Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
Linux administration classes in mumbai
best Linux administration classes in mumbai with job assistance.
our features are:
expert guidance by it industry professionals
lowest fees of 5000
practical exposure to handle projects
well equiped lab
after course resume writing guidance
Linux Tutorial For Beginners | Linux Administration Tutorial | Linux Commands...Edureka!
This Linux Tutorial will help you get started with Linux Administration. This Linux tutorial will also give you an introduction to the basic Linux commands so that you can start using the Linux CLI. Do watch the video till the very end to see all the demonstration. Below are the topics covered in this tutorial:
1) Why go for Linux?
2) Various distributions of Linux
3) Basic Linux commands: ls, cd, pwd, clear commands
4) Working with files & directories: cat, vi, gedit, mkdir, rmdir, rm commands
5) Managing file Permissions: chmod, chgrp, chown commands
6) Updating software packages from Linux repository
7) Compressing & Decompressing files using TAR command
8) Environment variables and Regular expressions
9) Starting and killing processes
10) Managing users
11) SSH protocol for accessing remote hosts
Linux administration classes in mumbai
best Linux administration classes in mumbai with job assistance.
our features are:
expert guidance by it industry professionals
lowest fees of 5000
practical exposure to handle projects
well equiped lab
after course resume writing guidance
Red Hat Linux Certified Professional step by step guide Tech ArkitRavi Kumar
Introduction to course outline and certification
Managing files & directories
Basic Commands ls, cp, mkdir, cat, rm and rmdir
Getting help from using command line (whatis, whereis, man, help, info, –help and pinfo)
Editing Viewing of text files (nano, vi and vim)
User Administration Creating, Modifying and Deleting
Controlling services & daemons
Listing process
Prioritize process
Analyze & storing logs
Syslog Server & Client configuration
Compressing files & directories (tar and zip)
Copying files & directories to remote servers
Yum & RPM
Search files and directories
File & Directory links (Soft Links and Hard Links)
Managing of physical storage
Logical Volume Manager
Access Control List (ACL)
Scheduling of future Linux tasks
SELinux
NFS Server and Client configuration
Firewall
Securing the NFS using kerberos
LDAP client configuration
Setting UP ldap users home directory
Accessing the network storage using (CIFS) samba
Samba Multiuser Access
Using Virtualized systems
Creating virtual Machines
Automated installation of Redhat Linux
Automated Installation using Kickstart
Linux Booting Process
Root password Recovery
Fixing Partition Errors – Using Enter into Emergency Mode
Using Regular Expressions with grep
Understand and use essential tools for handling files, directories, command-line environments, and documentation
Operate running systems, including booting into different run levels, identifying processes, starting and stopping virtual machines, and controlling services
Configure local storage using partitions and logical volumes
Create and configure file systems and file system attributes, such as permissions, encryption, access control lists, and network file systems
Deploy, configure, and maintain systems, including software installation, update, and core services
Manage users and groups, including use of a centralized directory for authentication
Manage security, including basic firewall and SELinux configuration
Configuring static routes, packet filtering, and network address translation
Setting kernel runtime parameters
Configuring an Internet Small Computer System Interface (iSCSI) initiator
Producing and delivering reports on system utilization
Using shell scripting to automate system maintenance tasks
Configuring system logging, including remote logging
Configuring a system to provide networking services, including HTTP/HTTPS, File Transfer Protocol (FTP), network file system (NFS), server message block (SMB), Simple Mail Transfer Protocol (SMTP), secure shell (SSH) and Network Time Protocol (NTP)
Overview of how containers are implemented with cgroups, namespaces and UnionFS, how images are created, how images and containers are related to one another, and how to build effective images
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
POS 433 Inspiring Innovation/tutorialrank.com
1. POS 433 Assignment Unix Linux vs Windows Security and
administration (1000 Words)
For more course tutorials visit
www.tutorialrank.com
POS 433 Assignment Unix Linux vs Windows Security and
administration (1000 Words)
===============================================
POS 433 Assignment Unix Linux vs Windows Security and
administration (1000 Words)
For more course tutorials visit
www.tutorialrank.com
POS 433 Assignment Unix Linux vs Windows Security and
administration (1000 Words)
===============================================
POS 433 Discussion Different Version of Unix
2. For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
Attachments: POS 433 Discussion Different Version of Unix.docx [
Preview Here ]
DescriptionReviews (0)
What are some of the different versions of Unix? Why is it important to
have different versions of Unix?
