block device file A character device file 53. Multiple Choice: Which of the following is NOT a locat...

30 Which of the following is NOT a location from which GRUB might read its default boot configuration? /boot/grub/grub.ini /boot.grub/menu.1st /boot/grub/grub.conf All of the above are possible locations from which GRUB might read its default boot configuration 54. Multiple Choice: Which of the following is NOT a short... Which of the following is NOT a shortcoming of Linux's traditional access control system? All of the other answers are shortcomings of Linux's traditional access control system. There is no easy way to specify something like, Users of these four accounts may back up system. There is minimal auditing support. For example, you can t easily tell what membership to a group permits a user to do. Many access-control rules are built into the code of individual daemons and command; not easily customized

31 55. Multiple Choice: Which of the following is correct? Which of the following is correct? There is one MBR on a boot disk, but each partition can have its own second-stage boot launcher. There is one second-stage boot launcher on a boot disk, but each partition can have its own MBR. Each partition can have its own MBR and second-stage boot launcher. There is only one MBR and second-stage boot launcher on a boot disk. 56. Multiple Choice: Which of the following will change th... Which of the following will change the run level to 4?

32 telinit 4 runlevel 4 run level 4 tell init Short : You (as administrator) notice that a... You (as administrator) notice that a process is consuming large amounts of CPU time and appears to be slowing the system down. What steps should you take? First determine what the process is: whether it is a user or a system process, whether it is a benign CPU hog, a piece of malware, or a misbehaving system process, and let it run as is, renice it, or kill it as appropriate. 58. Multiple Choice: You have changed the umask value from...

33 You have changed the umask value from 231 to 423 and you now wish to restore the older value. Which command should you issue? umask 231 set umask=231 umask=231 set umask Multiple Choice: You have tried to mount /dev/sd2 to t... You have tried to mount /dev/sd2 to the /var directory but are unable to do so. Which of the following is NOT a possible reason you were unsuccessful? The directory /var did not exist. The /var directory existed but was not empty. You are not in the root account and forgot to precede the appropriate command with sudo. All of the other choices could be reasons why the command did not work. 60. Multiple Choice: You want to determine the major devic...

34 You want to determine the major device number for one of your drives. You should issue an ls - l of which directory to make this determination? /dev /drivers /devices /drives 61. Multiple Choice: You wish to set up a dual boot system... You wish to set up a dual boot system with Linux and Windows. Which boot loader should you use? GRUB Windows boot loader Windows boot loader or GRUB work equally well It depends on which versions of Windows and Linux you are installing

35 62. Multiple Choice: You wish to unmount /dev/sda1 from /e... You wish to unmount /dev/sda1 from /etc. Which of the following commands would accomplish this? sudo umount /etc sudo unmount /etc sudo umount /dev/sda1 /etc sudo unmount /dev/sda1 /etc 63. Fill in the Blank: You would like to give the user 10 se... You would like to give the user 10 seconds to choose which OS to boot to in a multiboot system. What command should you add to the appropriate configuration file to permit this?

36 Evaluation Method Exact Match timeout=10 Case Sensitivity 64. Fill in the Blank: what is the ultimate ancestor of all... Evaluation Method Exact Match Exact Match Exact Match what is the ultimate ancestor of all user processes? init the init process init process Case Sensitivity Select: All None Select by Type: Delete Points Update Hide Details

37 Consider the following command output when you answer the next questions: What command (with what arguments) was used to generate this output? : ps ef Why is netns in square brackets? : Because it is a kernel process What are the command name and the PID for the parent of the ps ef process? : bash and 1212 Someone has logged in with their own username and then su ed into the administrative account. What is their non administrative account's name? : student Chapter 5 Consider the following output: What is the process ID of the PARENT of the firefox process? : 2053 What is the name of the command that is the PARENT of the firefox process?

38 : bash Which process(es) have had either nice or renice used on it/them? : shotwell (PID 4423) and firefox (PID 4563) Which process has the least access to the CPU? : shotwell (PID 4423) Consider the following output: What was typed at the command line to generate this output? (Include any flags or arguments as well as the name of the command.) : ps fl Which process has been suspended? : shotwell (PID 4423) Chapter 6

Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of

Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of Please note that CNE 216 is a brand new course that has never been taught on the George campus; it will be taught for the first time in the fall of 2015. The materials for this course are still being developed.

