SlideShare a Scribd company logo
1 of 2
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 - LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q. 1. Draw and explain different layers of Linux Operating System.
Answer:Conceptually, the Linux operating system is similar to an onion. It consists of many layers,
one on top of the other. At the very core is the interface with the hardware. The operating system
must know how to communicate with the hardware or nothing can get done. This is the most
privileged aspect of the operating system.
Because it needs to access the hardware
Q. 2. What are run levels? Explain in detail.
Answer:Runlevel isamode of operationin one of the computer operating systems that implement
Unix SystemV-style initialization.Conventionally,sevenrunlevels exist, numbered from zero to six;
though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a
synonymforone of the levels.Onlyone runlevel isexecutedonstartup;run levels are not executed
one afteranother,i.e.eitherthe runlevel 2, 3 or 4 is executed, not more of them sequentially or in
any other order.
Q. 3. Describe the following:
a) File encryption
Answer: File Encryption means providing security for files that reside on media, in a stored state.
Those are files that are resting on our hard drives, usb drives or any other type of digital media
storage. Those are files that are usually not meant to be sent through network, they are stored
locally, being encrypted and temporarily
b) Email encryption
Answer: Email encryptionisencryptionof email messagestoprotectthe contentfrombeingread by
otherentitiesthanthe intendedrecipients.Email encryptionmayalsoinclude authentication. Email
is prone to disclosure of information. Most emails are currently transmitted in the clear (not
encrypted).Bymeansof some availabletools,personsotherthanthe designatedrecipientscan read
the email contents. Email
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601

More Related Content

Similar to Mca3030 linux os

M11Cde Skills-Based Assessment
M11Cde Skills-Based AssessmentM11Cde Skills-Based Assessment
M11Cde Skills-Based Assessment
Megan Jones
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network security
smumbahelp
 

Similar to Mca3030 linux os (20)

Bnt201 operating system
Bnt201  operating systemBnt201  operating system
Bnt201 operating system
 
Mca2050 computer architecture
Mca2050  computer architectureMca2050  computer architecture
Mca2050 computer architecture
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Mit201– operating system
Mit201– operating systemMit201– operating system
Mit201– operating system
 
Mc0085 advanced operating systems (distributed
Mc0085  advanced operating systems (distributedMc0085  advanced operating systems (distributed
Mc0085 advanced operating systems (distributed
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systems
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
M11Cde Skills-Based Assessment
M11Cde Skills-Based AssessmentM11Cde Skills-Based Assessment
M11Cde Skills-Based Assessment
 
Bca winter 2013 2nd sem
Bca winter 2013 2nd semBca winter 2013 2nd sem
Bca winter 2013 2nd sem
 
Bt0062 fundamentals of it-de
Bt0062 fundamentals of it-deBt0062 fundamentals of it-de
Bt0062 fundamentals of it-de
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
Bc0056 unix operating system
Bc0056   unix operating systemBc0056   unix operating system
Bc0056 unix operating system
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network security
 
Mca winter 2013 2nd sem
Mca winter 2013 2nd semMca winter 2013 2nd sem
Mca winter 2013 2nd sem
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Mca3030 linux os

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER THIRD SUBJECT CODE & NAME MCA3030 - LINUX OS CREDIT 2 BK ID B1563 MAX. MARKS 30 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q. 1. Draw and explain different layers of Linux Operating System. Answer:Conceptually, the Linux operating system is similar to an onion. It consists of many layers, one on top of the other. At the very core is the interface with the hardware. The operating system must know how to communicate with the hardware or nothing can get done. This is the most privileged aspect of the operating system. Because it needs to access the hardware Q. 2. What are run levels? Explain in detail. Answer:Runlevel isamode of operationin one of the computer operating systems that implement Unix SystemV-style initialization.Conventionally,sevenrunlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonymforone of the levels.Onlyone runlevel isexecutedonstartup;run levels are not executed one afteranother,i.e.eitherthe runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order. Q. 3. Describe the following: a) File encryption Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media
  • 2. storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily b) Email encryption Answer: Email encryptionisencryptionof email messagestoprotectthe contentfrombeingread by otherentitiesthanthe intendedrecipients.Email encryptionmayalsoinclude authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted).Bymeansof some availabletools,personsotherthanthe designatedrecipientscan read the email contents. Email Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601