This website uses cookies to ensure you have the best experience. Learn more

Chapters 10 Linux Essay

552 words - 3 pages

Jose Alberto Salazar
OECS-205-D02
Homework 2

Answer Exercises 1 and 3 on page 499 (End of chapter 10)

1.- How does single-user mode differ from multiuser mode?
When a system is in single-user mode, you can log in only at the console. Not all of the file systems are mounted,and many daemons are not running. With the system in multiuser mode you can login at any terminal or workstation that is set up for login, most or all of the filesystems are mounted, and all of the daemons that your system is set up to run arerunning.

3.-What do the letters of the su command stand for? (Hint: It is not Superuser.) What canyou do with su besides give yourself root privileges? How would you log in as Zach ...view middle of the document...

By using the su commandutility and the root password will alow you to log on as Zach with the sameenvironment

Answer Exercises 1,3,5,6,7 on page 530 (End of chapter 11)

1.- What is the function of the /etc/hosts file? Which services can you use in place of or to supplement the hosts file?

This file holds the hostname and IP address of the local system. It also holds a special
entry for localhost. This entry supports the loopback service, which allows the local
system to talk to itself. The IP address of the loopback serviceis always 127.0.0.1, while 127.0.1.1 names the local system.

 
3.- What is an inode? What happens to the inode when you move a file within a filesystem?

An inode is a data structure, stored on disk, that defines a file’s existence and is identified by an inode number. An inode contains critical information about a file, such as the UID of the owner, where it is physically located on the disk, and how many hard links point to it. In addition, SELinux stores extended information about files in inodes. An inode that describes a directory file maps each of the filenames in the directory to the inode that describes that file. This setup allows an inode to be associated with more than one filename and to be pointed to from more than one directory.
6. What is a FIFO? What does FIFO stand for? What is another name for a FIFO? How does a FIFO work?
A FIFO is a special file, also called a named pipe. You read from and write to the file to read from and write to the pipe. The term FIFO stands for “first in, first out.” The first information that you put in one end is the first information that comes out the other end.

Other Papers Like Chapters 10 Linux

Job Performance Essay

4460 words - 18 pages 3.1.4 Billing and Service Usage 7 3.2 Issues with Cloud Computing before Implementation 7 4.0 Technology Review 7 5.0 Operating Systems in Personal Computers 8 5.1 Features of Microsoft Windows 8 9 6.0 Enterprise Systems 10 6.1 Benefits of implementing Enterprise Systems 10 6.2 Challenges caused by implementing Enterprise Systems 11 7.0 Intelligent Systems 11 7.1 Types of Intelligent Systems 12 7.1.1 Expert Systems

Computer Tricks Essay

3238 words - 13 pages Number: 2009933544 ISBN-13: 978-1-4354-8362-0 ISBN-10: 1-4354-8362-6 Cengage Learning 5 Maxwell Drive Clifton Park, NY 12065-2919 USA Cengage Learning is a leading provider of customized learning solutions with office locations around the globe, including Singapore, the United Kingdom, Australia, Mexico, Brazil, and Japan. Locate your local office at: international.cengage.com/region Cengage Learning products are represented in Canada by Nelson Education

Test

5524 words - 23 pages can take yourself at higher level of expertise. Prerequisites Before proceeding with this tutorial you should have a basic working knowledge with Windows or Linux operating system, additionally you must be familiar with:      Experience with any text editor like notepad, notepad++, or Editplus etc. How to create directories and files on your computer. How to navigate through different directories. How to type content in a file

Evidence Collection

2876 words - 12 pages @cengage.com Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Library of Congress Control Number: 2009933547 Production Director: Carolyn Miller ISBN-13: 978-1-4354-8349-1 Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Senior Art Director: Jack Pendleton EC-Council: President | EC-Council: Sanjay Bavisi Sr. Director US | EC-Council: Steven Graham ISBN-10: 1-4354-8349-9 Cengage

Principles Of Information Security

3291 words - 14 pages . From designing a secure data center to assessing the relative value of guards and watchdogs to resolving the technical issues involved in fire suppression and power conditioning, physical security involves a wide range of special considerations. Chapter 9 examines these considerations by factoring in the various physical security threats that modern organizations face. Chapter 10—Implementing Security The preceding chapters provided guidelines

Principles of Information Security

3241 words - 13 pages that modern organizations face. Section VI—Implementation Chapter 10—Implementing Security The preceding chapters provided guidelines for how an organization might design its information security program. Chapter 10 examines the elements critical to implementing this design. Key areas in this chapter include the bull’s-eye model for implementing information security and a discussion of whether an organization should outsource the various

