Thursday, November 28, 2019

It250 Linux Course Review and Hw Helper free essay sample

IT250 Linux Operating System S. No Question Points 1 What commands are used to create an ext2—second extended—filesystem? mke2fs or mkfs. ext2 2 Which of the following types of filesystems can the command e2fsck be used to check? A. ext2 B. ext3 C. jfs D. vfat 3 What command can be used to start a program with a lower scheduling priority? nice ____________ FINAL Which of the following Linux utilities lists the names of files in a single directory? ls Which component of X Window allows customization of the user interface? Window manager Which of the following control structures is a multiple-branch decision mechanism capable of more than three decisions? The Case structure What is the meaning of the DocumentRoot directive in the Apache configuration file? It is the directive that is used to change the location of the document root. Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file? You would use the symbol The special character that causes the shell to generate filenames that match any single character in the name of an existing file is _____. We will write a custom essay sample on It250 Linux Course Review and Hw Helper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The question mark Using vim, which of the following keys is used to delete a single character? x Following the job number, the shell displays the ________ number—a larger number assigned by the operating system. pid Which of the following commands is used to start X Window from the command line? startx Which of the following utilities detects and configures new hardware and provides the computer the information it needs about the NIC? kudzu Which of the following Linux utilities lists the names of files in a single directory? ls Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM? Swap Which component of X Window allows customization of the user interface? Window manager What utility is used to move a file from one directory to another? mv The C compiler that Linux commonly uses is _________. GNU gcc What directive grants access to a directory hierarchy to the specified clients? Allow from What represents the root partition in Linux? The forward slash / Which of the following describes Konqueror? A desktop tool that acts as a file manager, a browser, and an executor of programs In the GNOME environment, thme equivalent of a Windows shortcut is called ___________. launcher The default menus of the GNOME environment are the ___________. Applications, Places, and System menus Which of the following control structures is a multiple-branch decision mechanism capable of more than three decisions? The Case structure The utility that can be used to copy a file, including text and executable program (binary) files, is ___________. cp Which of the following utilities is used to rename a file? Copy What utility is used to search for a particular string within a file or a group of files? grep The name of a C program file must end in _________. c The following two lines are found in the /etc/logrotate. conf file: daily rotate 21 How many weeks’ worth of backups will be found in the log directories? 3 Which of the following directives specifies how Apache displays directory listings? IndexOptions Which of the following utilities do you use to move a process from the background to the foreground? fg What commands do you use to ensure that all the users on a computer can execute the new script CoolStuff? chmod u+xCoolStuff Which of the following keystrokes helps you undo the last change made in the vim editor? u What command displays the last 10 lines of the file abc? tail abc Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who Which of the following is a server that allows directories to be shared between Windows systems? Samba In vim, which of the following keystrokes is used to exit the editor and save the contents of the file being edited? ZZ Which of the following utilities do you use to make your home directory the working directory? cd Which of the following utilities is installed by default and helps you upgrade software packages? yum Which of the following symbols instructs the shell to redirect the output of a command to the specified file instead of the screen and overwrite the file? You would use the symbol The special character that causes the shell to generate filenames that match any single character in the name of an existing file is _____. The question mark In vim, which of the following keystrokes is used to exit the editor and save the contents of the file being edited? ZZ Which of the following control structures is a multiple-branch decision mechanism capable of more than three decisions? The Case structure Which component of X Window allows customization of the user interface? Window manager Which of the following utilities is used to view a file one screen at a time? less What utility is used to search for a particular string within a file or a group of files? grep The utility that can be used to copy a file, including text and executable program (binary) files, is ___________. cp Which of the following partitions does Linux use when all the information that Linux is processing cannot be stored in RAM? Swap Which of the following keystrokes helps you undo the last change made in the vim editor? What network utilities works only if a remote system trusts your local computer? rsh What represents the root partition in Linux? The forward slash / The C compiler that Linux commonly uses is _________. GNU gcc What is the meaning of the DocumentRoot directive in the Apache configuration file? It is the directive that is used to change the location of the document root. In the GNOME environmen t, the equivalent of a Windows shortcut is called ___________. a launcher The default menus of the GNOME environment are the ___________. Applications, Places, and System menus Which of the following commands is used to start X Window from the command line? startx What operator causes the output to be appended to an existing file? The symbol Following the job number, the shell displays the ________ number—a larger number assigned by the operating system. pid Which of the following utilities is used to rename a file? Copy The name of a C program file must end in _________. .c Which of the following utilities is used to display the pathname of a current working directory? pwd Which of the following utilities do you use to determine the list of users logged on to a specific terminal? ho Which of the following utilities do you use to make your home directory the working directory? cd Which of the following utilities do you use to move a process from the background to the foreground? fg What commands do you use to ensure that all the users on a computer can execute the new script CoolStuff? chmod u+xCoolStuff Which of the following utilities is used to g raphically add and remove software packages in Fedora? pirut Which of the following directives specifies how Apache displays directory listings? IndexOptions What utility is used to move a file from one directory to another? v What directive grants access to a directory hierarchy to the specified clients? Allow from User abc wants to copy the ~/. bashrc file from his or her local computer to a system named bravo. What commands should abc use? scp ~/. bashrc [emailprotected] The following two lines are found in the /etc/logrotate. conf file: daily rotate 21 How many weeks’ worth of backups will be found in the log directories? 