===============================================
POS 433 Discussion Scripting in Programming
3. For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
Write a short essay discussing when scripting should be taught to
individuals who are learning software programming. Discuss the
advantages and disadvantages of doing so at specific times in their
learning process.
===============================================
POS 433 Discussion Terminating a Process
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
4. Write a 200- to 300-word response that discusses the different reasons
for terminating a process and the commands used for this purpose.
===============================================
POS 433 Discussion Unix Permissions
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
Write a 200- to 300-word response in which you provide and explain
some of the different file permissions available within UNIX®. Include
how certain settings can help increase the security of the system.
===============================================
POS 433 Week 1 UNIX and Linux Comparison Matrix
(New Syllabus)
5. For more course tutorials visit
www.tutorialrank.com
Unix® and Linux® Comparison Matrix
1. Name three versions of Unix
1. HPUX
2. AIX
3. Solaris
2. Name three versions of Linux
1. Red Hat Enterprise Linux
2. Suse Linux Enterprise Server
3. Ubuntu
3. Describe 3 major differences between Unix and Linux
1. Licensing; Linux is all GPL, while UNIX varied between
commercial and BSD license
6. 2. Users: Linux originally developed for home users while UNIX was
developed for servers.
3. Filesystem: Standard FS on Linux is EXT(3/4) while varies on
UNIX from JFS2 to UFS2 to ZFS.
4. Linux, technically, is not an OS, UNIX is. Linux is a kernel,
surrounded by packages.
4. Which of the following is not a UNIX or Linux variant
a. SunOS
b. RedHat
c. DOS
d. HP-UX
e. Debian
Technically I think you want C: DOS, though I would argue that DOS is
a ripoff of CP/M which itself was very much akin to UNIX.
5. Use the command to change directory locations.
a. cd
b. rm
c. mkdir
d. cut
A: cd
7. 6. Use the command to delete a directory.
a. delete_dir
b. mkdir
c. rmdir
d. cat
C: rmdir, though this will only work if the directories are empty. Rm –
rfdir works otherwise.
7. Which of the following are text editors? (Choose all that apply.)
a. vi
b. emacs
c. ls
d. cat
A and B : Though why anyone would choose emacs over vi is beyond
me. ls lists dirs., and cat displays a file, but you specified ‘editor’.
8. The command creates a directory named winchester in the root
directory.
a. mkdir /winchester
b. mkdir ../Winchester
c. mkdir winchester
8. d. md /Winchester
A. / specifies root, and UNIX is case sensitive.
9. The command allows you to change directory locations to a child
directory named child1.
a. mkdir ƒ child1
b. cdƒ ../ child1
c. cd child1
d. cdƒ /
C:. Obviously.
10. The command that deletes a file.
a. rmdir
b. cd
c. rm
d. pwd
C: The only one that is for file removal.
11. The command displays your present working directory.
a. cat
b. cd
9. c. touch
d. pwd
D: pwd.
12. The system directory contains the Linux kernel.
a. /boot
b. /root
c. /dev
d. /var
A: /boot, generally.
13. The in the vi editor allows you to save and quit the program.
a. :wq
b. q!
c. w!
d. !
A: write then quit.
14. The command to rename a file is .
a. mv
b. cp
10. c. del
d. rename
A: mv and D: rename which has been available since 2000.
15. The command to make a duplicate of a file.
a. mv
b. cp
c. del
d. rename
B: cp, for copy.
16. In vi, the command to change to insert mode is:
a. o
b. O
c. i
d. d
C: i. which inputs text before the cursor and B: O works as well to insert
a newline before current line, and A: o for newline after current line.
17. In vi, the command to remove a character is:
a. o
11. b. O
c. i
d. x
D: x.
===============================================
POS 433 Week 1 UNIX® and Linux® Comparison
Matrix
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 1 UNIX® and Linux® Comparison Matrix
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course, independent student reading, and research.
12. Complete the “Choosing UNIX Shells” module in the SkillSoft course,
“UNIX Fundamentals: Shell Scripting Basics.”
UNIX® and Linux® Comparison Matrix located on the student website.