Computer System Security

3291 words - 14 pages . From designing a secure data center to assessing the relative value of guards and watchdogs to resolving the technical issues involved in fire suppression and power conditioning, physical security involves a wide range of special considerations. Chapter 9 examines these considerations by factoring in the various physical security threats that modern organizations face. Chapter 10—Implementing Security The preceding chapters provided guidelines

Gsl Scientific Library

4796 words - 20 pages the Cylindrical Bessel functions Jn (x), Yn (x), Modified cylindrical Bessel functions In (x), Kn (x), Spherical Bessel functions jl (x), yl (x), and Modified Spherical Bessel functions il (x), kl (x). For more information see Abramowitz & Stegun, Chapters 9 and 10. The Bessel functions are defined in the header file ‘gsl_sf_bessel.h’. 7.5.1 Regular Cylindrical Bessel Functions double gsl_sf_bessel_J0 (double x ) int gsl_sf_bessel_J0_e (double x

Freedom And Responsibility

2141 words - 9 pages Built within the Constitution of the United States are specifically defined freedoms that are guaranteed to all citizens. Conversely, with every constitutional freedom there comes a corresponding responsibility. On September 25, 1789, the state legislature’s twelve proposed amendments were transmitted by congress, the first two dealing with congressional representation and congressional pay. The following numbers three through twelve were

Hate Crime Laws

2348 words - 10 pages /prisons/kinga2.htm>. Turley, Jonathan. "Prosecutors Consider Hate Crime Charges in Clementi Case.” Jonathanturley.org. 3 Oct 2010. 26 Oct 2011. . Wellman, Christopher Heath. “Hate Crimes Deserve Harsher Punishment.” At Issue: What is a Hate Crime?Ed. Robert Winters.Detroit, MI: Greenhaven Press, 2007. 24-36.

Rational Emotional Behavior Therapy Case Study Conceptualization And Treatment Plan

2140 words - 9 pages Rational Emotional Behavior Therapy Case Study of Sarah: A Conceptualization and Treatment Plan Rational emotive behavior therapy, REBT, was developed by Albert Ellis and holds the central belief that the events in our lives do not cause our disturbances but that they are instead caused by our view of the events (Murdock, 2009). Murdock (2009) states that “people are seen as responsible for their behavior” (p. 279) but, because they are

Related Essays

Cis510 Systems Analysis & Design

4497 words - 18 pages provide specific services or products that are usually performed by in-house personnel. The range of outsourcing alternatives for any given project varies. Alternatives to outsourcing include: contract programmers, project management services, facilities management, systems analyst contractors, purchase of package system, and so forth. 10. Define benchmark. Why is it useful in selecting a new system? A benchmark involves

Itt 255 Lab 6 Essay

3922 words - 16 pages (Chapters 5 and 8)  Thomas R. Peltier Information Security Risk Analysis, 2nd ed. (Chapter 2)  John Wylder Strategic Information Security (Chapter 13)  Eric A. Fisch, et al Secure Computers and Networks; analysis, design, and implementation (Chapters 1, 2, 5, 6, 10, 13, 14 and 15)  William Stepka “Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking”, Security Management, Mar 2010, Vol. 54 Issue 3, (Page 80)  Xin

Building A Text Corpus Essay

4010 words - 17 pages MEDINFO 2001 V. Patel et al. (Eds) Amsterdam: IOS Press © 2001 IMIA. All rights reserved Building a Text Corpus for Representing the Variety of Medical Language Pierre Zweigenbauma, Pierre Jacquemarta, Natalia Grabara, Benoît Habertb a DIAM — Service d’Informatique Médicale/DSI, Assistance Publique – Hôpitaux de Paris & Département de Biomathématiques, Université Paris 6 b LIMSI-CNRS & Université Paris 10 Abstract Medical language

Dell Trategic Planning Essay

4264 words - 18 pages . Sprague, J. & Shameen, A., 1999, ‘Boosting growth, courting disasters?’, Asiaweek, 31 July, 50–51. Two authors (Lamb & Kling 2003) No volume or issue number Sprague and Shameen (1999) indicate that alternatives to continual economic growth … . Or It has been suggested that ‘[g]rowth at all cost is no longer aviable option’ (Sprague & Shameen 1999: 50). Journal articles and book chapters from books of readings Kuebler, S.A., 2004