3 _______________________________ WEEK 10 VOCAB The utility that makes it easier for the administrator to manage the /etc/rc. d directory chkconfig This user is commonly referred to as a super user root Sends a signal to a process Kill The utility that runs a program as a root Consolehelper Which of the following directives grants access to a directory hierarchy to the specified clients? Allow from A program that does something destructive or disruptive to a system Trojan Horse This program was developed by the U. S. National Security Agency SELinux The utility that can be used to back up an entire filesystem Dump User abc wants to copy the ~/. bashrc file from his or her local computer to a system named bravo. Which of the following commands should abc use? scp ~/. bashrc [emailprotected] The utility that adds a group from the command line groupadd Sends packets to a remote system Ping The utility that removes a user userdel The utuility that specifies how to search for information nsswitch The utility that can be used to archive files cpio Which of the following utilities is used to search for a particular string within a file or group of files? grep WEEK 9 An internet based system that can keep software on one or more Red Hat Linux systems up-to-date RHN Command used to remove packages um remove (package name) Command used to update packages yum update The utility that only works with software packages that have been built for processing by RPM Red Hat Package Manager Application used to keep the O/S up to date Yellow Dog Updater Modified A handy tool for downloading large static data files BitTorrent Command used to install specific packages yum install (package name) The command used t o display information about groups yum groupinfo group name The command used to display a list of installed and available groups yum grouplist The command line utility that adds and removes software packages pirut The command that locates and downloads rpm files yumdownloader (name of rpm file) What utility is used to graphically add and remove software packages in Fedora? pirut An unwanted and unintended program property Bug The utility that downloads files noninteractively wget The option to run wget in the background and redirect its standard error to a file named wget-log. -b ________________ Linux Operating System Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1. 1:Answer the following questions: 1. What did Richard Stallman mean when he stated that GNU was a free operating system? 2. Describe the relationship between Linux and the GNU Project. 3. List and describe in detail four advantages of Linux. 4. List three examples of different hardware platforms onto which Linux has been ported. 5. Which component of X Window allows for heavy customization What is X Window System? 6. of the user interface? 7. What is the minimum system requirements for 32-bit Fedora 8 with the GUI installed? 8. List and describe the three types of hardware architecture that Fedora 8 supports. 9. What is LVM? What advantage does LVM have over traditional partitions? 10. What is a mount point? 11. How many primary drive partitions are supported on computers that still conform to the standard established by MS-DOS? How many total partitions can a standard computer disk [Integrated Drive Electronics (IDE)/Serial Advanced Technology Attachment (SATA)] support? How many does the Small Computer System Interface (SCSI) support? 12. What directories are often stored on their own partitions? 3. Instead of a page file—such as in Windows—what type of partition does Linux use when it does not have enough memory to hold all the data that it is processing? Submit your answers in a Word document to your instructor at the beginning of Unit 2. ________________ Unit 6: Peripheral Hardware Configuration Objectives 7: Configure computer hardware in Linux. 7. 1: Configure a printer with Common UNIX Printing System (CUPS). 7. 2: Configure a network interface card (NIC). ReadingsA Practical Guide to FedoraTM and Red Hat ® Enterprise Linux ® †¢ Chapter 14, pp. 511-517 and pp. 23-531 †¢ Chapter 17, pp. 579-583 Key Concepts1. The history of UNIX printing2. New features in CUPS3. Management tools in CUPS. Methods of configuring a CUPS printer 5. Private IP addresses. 6 Methods of configuring network settings with the GUI, or system-confignetwork 7. The method of manually configuring network settings Attention IT-250 Students: Week 7 8 In order to address the required coursework, Units 7 and 8 will be combined. To make this somewhat easier, the due dates for all Unit 7/8 work will be extended to calendar week 10 (November 10, 2008). The due date for Unit 9 work remains unchanged (also November 10, 2008). In essence, this allows us to complete the combine work for units 7, 8, and 9 over two weeks. This should be somewhat easier than doubling-up two units in a single week. Please note that to further simplify, the quizzes for Units 7 and 8 have been combined into a single quiz activity. This quiz score will count twice. Please read chapters 10, 13, 16, 18, and 19 in preparation of addressing this material. Unit 9: Basic Apache Configuration Objectives 10: Configure basic settings on an Apache Web server. 0. 1: Identify the core elements of a Fedora Apache installation. 10. 2: Configure the Apache Web server by editing the httpd. conf file. 10. 3: Configure the Apache Web server by using the system-config-httpd configuration script. Readings A Practical Guide to FedoraTM and Red Hat ® Enterprise Linux ® †¢ Chapter 26, pp. 811-824 Key Concepts 1. An introduction to Apache 2. Installation of standard Apache 3. Configuration of Apache, including ports, user Web pages, and Apache directories Linux Operating System Unit 10  ©ITT Educational Services, Inc. 94 Linux Operating System 7/02/08 Unit 10: Basic Apache Management and Troubleshooting Objectives 11: Manage and troubleshoot an Apache Web server. 11. 1: Configure logging options in the httpd. conf file. 11. 2: Configure file and directory security in the httpd. conf file. 11. 3: Troubleshoot Apache from the command line and logs. Readings A Practical Guide to FedoraTM and Red Hat ® Enterprise Linux ® †¢ Chapter 26, pp. 828-840 and p. 845 Key Concepts 1. Methods of configuring logs and file and directory security in Apache 2. Use of logs and command-line tools to troubleshoot Apache