Unix® and Linux® Comparison Matrix
13. Directions: Choose three different versions of the UNIX® or Linux®
operating systems to compare. Insert the three chosen versions and fill
out the requested information in the Components column.
UNIX® or Linux® operating system version: <Insert your chosen
version>
Components Your response
14. Role of shell
Three features and roles of each feature
Comments on security
Comments on administration
Comments on networking
Comments on performance
Comments on programmability
Other
15. UNIX® or Linux® operating system version: <Insert your chosen
version>
Components Your response
Role of shell
Three features and roles of each feature
Comments on security
Comments on administration
Comments on networking
16. Comments on performance
Comments on programmability
Other
UNIX® or Linux® operating system version: <Insert your chosen
version>
Components Your response
17. Role of shell
Three features and roles of each feature
Comments on security
Comments on administration
Comments on networking
Comments on performance
Comments on programmability
Other
===============================================
POS 433 Week 2 File Processing Commands Worksheet
18. For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 2 File Processing Commands Worksheet
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course, independent student reading, and research.
§ Complete the “navigate a filesystem, create a file, set permissions,
create and delete files, and assign ownership and permissions” modules
in the SkillSoft course, “Working with UNIX Files and Directories.”
File Processing Commands Worksheet located on the student website.
19. File Processing Commands Worksheet
§ What UID and PID have the highest amount of physical memory a
process has used and is not swapped out?
§
§ Show all processes and full output.
§ If using a long listing and no process modifiers, what is the swap
space amount for the bash command?
§ When using top command, what command would you use to kill a
process?
§ If you were not using top command, what command would you use to
kill a process?
§ What command would you use to manually mount the standard CD-
ROM device /dev/db1 at /media/disk?
20. § What command would you use to display the amount of available disk
space on /dev/db1 in a human readable form?
§ Type in the command grep – – help to access the help manual. Using
this information and the information from the text, how would you write
a command to find the pattern 111 in a file called txt?
===============================================
POS 433 Week 2 Learning Team UNIX®, Linux®, and
Windows Server® Critique and Presentation
Preparation Part I
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 2 Learning Team UNIX®, Linux®, and Windows
Server® Critique and Presentation Preparation Part I
21. Instructions
Develop a plan for completing the Week Five Learning Team
assignment.
Submit the plan to the instructor.
Determine what research is needed to complete the written critique and
presentation due in Week Five.
Assign at least one research component to each team member.
===============================================
POS 433 Week 2 Linux Directory Log (New Syllabus)
For more course tutorials visit
www.tutorialrank.com
Here is the assignment:
1. Open a terminal and show the log how you create the following: (5
marks)
22. A. Create 2 directories under your home, account1 and account2
B. Change your directory to account1
C. Create 2 directories called checking1 and savings1
D. Go to checking1 directory
E. Using touch command, create two files c1.dat and c2.dat
F. Change your directory to savings1 using relative path
G. Using touch command, create two files s1.dat and s2.dat
H. Go to your home directory
I. Change your directory to account2
J. Create 2 directories called checking2 and savings2
K. Go to checking2 directory
L. Using touch command, create two files c3.dat and c4.dat
M. Change your directory to savings2 using relative path
N. Using touch command, create two files s3.dat and s4.dat
O. Change to account1 directory
2. Show the commands for the following. (5 Marks)
(Each carries 1 mark from A to E and in each one mark, ½ is for the
command and ½ for the output)
23. A. You are now in account1 directory. Copy s1.dat to this directory
using relative path. Show the new file that copied with ls command
from this directory. Do not change the directory.
Ans:
B. Move c1.dat to savings1 directory using relative path as s1.dat.
Show s1.dat with ls command from this directory. Do not change
the directory.
Ans :
C. Change your directory to savings2 using absolute path. Show the
current directory after you changed.
Ans:
D. Copy c2.dat to your sibling directory, checking2 using relative
path (Sibling directories have same parent) (Also do not use ~ ).
Show c2.dat with ls command from this directory, do not change
the directory .
Ans:
E. Move s4.dat to savings1 directory using absolute path. Show s4.dat
with ls command from this directory, do not change directory
Ans:
===============================================
POS 433 Week 2 Linux® Directory Log
24. For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 2 Linux® Directory Log
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course above, independent student reading, and research.
Linux® Directory Log located on the student website.
