Preview

NT1430 Lab2 Joy Brewer

Powerful Essays
Open Document
Open Document
989 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1430 Lab2 Joy Brewer
Unit 2 Assignment NAME __Joy Brewer__________
NT1430 DATE __6/27/15_________

1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? tail
What command displays the first 10 lines of a file? head

4. What is a Process? A process is the execution of a command by Linux (they can communicate with each other) What Utility provides communication between processes where output of one process provide input for another? pipe

5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who

6. What does the command pwd do? pwd prints the name of the current/working directory
What does the cd command do? cd is for change directory

7. In terms of file or directory permissions, what does U-G-O stand for? User Group Other What are the 3 permission that can be given to a file or directory? r=read w=write x=execute

8. In terms of permissions, what does 777 mean? Everyone can read write and execute

9. What does the command chmod do? lets you change permissions of a file What happens when I use it with the following? chmod 755 myfile
When you perform the chmod 755 filename command you allow everyone to read and execute the file, and the file owner is allowed to write to the file as well

10. If I needed to change a user’s username from kcarter to kparker, what command would I use?
Usermod –l kparker kcarter

11. What does grep do? The grep command is used to search text or searches the given file for lines containing a match to the given strings or words. By default, grep displays the matching lines

12.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    a. The passwd file is used to keep to in track of every user on…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 5 Study Guide

    • 603 Words
    • 3 Pages

    4. You are managing a Windows Server 2008 Standard edition which has the File Server role added. You explicitly gave a user “Modify” access to a file. However, when this user tried to append data to that file, he got access denied message. What might be the problem?…

    • 603 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Unix processes are instances of an executed program. UNIX, being a multi task operating system handles thousands of processes at a time. We are able to check on what processes are currently running by typing ps at the UNIX prompt. Depending on the options used with the ps command, we can see different outcomes such as $ps -ef | more. This will list all the processes in the system. Some items you might see using the ps command are PID which is the process ID number, TT or TTY shows the controlling terminal for the process. If there is no controlling terminal then a question mark is used.…

    • 567 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT1310 Unit 3 Homework

    • 1253 Words
    • 5 Pages

    Q3) What is a PID number? Why are these numbers useful when you run process in the background? Which utility displays the PID numbers of the commands you are running?…

    • 1253 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1210 Chapter 1 Review

    • 1315 Words
    • 6 Pages

    9. A student writes a report using a word processor, saving the repot in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he pasts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files as defined by a computer OS?…

    • 1315 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    How can you find out which utilities are available on your system for editing files? Which utilities are available for editing on your system?…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. What would the authorization part of an ls -l listing for filex appear like following setting up the following authorizations?…

    • 571 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 3 network discovery

    • 1031 Words
    • 5 Pages

    What is the PID number? Why are these numbers useful when you run processes in the background? Which utility displays the PID numbers of the commands you are running?…

    • 1031 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3

    • 1593 Words
    • 7 Pages

    With a umask value of 112, what are the default permissions assigned to newly created files?…

    • 1593 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    4. The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. If you can browse a file on a Windows network share, but are not able to copy it or…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 250 Homework 4

    • 769 Words
    • 4 Pages

    2. What is a PID number? Why are these numbers useful when you run processes in the background? Which utility displays the PID numbers of the commands you are running?…

    • 769 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    If multiple people need access to one file, this is commonly done by placing the users into groups, and assigning the groups and users various levels of permission access. There is a hierarchy where groups are on top and access control lists are underneath. The groups are owner class, group class, and other class. The other privileges are read, write, and execute. When a user creates a file, they are automatically made the owner. They can grant others into the group class and other class. Directory lists have 10 spaces or bits on the left hand side. The first space on the left is either a ‘-‘ for file, or a ‘D’ for directory. Stallings (2012) stated,“ Nine of the protection bits specify read (r), write (w), and execute (x) permission for the owner of the file, other members of the group to which this file belongs, and all other users” (p.558). The first three are for owner, next three are for group and last three are for other.…

    • 680 Words
    • 3 Pages
    Good Essays
  • Good Essays

    7. What is a shell? How does it work with the kernel? With the user?…

    • 392 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Leviathan

    • 217849 Words
    • 872 Pages

    bottom of this file. Included is important information about your specific rights and restrictions in how the file…

    • 217849 Words
    • 872 Pages
    Good Essays

Related Topics