Sunday, November 24, 2019

huck finn1 essays

huck finn1 essays The Adventures of Huckleberry Finn Mark Twain 1. In the novel, The Adventures of Huckleberry Finn, Huck Finn was the main character. The story was told through his eyes, and most of the events that took place happened around him. But some of these events would not have happened without other main characters as well, like Jim, Tom Sawyer, the King, or the Duke. Hucks personality at the start of the novel had changed gradually throughout the novel and until the end. At first, Miss Watson tried to make him pray for things but Huck did not believe in praying because it brought him bad luck. Later in the novel, Huck tries to pray for forgiveness and wants to erase his sin for stealing a nigger. After he prays, he feels he can pray openly now and will not sin anymore (CH. 31). Huck was also superstitious and believed that everything that went wrong was because of certain things he did, like the snake in Jims blanket. And everything was blamed on the bad luck Huck and Jim had. Huck also became kind, especially after the quarrel with his father, pap. He learned that in order to get along with people (like the king and duke), you have to let them have their way, and Huck did. Jim, at first, was looked upon as just an ordinary nigger. But Huck and Tom soon realized that he was very smart and had helped Huck through most of his adventures. But as a nigger, Jim was looked up to as a hero to other niggers. For instance, Huck tells the reader when niggers from all over the country came to see Jim and hear of his heroic stories and every nigger wanted to be like Jim. Jim was also very superstitious, especially in chapter eight when Jim talks about all of his superstitions, like counting the things for dinner and telling the bees that their owner had just died. All of this supposedly brought bad luck. Tom Sawyer was also a very influential character to the story. He was the one who came up with all ...

Thursday, November 21, 2019

W3Q-Executing and implementing project portfolio management Assignment

W3Q-Executing and implementing project portfolio management - Assignment Example NDT-Solutions, a private sector company specializing in development and construction of facility for non-destructive testing laboratory, takes a conventional approach to project management mainly through assigning projects to departmental managers. This approach functional managers to act as project managers while performing their primary duties in parallel, a practice which was very common in 1960s (Kerzner 2010). A major reason for such an approach was the lack of appreciation for project management methodology and best practices as identified by Project Management Institute in PMBOK (2008). Thus projects in the company normally initiated within from the departments without considering their relevance to the organizational business strategy. Thus majority of the projects were a result of self-initiative even without support and consent of management. In addition, internal politics and individual interests barred projects and their outcomes to be visible to other departments unless materialized. Thus other departments who may have significant role in the project execution or may have been impacted by the project outcome were, in fact, alienated from the project. Every department struggled to portray its project as success while endeavoring to undermine the efforts made in other departments. This impacted the overall potential of the company to achieve synergy of its resources. The end result was duplication of projects, inefficient utilization of the resources and discouragement of any innovative ideas at the organizational level. Besides its drawbacks, the approach has advantages in terms of expanding experience in project management and improving the skills; however, lack of training and appreciation of a standardized project portfolio management approach would increase risk of inefficient resource utilization and duplication of efforts especially when the company is managing multiple projects. According to Kerzner (2010), â€Å"portfolio management is