More information

Permissions and Links

Permissions and Links Permissions and Links The root account Setuid and Setgid Permissions Setting Setuid and Setgid with chmod Directory Access Permissions Links o Two Types of Links o The ln command o Removing a link The

More information

Getting Started with Linux

Getting Started with Linux Getting Started with Linux For those with experience using Microsoft Windows there will be many familiar ways of operating in a Linux environment. There are also a few key differences. The main differences

More information

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1 Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make

More information

Linux basics U3A in Bath. Linux Principles. by Andy Pepperdine

Linux basics U3A in Bath. Linux Principles. by Andy Pepperdine Linux Principles by Andy Pepperdine This paper is intended to provide the reader with an understanding of the principles on which a Linux system operates and can be maintained. There is so much in the

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

Lab E2: bypassing authentication and resetting passwords

Lab E2: bypassing authentication and resetting passwords Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems

This is Worksheet and Assignment 12. Disks, Partitions, and File Systems This is Worksheet and Assignment 12 This is a combined Worksheet and Assignment.. Quizzes and tests may refer to work done in this Worksheet and Assignment; save your answers. You will use a checking program

More information

Unix as a Platform Exercises. Course Code: OS-01-UNXPLAT

Unix as a Platform Exercises. Course Code: OS-01-UNXPLAT Unix as a Platform Exercises Course Code: OS-01-UNXPLAT Working with Unix 1. Use the on-line manual page to determine the option for cat, which causes nonprintable characters to be displayed. Run the command

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

commandname flags arguments

commandname flags arguments Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

Command-line interpreters

Command-line interpreters Command-line interpreters shell Wiki: A command-line interface (CLI) is a means of interaction with a computer program where the user (or client) issues commands to the program in the form of successive

More information

PL-I Assignment Broup B-Ass 5 BIOS & UEFI

PL-I Assignment Broup B-Ass 5 BIOS & UEFI PL-I Assignment Broup B-Ass 5 BIOS & UEFI Vocabulary BIOS = Basic Input Output System UEFI = Unified Extensible Firmware Interface POST= Power On Self Test BR = Boot Record (aka MBR) BC =Boot Code (aka

More information

CISC 220 fall 2011, set 1: Linux basics

CISC 220 fall 2011, set 1: Linux basics CISC 220: System-Level Programming instructor: Margaret Lamb e-mail: malamb@cs.queensu.ca office: Goodwin 554 office phone: 533-6059 (internal extension 36059) office hours: Tues/Wed/Thurs 2-3 (this week

More information

Unix Filesystem. January 26 th, 2004 Class Meeting 2

Unix Filesystem. January 26 th, 2004 Class Meeting 2 Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing

More information

CSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80

CSE 303 Lecture 2. Introduction to bash shell. read Linux Pocket Guide pp , 58-59, 60, 65-70, 71-72, 77-80 CSE 303 Lecture 2 Introduction to bash shell read Linux Pocket Guide pp. 37-46, 58-59, 60, 65-70, 71-72, 77-80 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Unix file system structure

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

UNIX File Hierarchy: Structure and Commands

UNIX File Hierarchy: Structure and Commands UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin

More information

Systems Programming/ C and UNIX

Systems Programming/ C and UNIX Systems Programming/ C and UNIX Alice E. Fischer September 6, 2017 Alice E. Fischer Systems Programming Lecture 2... 1/28 September 6, 2017 1 / 28 Outline 1 Booting into Linux 2 The Command Shell 3 Defining

More information

A Brief Introduction to the Linux Shell for Data Science

A Brief Introduction to the Linux Shell for Data Science A Brief Introduction to the Linux Shell for Data Science Aris Anagnostopoulos 1 Introduction Here we will see a brief introduction of the Linux command line or shell as it is called. Linux is a Unix-like

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017 Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built

More information

Operating Systems, Unix Files and Commands SEEM

Operating Systems, Unix Files and Commands SEEM Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs

More information

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02 Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Chapter 6. Boot time configuration. Chapter 6 Boot time configuration

Chapter 6. Boot time configuration. Chapter 6 Boot time configuration Chapter 6. Boot time configuration Chapter 6 Boot time configuration Last revised: 20/6/2004 Chapter 6 Outline In this chapter we will learn about: How the system boots How to configure the boot loaders