Linux® Directory Log
25. To: <Insert your facilitator’s name>
From: <Insert your name>
Date: <Insert the date (XX/XX/XXXX)>
Directions: As you complete each of the following steps, keep track of
what occurs at each point, including what you type, the output given,
and if you experience any errors. Record the occurrences in the
following matrix.
1. Open a terminal.
2. Create a new group called mygroup. Hint: /usr/sbin/groupadd.
26. 3. Create a new folder and name it your first name.
4. Get a directory listing of the home folder using the long listing
format.
5. Modify the permissions on your new folder to set read, write, and
execute permissions for the user and group.
6. Get a directory listing of the new folder using the long listing and
human readable format. (ls –lh)
27. 7. Use Gedit or VI to create two files (txt and myfile2.txt) and save
them in the new folder. Add a paragraph of your own liking to each file.
8. Get a regular format directory listing of the new folder.
9. Change the ownership of txt so the owner is mygroup and the
group is mygroup.
10. Get a directory listing of the new folder using the long listing and
human readable format.
11. Change the permissions on txt using the following: user:read and
write, group:read and write, and owner: read, write, and execute. Set the
sticky bit. Use Octal s to set these.
28. 12. Get a directory listing of the new folder using the long listing and
human readable format.
===============================================
POS 433 Week 3 File Processing Commands Worksheet
(New Syllabus)
For more course tutorials visit
www.tutorialrank.com
1. I am now in $HOME/sales/east directory. I want to have my login
shell display me today’s date whenever I login every time by telnet.
For this, what steps I have to do? (1/2)
A. $ vi .profile
Type one line : echo "Today’s date is `date`"
$ chmod +x .profile
$ . .profile
29. B. $ cd ../..
$ vi .profile
Type one line : echo "Today’s date is `date`"
$ export .profile
$ .profile
C. $ cd $HOME
$ vi .profile
Type one line : echo "Today’s date is `date`"
$ . .profile
D. $ vi ~/.profile
Type one line : echo "Today’s date is "date"
$ . .profile
Ans:
2A. Why I am getting this error when I assign like this ? (1/2)
$ FIRST-NAME=smith
ksh: FIRST-NAME=smith: not found.
Ans:
30. 2B. Under ksh or bash shell environments, what is the problem here ?
(1/2)
$ export PATH=/usr/bin /usr/local/bin /usr/ucb/bin
Ans:
3. Executing cp temp/temp1 temp1.txt it will result in... (1/2)
A. Error since the same filename is used
B. Error since an extension is used for the second temp1
C. It will move the contents of temp1 from directory temp to temp1 of
current directory and when finished it will erase the contents of temp1
of temp directory
D. It will copy temp1 from directory temp to temp1.txt of current
directory
Ans :
4. What kind of files will be matched by the following when you list by
ls command: (3)
For Ex :
$ ls [a-z][0-9]
Ans : This matches any file with 2 characters, first being a lower case
letter and the second being a number from 0 to 9
31. A. ls [0-9][a-z][0-9][A-Z] -- Note : there are no
spaces anywhere.
Ans:
B. ls [A-Z0-9_][A-Za-z_0-9] -- Note : there are no spaces
anywhere.
Ans:
C. ls [0-9]Z[0-9]
Ans:
5. What is the command to list files in a directory: (2)
A. Having only three alphabets:
Ans:
B. Starting with a digit and ending with a digit
Ans:
6. There are many C programs in my directory which have an extension
of .c (ex :first.c, second.cetc).
How can I concatenate all C files into one file called "myC_files (1)
32. Ans :
7. How do you sort first 15 lines in a file called 'datafile" ? (1) (You
need to use a pipe)
Ans:
8. How do you add a line to the end of an existing file "myfile" with date
stamp. (1)
Ans :
===============================================
POS 433 Week 3 Learning Team UNIX®, Linux®, and
Windows Server® Critique and Presentation
Preparation Part II
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
33. POS 433 Week 3 Learning Team UNIX®, Linux®, and Windows
Server® Critique and Presentation Preparation Part II
Instructions
Review the results from the Learning Team to ensure that all elements of
the assignment have been fully researched.
Complete and submit the outline of the final Learning Team paper.
