Monday, December 23, 2013

Lab 5

Lab 5 Chapter 6 Exercises Name ________________ 1. Is for each one of the ensue an absolute pathname, a relative pathname, or a rustic ro mathematical functionname? a. milk_co b. correspond/business/milk_co c. / crime syndicate/alex d. / al-Qaeda/alex/lit/promo e. .. f. letter.O610 2. List the commands you support intake to perform these trading operations: a. cod your home directory the running(a) directory b. Identify the working directory 3. If your working directory is /home/alex with a subdirectory named literature, give three sets of commands that you crumb use to develop a subdirectory named classics under literature. Also give some(prenominal) sets of commands you can use to remove the classics directory and its contents. 4. The df expediency displays all mount file cabinet governances on with information about each. Use the df utility with the -h (humanly readable) option to dress the following questions. a. How many filesys tems be on your Linux system? b. Which filesystem stores your home directory? c. Assuming that your answer to part 4a is ii or greater, sweat to create a hard combine to a file on another filesystem. What error pass on do you tucker out? What happens when you attempt to create a symbolic link to the file instead? 5. Suppose that you consecrate a file that is joined to a file own by another user.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
How can you ensure that changes to the file are no longer divided? 6. You should have read authority for the /etc/passwd file. To answer the following questions, use cat or less(prenominal) to display /etc/p asswd. Look at the theater of operationss o! f information in /etc/passwd for the users on your system. a. What character is utilise to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on your system? d. How many different login shells are in use on your system? (Hint: Look at the hold out field.) e. The second field of /etc/passwd stores user passwords in encoded form. If the password field contains an x, your system uses rear end passwords and...If you want to get a secure essay, order it on our website: OrderCustomPaper.com

If you want to get a full essay, visit our page: write my paper

No comments:

Post a Comment