More information

find Command as Admin Security Tool

find Command as Admin Security Tool find Command as Admin Security Tool Dr. Bill Mihajlovic INCS-620 Operating Systems Security find Command find command searches for the file or files that meet certain condition. like: Certain name Certain

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

Welcome to Linux. Lecture 1.1

Welcome to Linux. Lecture 1.1 Welcome to Linux Lecture 1.1 Some history 1969 - the Unix operating system by Ken Thompson and Dennis Ritchie Unix became widely adopted by academics and businesses 1977 - the Berkeley Software Distribution

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Files and Directories

Files and Directories CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on

More information

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018 GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux

More information

Outline. Structure of a UNIX command

Outline. Structure of a UNIX command Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory

More information

ADVANCED LINUX SYSTEM ADMINISTRATION

ADVANCED LINUX SYSTEM ADMINISTRATION Lab Assignment 1 Corresponding to Topic 2, The Command Line L1 Main goals To get used to the command line. To gain basic skills with the system shell. To understand some of the basic tools of system administration.

More information

System Administration

System Administration Süsteemihaldus MTAT.08.021 System Administration UNIX shell basics Name service DNS 1/69 Command Line Read detailed manual for specific command using UNIX online documentation or so called manual (man)

More information

2) clear :- It clears the terminal screen. Syntax :- clear

2) clear :- It clears the terminal screen. Syntax :- clear 1) cal :- Displays a calendar Syntax:- cal [options] [ month ] [year] cal displays a simple calendar. If arguments are not specified, the current month is displayed. In addition to cal, the ncal command

More information

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage

Linux+ Guide to Linux Certification, Third Edition. Chapter 2 Linux Installation and Usage Linux+ Guide to Linux Certification, Third Edition Chapter 2 Linux Installation and Usage Objectives Install Red Hat Fedora Linux using good practices Outline the structure of the Linux interface Enter

More information

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command. Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,

More information

The Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu

The Early System Start-Up Process. Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu The Early System Start-Up Process Group Presentation by: Tianyuan Liu, Caiwei He, Krishna Parasuram Srinivasan, Wenbin Xu 1 Boot Process Booting is the initialization of a computerized system In Linux,

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised

More information

File permission u owner of file/directory (user) g group of the file/directory o other a all

File permission u owner of file/directory (user) g group of the file/directory o other a all File permission u owner of file/directory (user) g group of the file/directory o other a all Permission Types: permission octal value Meaning Read (r) 4 The file can is read only, for directory it's contain

More information

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all

More information

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System Class Meeting 2 * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System The file system is your interface to: physical

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

PESIT Bangalore South Campus

PESIT Bangalore South Campus INTERNAL ASSESSMENT TEST - 2 Date : 20/09/2016 Max Marks : 0 Subject & Code : Unix Shell Programming (15CS36) Section : 3 rd Sem ISE/CSE Name of faculty : Prof Ajoy Time : 11:30am to 1:00pm SOLUTIONS 1

More information

Linux/Citrix Virtual Environment Documentation

Linux/Citrix Virtual Environment Documentation Linux/Citrix Virtual Environment Documentation Purpose This document provides information on creating a bootable Ubuntu flash drive, customizing the interface, and using basic commands. Contents Bootable

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:

More information

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2)

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2) BANK ON & SHELL PROGRAMMING-502 (CORE PAPER-2) TOPIC 1: VI-EDITOR MARKS YEAR 1. Explain set command of vi editor 2 2011oct 2. Explain the modes of vi editor. 7 2013mar/ 2013 oct 3. Explain vi editor 5

More information

LPIC 102. be familiar with standard runlevels in a Linux system

LPIC 102. be familiar with standard runlevels in a Linux system LPIC 102 The boot process, init and runlevels 1 Aim After successfully working through this exercise, You will: be familiar with standard runlevels in a Linux system be able to rescue a system without

More information

CSE 390a Lecture 2. Exploring Shell Commands, Streams, Redirection, and Processes

CSE 390a Lecture 2. Exploring Shell Commands, Streams, Redirection, and Processes CSE 390a Lecture 2 Exploring Shell Commands, Streams, Redirection, and Processes slides created by Marty Stepp, modified by Jessica Miller & Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture

More information

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas

More information

Student Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3.

