Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
1. Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601
ASSIGNMENT
PROGRAM MCA(REVISED FALL 2012)
SEMESTER THIRD
SUBJECT CODE & NAME MCA3030 - LINUX OS
CREDIT 2
BK ID B1563
MAX. MARKS 30
Note: Answer all questions. Kindly note that answers for 10 marks questions should be
approximately of 400 words. Each question is followed by evaluation scheme.
1. List any ten commonly used commands along with their functions in Linux.
Answer: #1: top
I figured it was fitting to put the top command at the top. Although top is actually responsible for
listing currently running tasks, it is also the first command Linux users turn to when they need to
know what is using their memory (or even how much memory a system has). I often leave the top
tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will
evenopenupa terminal (usuallyaterm),place the window where Iwantit,and thenhide the border
of the window. Without a border, the terminal can't be
2. Describe about Run levels. Explain different run levels.
Answer: Runlevelisamode of operationinone of the computer operating systems that implement
Unix SystemV-style initialization.Conventionally,sevenrunlevels exist, numbered from zero to six;
though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a
synonymforone of the levels.Onlyone runlevel isexecutedonstartup;run levels are not executed
one afteranother,i.e.eitherthe runlevel 2, 3 or 4 is executed, not more of them sequentially or in
any other order.
2. Q. 3. Describe the following:
a) File encryption
Answer: File Encryption means providing security for files that reside on media, in a stored state.
Those are files that are resting on our hard drives, usb drives or any other type of digital media
storage. Those are files that are usually not meant to be sent through network, they are stored
locally,beingencryptedandtemporarilydecryptedwhile beingusedandthan encrypted again after
we finished using them. Encrypting stored files
b) Email encryption
Answer: Email encryptionisencryptionof email messagestoprotectthe contentfrombeingread by
otherentitiesthanthe intendedrecipients.Email encryptionmayalsoinclude authentication. Email
is prone to disclosure of information. Most emails are currently transmitted in the clear (not
encrypted).By meansof some availabletools,personsotherthanthe designatedrecipientscan read
the email contents. Email encryption has been used by journalists and regular users to protect
privacy.Email encryption can rely on public-key
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601