Begin developing the rough draft of the critique due in Week Five.urse
===============================================
POS 433 Week 3 Linux® Script Worksheet
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
34. POS 433 Week 3 Linux® Script Worksheet
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course, independent student reading, and research.
Complete the SkillSoft course, “UNIX Fundamentals: Shell Scripting
Basics” (ID:lu_unix_a02_it_enus)
Linux® Script Worksheet located on the student website.
Linux® Script Worksheet
To: <Insert your facilitator’s name>
35. From: <Insert your name>
Date: <Insert the date (XX/XX/XXXX)>
Before beginning the Linux® Script Worksheet, update the PATH
variable to add your folder from last week. You will find how to do this
on p. 134 of Linux® Command Line and Shell Scripting Bible.
Linux® Script 1
Requirements
In the same folder as last week, create a new file titled
week3prog1[name].scr.
36. Change the permissions on this new file to add the execute bit for user,
group, and owner.
Edit your new file using Gedit or VI and change it so it performs the
following actions:
• Display the date.
• Display the words Hello World.
• Display information about users that are currently logged in.
Note. Remember to include #!/bin/bash as the first line of your script.
37. Save the file and type your file name to execute.
Source Programs
<Insert your source code here.>
Output Results
<Insert the output here. Use a screenshot of the output with the input
requirements specified in the assignment.>
Linux® Script 2
Requirements
38. In the same folder as last week, create a new file called
week3prog2[name].scr.
Change the permissions on this new file to add the execute bit for user,
group, and owner.
Edit your new file using Gedit or VI and change it so it performs the
following actions:
• Using a line after #!/bin/bash, take the output of the ps –e
command and pipe it to the sort command.
• After it has been piped to the sort command, redirect that output
to a file called psfile.
39. Note. Remember to include #!/bin/bash as the first line of your script.
Source Programs
<Insert your source code here.>
Output Results
<Insert the output here. Use a screenshot of the output with the input
requirements specified in the assignment.>
Linux® Script 3
Requirements
In the same folder as last week, create a new file called
week3prog3[name].scr.
40. Change the permissions on this new file to add the execute bit for user,
group, and owner.
Create two files.
• File1 has one line with the value of 5.
• File2 has one line with the value of 100.
Edit your new file using Gedit or VI and change it so it performs the
following actions:
• Read the values from the two files above (file1 and file2).
41. • Divide the value from file2 by the value in file1.
• Output the result of this calculation to a new file called file3.
Note. Remember to include #!/bin/bash as the first line of your script.
Source Programs
<Insert your source code here.>
Output Results
<Insert the output here. Use a screenshot of the output with the input
requirements specified in the assignment.>
===============================================
42. POS 433 Week 4 File Processing Commands Worksheet
(New Syllabus)
For more course tutorials visit
www.tutorialrank.com
1. How do you know how many number of users currently logged into
the system? (Not considering if any user is logged more than one time)
(1)
A. who | uniq | sort | wc -l
B. who | cut -d' ' –f1 | uniq | wc -l
C. who | sort | uniq | wc -l
D. who | cut -d' ' –f1 | sort -u | wc -l
E. who | cut -d' ' –f1 | uniq -d | wc -l
Ans:
2. Create a file “employees.txt” using vi editor or pico.
(The file will have 6 fields, ID, Name, Designation, Dept, D.O.B, Salary
separated by pipe)
Enter these lines in the file and save it.
2133|charles smith |Manager|sales|12/12/56| 90000
9576|Rob Thomson|director |production|03/12/50|130000
5778|David Blake |General Manager|marketing |04/19/43| 85000
2765|Rick Martin|director|personnel |05/11/47|120000
43. (Use cut command for the following questions A,B)
(in each one mark, ½ is for the command and ½ for the output)
A. Display the person's name, his designation and salary in the above
file.
Show the command and output
Ans:
B: Display first 20 characters on each line in the above file.
Show the command and output
Ans:
3. How do you display the hour and minute from date command using
cut utility (1)
Show the command and output
( ½ is for the command and ½ for the output)
Ans:
4. What is the difference between the following commands? (1)
$ who | grep 'mary'
and
$ who | grep '^mary'
Ans:
5. We know that all user information is stored in /etc/passwd where
44. fields are delimited by a colon. Display only their userids using cut
command. (userid is the first field in /etc/passwd file) Show only top 10
userids. (1)
Show the command and output
( ½ is for the command and ½ for the output)
Ans:
6. Create the following four files chapter1, chapter2, chapter3, chapter4
in your current directory and enter the following text:
Chapter1 :
This is the first line in this file
This chapter deals with the basic information of a UNIX system.