Student Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3. Student Remote Login Procedure (see picture below): 1. Start SSH Secure Shell 2. Click the computer icon (4 th on the toolbar) 3. Enter stargate.ncc.edu in the text field labeled Host Name: 4. Enter the

More information

Oracle 1Z Enterprise Linux System Administration. Download Full Version :

Oracle 1Z Enterprise Linux System Administration. Download Full Version : Oracle 1Z0-403 Enterprise Linux System Administration Download Full Version : http://killexams.com/pass4sure/exam-detail/1z0-403 B. It does not provide any protection to remote X connections. C. It allows

More information

Installation of the OS

Installation of the OS Lab 1 Installation of the OS 1.1 Objectives The goal of this first session is to install a Debian/Linux operating system from scratch on a Intel x86- based computer. The installation will be made on a

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals

More information

Presented by Bill Genske Gary Jackson

Presented by Bill Genske Gary Jackson Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,

More information

Week 2. Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands

Week 2. Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands Week 2 Exp 2 (a) (b): Introduction to LINUX OS, Installation of LINUX OS, Basic DOS commands mkdir, cd, cls, del, copy, attrib, date, path, type, format, exit. Basic commands in LINUX - cat, ls, pwd,,

More information

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,

More information

CSE 303 Lecture 4. users/groups; permissions; intro to shell scripting. read Linux Pocket Guide pp , 25-27, 61-65, , 176

CSE 303 Lecture 4. users/groups; permissions; intro to shell scripting. read Linux Pocket Guide pp , 25-27, 61-65, , 176 CSE 303 Lecture 4 users/groups; permissions; intro to shell scripting read Linux Pocket Guide pp. 19-20, 25-27, 61-65, 118-119, 176 slides created by Marty Stepp http://www.cs.washington.edu/303/ 1 Lecture

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Access Control. Steven M. Bellovin September 13,

Access Control. Steven M. Bellovin September 13, Access Control Steven M. Bellovin September 13, 2016 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

Overview of the UNIX File System

Overview of the UNIX File System Overview of the UNIX File System Navigating and Viewing Directories Adapted from Practical Unix and Programming Hunter College Copyright 2006 Stewart Weiss The UNIX file system The most distinguishing

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming IIMII 003-007303 M.C.A. (Sem.-lll) (CBCS) Examination November-20 13 CCA-3003 Operating System and LinuxlUnix programming Faculty Code: 003 Subject Code: 007303 Time: 2'/' Hoursl ITotal Marks: 70 I. Attempt

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 2 was due before class Assignment 3 will be posted soon

More information

Access Control. Steven M. Bellovin September 2,

Access Control. Steven M. Bellovin September 2, Access Control Steven M. Bellovin September 2, 2014 1 Security Begins on the Host Even without a network, hosts must enforce the CIA trilogy Something on the host the operating system aided by the hardware

More information

Chapter 1 - Introduction. September 8, 2016

Chapter 1 - Introduction. September 8, 2016 Chapter 1 - Introduction September 8, 2016 Introduction Overview of Linux/Unix Shells Commands: built-in, aliases, program invocations, alternation and iteration Finding more information: man, info Help

More information

Exam Linux-Praxis - 1 ( From )

Exam Linux-Praxis - 1 ( From  ) Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail

More information

Std: XI CHAPTER-3 LINUX

Std: XI CHAPTER-3 LINUX Commands: General format: Command Option Argument Command: ls - Lists the contents of a file. Option: Begins with minus sign (-) ls a Lists including the hidden files. Argument refers to the name of a

More information

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find

More information

Introduction to the UNIX command line

Introduction to the UNIX command line Introduction to the UNIX command line Steven Abreu Introduction to Computer Science (ICS) Tutorial Jacobs University s.abreu@jacobs-university.de September 19, 2017 Overview What is UNIX? UNIX Shell Commands

More information

Unix System Architecture, File System, and Shell Commands

Unix System Architecture, File System, and Shell Commands Unix System Architecture, File System, and Shell Commands Prof. (Dr.) K.R. Chowdhary, Director COE Email: kr.chowdhary@iitj.ac.in webpage: http://www.krchowdhary.com JIET College of Engineering August

More information

CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL

CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL CompTIA Linux+/LPIC-1 COPYRIGHTED MATERIAL Chapter System Architecture (Domain 101) THE FOLLOWING COMPTIA LINUX+/LPIC-1 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER: 101.1 Determine and Configure hardware

More information

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9 File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations

More information