Preview

OS Management Task Lab03wGUIanswer

Good Essays
Open Document
Open Document
1006 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
OS Management Task Lab03wGUIanswer
24acb2e4013b0721c5d9a1b00bd43d68.doc
Name:

Course:

Gp:

Module Intended Learning Outcome (#2):
On completion of the module, students are expected to be able to:
Perform system management tasks of the most common operating systems in the industry by using both command line interface and GUI.

Lesson Intended Learning Outcome:
On completion of this workshop, students are expected to be able to:
Manage user accounts in Linux.

Adding Users in Linux

Step 1: Creating Accounts
Login as root.

Step 1.1: The useradd Command
To learn the details of the useradd command, at the command prompt, at the shell type: man useradd
Find out what do the following switches do.
-c
--comment COMMENT
Any text string. It is generally a short description of the login, and is currently used as the field for the user's full name
-d
--home HOME_DIR
The new user will be created using HOME_DIR as the value for the user's login directory. The default is to append the LOGIN name to BASE_DIR and use that as the login directory name. The directory HOME_DIR does not have to exist but will not be created if it is missing.

Type q to exit the man page.

Step 1.2: Adding Users
Create user accounts for Maria Chavez and Gloria Chan respectively: useradd –c "May Lam" may useradd –d /gloria_home –c "Gloria Chan" gloria
Where are the home directories of may and gloria respectively?
/home/may
/gloria_home

Write down the command that will be used to create a user account, david, for David Wong with home directory at /david_home. useradd –d /david_home –c "David Wong" david

Step 1.3: The passwd Command
Run the command: logout
Login as ‘gloria’, under the password type ENTER.
Can you login to Linux with new user ‘gloria’? Why?
NO. it is because Gloria does not have a password.

To learn the details of the passwd command prompt, at the shell type: man passwd
Briefly describe the following passwd switches:
-l:
This option is used to lock the specified account and it is available to root only. The

You May Also Find These Documents Helpful

  • Satisfactory Essays

    7. How is the passwd file used, and what fields make up its content? Explain.…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1230 Unit Excer1

    • 313 Words
    • 2 Pages

    You can specify different password and account lockout policies for different sets of users. I believe this little bonus is quite big for most of the administrators.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3340-Unit 2-Assignment 2

    • 1549 Words
    • 6 Pages

    vi. Each user and workforce member must ensure that their assigned User Identification is appropriately protected and only used for legitimate access to networks, systems, or applications. If a user or workforce members believes their user identification has been comprised, they must report that security incident to the appropriate Security Officer…

    • 1549 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Ch05EOCAs

    • 2578 Words
    • 13 Pages

    A local user is stored in the __Security Account Manager (SAM)__ database of the computer on which it was created. P102…

    • 2578 Words
    • 13 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    An operating system (OS) is an interface between hardware and user which is responsible for the management and coordination of activities and the sharing of the resources of the computer that acts as a host for computing applications run on the machine. As a host, one of the purposes of an operating system is to handle the details of the operation of the hardware. This relieves application programs from having to manage these details and makes it easier to write applications. Almost all computers (including handheld computers,desktop computers, supercomputers, video game consoles) as well as some robots, domestic appliances (dishwashers, washing machines), and portable…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 4

    • 359 Words
    • 1 Page

    2. When you create a new user account with the User Accounts control panel, you can only add it to which of the following groups? Administrators/Users.…

    • 359 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    With sudo command is the same as the run as command in windows. It allows a person to…

    • 521 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Comm

    • 501 Words
    • 3 Pages

    Next to the Control Panel link choose the Active Directory Users and Computers. Then expand the domain you want to create the user in and right click the user’s folder; select new user and put the information required into the textboxes; by right clicking this folder you can also add groups. To give users permissions right click the database and choose properties then select permissions, if the user you want to grant permission to is not on the list you can search and select their name and then check the permission you want to grant them. Some permissions that a user might need are: read, write, read and execute, list folder contents, modify, etc.…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Btec

    • 420 Words
    • 2 Pages

    Computers need to be maintained on a regular basis. Software utilities can often play a useful role in the maintenance of a computer system. In a short report, explain why you would carry out the following maintenance tasks and the role of relevant software utilities.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT 282 sylabus

    • 2660 Words
    • 11 Pages

    Read Ch. 3, “Introduction to Windows Operating Systems,” of A+ Guide to Managing and Maintaining…

    • 2660 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    5. You have forgotten the purpose of the -n option in the cat command. Which of the following can you enter at the Linux command line to find out what the -n option does when used with cat?…

    • 2601 Words
    • 11 Pages
    Good Essays
  • Good Essays

    The General Public License also referred to as (GNU or GPL is one of the most widely used software license among individual, organizations and companies. The reason behind this is this product guarantees its users the freedom to make changes to the software, study and share the software, and if needed the software may be copied. 3 versions of the GNU have been released. Operating System is the core software of any machine that provides interface between applications and the hardware. Different types of operating systems exist that are available these days, some of them are Open source and some are closed or proprietary standards. Each of them has their own benefits and advantages that are detailed in this paper.…

    • 669 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The subject matter of systems administration includes computer systems and the ways people use them in an organization. This entails knowledge of operating systems and applications, as well as hardware and software troubleshooting, but also knowledge of the purposes for which people in the organization use the computers.…

    • 599 Words
    • 3 Pages
    Good Essays
  • Good Essays

    After fulfilling all the requirements of hardware, we need to choose and install a network operating system (Network Operating System, NOS), which manage and coordinate all network operations. The services to be undertaken by this network operating system are:…

    • 815 Words
    • 4 Pages
    Good Essays