Chapter2 :
This is the first line in this file
This chapter deals with Unix System info and shell introduction.
Chapter3 :
This is the first line in this File System
This chapter deals with various Unix Systems.
Chapter4 :
This is the first line in this file
This chapter deals with kernel system.
45. The question is to search for a string "System" or "system" in the above
files. Use wild cards in both pattern and file searching. (1)
Show the command and output
( ½ is for the command and ½ for the output)
Ans:
7. Show these commands and output:
A. Redirect man pages of ‘find’ command to a file called,
find_manpages in /tmp directory.
B. Display lines not having the word “version” in the above file.(1)
(½ is for the command and ½ for the output)
Ans:
8. Which command of the following is correct ? (Some may work but
does not make sense). (1)
a. cat file file> file3 | wc -l
b. cut -d ":" filename
c. ls -l | grepunixmyfile
d. head filename | tail
e. find name "myfile.txt" -print
9. We know that ls -l command shows all the files in the current
directory. How do you display only the directories, not files in the
current directory. (You have to use ls command, but not find command)
(1)
Ans:
46. 10. How do you set only read permissions to user, group and others in
octal mode for a file "myfile.txt" ? (1)
Ans:
11. You observed that some of your group members are fiddling with
your file "myfile" and you wanted to remove the read permission to
your group. How do you do? (1)
Ans:
12. Here is the long listing of a file.
-rw-rw-rw- 2 Y435678 odms 22 Sep 02 12:03 myfile.txt
Is the above a file or a directory? To which group does it belong? (1)
Regular file, Y435678
file, Y435678
file, odms
directory, odms
directory, Y435678
Ans :
13. Here is another long listing of a file. (1)
47. -rw-r----- 1 Y435678 odms 20 Sep 02 17:03 file.txt.
What are the owner permissions?
read, execute
read, write
write, execute
all since s/he is the owner
Ans:
14. The file users_data has the following contents : (1)
Tom Smith 7.00 15 105.00
Rob Sheryl 8.00 20 160.00
Ken Bradman 7.00 13 91.00
Peter Smith 6.00 15 90.00
Dennis Smith 8.00 13 104.00
Tom Dave 9.00 12 108.00
How do you sort the above file and redirect the output to another file
called sortedusers
Ans :
15. How do you list only duplicate lines in a file "myfile" (1)
Ans :
===============================================
48. POS 433 Week 4 Learning Team UNIX®, Linux®, and
Windows Server® Critique and Presentation
Preparation Part III
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 4 Learning Team UNIX®, Linux®, and Windows
Server® Critique and Presentation Preparation Part III
Instructions
Continue working on your critique due in Week Five.
Complete and submit the draft of your final paper.
Begin developing the presentation due in Week Five
49. ===============================================
POS 433 Week 4 Systems Administration Scripting Log
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
POS 433 Week 4 Systems Administration Scripting Log
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course, independent student reading, and research.
Systems Administration Scripting Log located on the student website.
Systems Administration Scripting Log
50. To: <Insert your facilitator’s name>
From: <Insert your name>
Date: <Insert the date (XX/XX/XXXX)>
As you complete each of the following steps, keep track of what occurs
at each point, including what you type, the output given, and any errors
experienced. Submit this information in a log to your instructor for this
week’s assignment. Your log can use the sample format provided, or you
can create your own.
1. In the same folder as last week, create a new file titled
week4prog1[name].scr.
2. Change the permissions on this new file to add the execute bit for
user, group, and owner.
3. Run the following script:
1. #!/bin/bash
2. count=1
3. echo “start of the program”
4. while [ $count -le 10 ]
5. do
51. 1. done
2. echo “end of the program
4. Modify the program to add a trap for SIGINT and SIGTERM.
5. Save the script and then run the script in the background.
6. Use the jobs command to display a list of the jobs currently running.
7. Find the process id of the script and kill the job.
8. Check to see if you get the trap message.
9. Run the script again using the at command to schedule the job in the
future. Wait for the job to run to make sure it executes.
