SlideShare a Scribd company logo
1 of 2
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 - LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
Q. 1. Draw and explain different layers of Linux Operating System.
Answer:Conceptually, the Linux operating system is similar to an onion. It consists of many layers,
one on top of the other. At the very core is the interface with the hardware. The operating system
must know how to communicate with the hardware or nothing can get done. This is the most
privileged aspect of the operating system.
Because it needs to access the hardware
Q. 2. What are run levels? Explain in detail.
Answer:Runlevel isamode of operationin one of the computer operating systems that implement
Unix SystemV-style initialization.Conventionally,sevenrunlevels exist, numbered from zero to six;
though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a
synonymforone of the levels.Onlyone runlevel isexecutedonstartup;run levels are not executed
one afteranother,i.e.eitherthe runlevel 2, 3 or 4 is executed, not more of them sequentially or in
any other order.
Q. 3. Describe the following:
a) File encryption
Answer: File Encryption means providing security for files that reside on media, in a stored state.
Those are files that are resting on our hard drives, usb drives or any other type of digital media
storage. Those are files that are usually not meant to be sent through network, they are stored
locally, being encrypted and temporarily
b) Email encryption
Answer: Email encryptionisencryptionof email messagestoprotectthe contentfrombeingread by
otherentitiesthanthe intendedrecipients.Email encryptionmayalsoinclude authentication. Email
is prone to disclosure of information. Most emails are currently transmitted in the clear (not
encrypted).Bymeansof some availabletools,personsotherthanthe designatedrecipientscan read
the email contents. Email
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601

More Related Content

Similar to Mca3030 linux os

Bnt201 operating system
Bnt201  operating systemBnt201  operating system
Bnt201 operating systemsmumbahelp
 
Mca2050 computer architecture
Mca2050  computer architectureMca2050  computer architecture
Mca2050 computer architecturesmumbahelp
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNAFaisalMashood
 
Mit201– operating system
Mit201– operating systemMit201– operating system
Mit201– operating systemsmumbahelp
 
Mc0085 advanced operating systems (distributed
Mc0085  advanced operating systems (distributedMc0085  advanced operating systems (distributed
Mc0085 advanced operating systems (distributedsmumbahelp
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd semsmumbahelp
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systemssmumbahelp
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networkssmumbahelp
 
M11Cde Skills-Based Assessment
M11Cde Skills-Based AssessmentM11Cde Skills-Based Assessment
M11Cde Skills-Based AssessmentMegan Jones
 
Bca winter 2013 2nd sem
Bca winter 2013 2nd semBca winter 2013 2nd sem
Bca winter 2013 2nd semsmumbahelp
 
Bt0062 fundamentals of it-de
Bt0062 fundamentals of it-deBt0062 fundamentals of it-de
Bt0062 fundamentals of it-desmumbahelp
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networksStudy Stuff
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management systemStudy Stuff
 
Bc0056 unix operating system
Bc0056   unix operating systemBc0056   unix operating system
Bc0056 unix operating systemsmumbahelp
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network securitysmumbahelp
 
Mca winter 2013 2nd sem
Mca winter 2013 2nd semMca winter 2013 2nd sem
Mca winter 2013 2nd semsmumbahelp
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networkssmumbahelp
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networkssmumbahelp
 

Similar to Mca3030 linux os (20)

Bnt201 operating system
Bnt201  operating systemBnt201  operating system
Bnt201 operating system
 
Mca2050 computer architecture
Mca2050  computer architectureMca2050  computer architecture
Mca2050 computer architecture
 
System and Network Administration/ SNA
System and Network Administration/ SNASystem and Network Administration/ SNA
System and Network Administration/ SNA
 
Mit201– operating system
Mit201– operating systemMit201– operating system
Mit201– operating system
 
Mc0085 advanced operating systems (distributed
Mc0085  advanced operating systems (distributedMc0085  advanced operating systems (distributed
Mc0085 advanced operating systems (distributed
 
Bsc it winter 2013 2nd sem
Bsc it  winter 2013 2nd semBsc it  winter 2013 2nd sem
Bsc it winter 2013 2nd sem
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Mi0035 computer networks
Mi0035 computer networksMi0035 computer networks
Mi0035 computer networks
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systems
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
M11Cde Skills-Based Assessment
M11Cde Skills-Based AssessmentM11Cde Skills-Based Assessment
M11Cde Skills-Based Assessment
 
Bca winter 2013 2nd sem
Bca winter 2013 2nd semBca winter 2013 2nd sem
Bca winter 2013 2nd sem
 
Bt0062 fundamentals of it-de
Bt0062 fundamentals of it-deBt0062 fundamentals of it-de
Bt0062 fundamentals of it-de
 
Mi0035 computer networks
Mi0035   computer networksMi0035   computer networks
Mi0035 computer networks
 
Mi0034 database management system
Mi0034   database management systemMi0034   database management system
Mi0034 database management system
 
Bc0056 unix operating system
Bc0056   unix operating systemBc0056   unix operating system
Bc0056 unix operating system
 
Mca5042 cryptography and network security
Mca5042  cryptography and network securityMca5042  cryptography and network security
Mca5042 cryptography and network security
 
Mca winter 2013 2nd sem
Mca winter 2013 2nd semMca winter 2013 2nd sem
Mca winter 2013 2nd sem
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 

Mca3030 linux os

  • 1. Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601 ASSIGNMENT PROGRAM MCA(REVISED FALL 2012) SEMESTER THIRD SUBJECT CODE & NAME MCA3030 - LINUX OS CREDIT 2 BK ID B1563 MAX. MARKS 30 Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme. Q. 1. Draw and explain different layers of Linux Operating System. Answer:Conceptually, the Linux operating system is similar to an onion. It consists of many layers, one on top of the other. At the very core is the interface with the hardware. The operating system must know how to communicate with the hardware or nothing can get done. This is the most privileged aspect of the operating system. Because it needs to access the hardware Q. 2. What are run levels? Explain in detail. Answer:Runlevel isamode of operationin one of the computer operating systems that implement Unix SystemV-style initialization.Conventionally,sevenrunlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonymforone of the levels.Onlyone runlevel isexecutedonstartup;run levels are not executed one afteranother,i.e.eitherthe runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order. Q. 3. Describe the following: a) File encryption Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media
  • 2. storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily b) Email encryption Answer: Email encryptionisencryptionof email messagestoprotectthe contentfrombeingread by otherentitiesthanthe intendedrecipients.Email encryptionmayalsoinclude authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted).Bymeansof some availabletools,personsotherthanthe designatedrecipientscan read the email contents. Email Dear students get fully solved assignments Send your semester & Specialization name to our mail id : help.mbaassignments@gmail.com or call us at : 08263069601