===============================================
POS 433 Week 5 Learning Team UNIX®, Linux®, and
Windows Server® Critique (2 Papers)
52. For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
This Tutorial contains 2 Papers
POS 433 Week 5 Learning Team UNIX®, Linux®, and Windows
Server® Critique
Instructions
Finalize and submit the UNIX®, Linux®, and Windows Server®
Critique.
===============================================
POS 433 Week 5 Learning Team UNIX®, Linux®, and
Windows Server® Presentation (2 PPT)
For more course tutorials visit
53. www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
This Tutorial contains 2 Presentations
POS 433 Week 5 Learning Team UNIX®, Linux®, and Windows
Server® Presentation
Instructions
Finalize and submit the UNIX®, Linux®, and Windows Server®
Presentation
===============================================
POS 433 Week 5 Linux Script Worksheet (New Syllabus)
For more course tutorials visit
www.tutorialrank.com
54. Linux® Script 1 (2 Marks)
Requirements
Create a new file called week5prog1.sh with vi or pico editor.
Edit your new file using VI and change it so it performs the following
actions:
Display the date
Display your system information using “uname –a “ command
Display your username and id using “id” command
Display your current directory
Save the file and type your file name to execute.
Source Programs:
Insert your source code here.
$ cat week5prog1.sh
Output Results:
Insert the output here. Use a screen shot of the output with input
requirements specified in the assignment.
55. 1. Give execute permission to the user, group only
Run the script and show the output here
Linux® Script 2 (2 Marks)
Requirements
Create a new file called week5prog2.sh with vi or pico editor.
Edit your new file using VI and change it so it performs the following
actions:
• Display the date
• Display your system information using “uname –a “
command
• Display your username and id using “id” command
• Change your directory /tmp
• Display your current directory
• Search Mary in the passwd file in /etc directory
• If the search is success, display that Mary is an user in this
system
• Otherwise display that Mary is not in the system
You need to use “grep”, “if” , “else” “$?”
56. Linux® Script 3 (3 Marks)
Requirements
Here is the question:
Some commands like cp, mv, mkdir need arguments. Similarly this
script needs only two arguments. If user enters no arguments or one
argument or three or more than 3 arguments, it displays error message
like “You need to enter two arguments “ If user enters two arguments, it
displays the arguments in reverse order .
Create a new file called week5prog3.sh with vi or pico command
Edit your new file using vi and write the script: Create a new file called
week5prog3.sh with vi or pico command.
• Display the date
• Display your system’s host name “hostname “ command
• Display your username using system variable “USER”
• If user enters no arguments or one argument or three or more
than 3 arguments, it displays error message like “You need to enter two
arguments “
• If user enters two arguments, it displays the arguments in
reverse order .
57. Linux® Script 4 (3 Marks)
Requirements
Create a new file called week5prog4.sh with vi or pico editor
Here is the question:
Write a program which displays 4 options to the user and asks the user
to enter one option and displays the output depending on the choice. If
the user enters any other character, display error message that he has to
enter only a, b, c or d
a. Current date and time
b. No of users currently logged in
c. List of directories in PATH variable
d. Your login name using “LOGNAME” variable
(hint : Use the case statement and read the option with read command)
Source Programs:
Insert your source code here.
$ cat week5prog4.sh
Output Results:
58. Insert the output here. Use a screen shot of the output with input
requirements specified in the assignment.
1. Give execute permission to the user, group only
2. Run the script and show the output here with the following inputs
each time when the scripts prompts like
1st Run : Enter an option : a
2nd Run : Enter an option : b
3rd Run : Enter an option : c
4th Run : Enter an option : d
5th Run : Enter an option : x
===============================================
POS 433 Week 5 UNIX® Networking (1 Paper and 1
PPT)
For more course tutorials visit
www.tutorialrank.com
Tutorial Purchased: 4 Times, Rating: A+
59. This Tutorial contains 1 Paper and 1 Presentation
POS 433 Week 5 UNIX® Networking
Instructions
Assignment Preparation: Activities include completing the SkillSoft
course, independent student reading, and research.
§ Complete the “File Sharing with NFS and Samba” modules in the
SkillSoft course, “UNIX Fundamentals: Network Administration.”
Assignment: Find a current article about UNIX® Networking. Write a 1-
2 page paper discuss the article and its relevance to the course
===============================================