Preview

Unit 2 lab 1

Satisfactory Essays
Open Document
Open Document
636 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 lab 1
Unit 2 lab 1: common linux commands

1. try giving the following commands and observe the behavior with each combination of options and arguments.
A. list the names of the files in the working directory
Is. Desktop Documents Downloads Music Pictures Public Templates Videos

B. by default, Is does not list files that have hidden filenames 9filenames that begin with a period; Sobell, page 190). List the names of all files in the working directory, including those with hidden file names. Is –a
. .config .gconf .ICEauthority Public
.. .dbus .gconfd .imsettings.log .pulse
.bash_logout Desktop .gnome2 .local .pulse-cookie
.bash_profile Documents .gnome2_private .mozilla Templates
.bashrc Downloads .gtk-bookmarks Music Videos
.cache .esd_auth .gvfs Pictures .xsession-errors
C. each file has an owner size modification date and permissions. Show these characteristics for all files in the working directory. Is -1 drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Desktop drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Documents drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Downloads drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Music drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Pictures drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Public drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Templates drwxr-xr-x. 2 bbiiggbbeeaarr2 bbiiggbbeeaarr2 4096 Oct 6 22:16 Videos
D. by default, Is lists the files in the working directory. Instead, list the commands of the /tmp directory by specifying that directory as an argument to Is. Is /tmp at-spi2 tmpO0039J keyring-JxlJga vmware-bbiiggbbeeaarr2 ks-script-jMAOmE vmware-config0 ks-script-jMAOmE.log VMwareDnD orbit-bbiiggbbeeaarr2 vmware-root

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    f. (make sure to do these in OSI order and this is not in order yet)…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 1

    • 255 Words
    • 1 Page

    Where do maggots come from? Are they a self-born, spontaneous generation or are they mothered by something or someone? I actually asked myself that question numerous times while finding maggots on few things myself. I also wonder the same about fruit flies. Seems like as soon as I buy fruits, fruit flies fill my house almost the same day while all windows and doors closed. This experiment of maggots was quiet fun and put my personal hypothesis to rest.…

    • 255 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1430 Unit 2

    • 393 Words
    • 2 Pages

    10. Experiment by calling the file utility with the names of files /usr/bin. How many different types of files are there? Roughly 20.…

    • 393 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ans : This matches any file with 2 characters, first being a lower case letter and the second being a number from 0 to 9…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    UNIT 2

    • 470 Words
    • 3 Pages

    5.) Write the pseudocode for a program that will determine the average miles per gallon a car gets. (Inputs should be miles driven and gallons of gas used)…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    GCFE study guide

    • 3292 Words
    • 14 Pages

    Book 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 Page Topic 5 allocated/unallocated 6 slack space 7 FileSystem Metadata 8 Deleted Files 9 Fat and NTFS file systems 10 FAT file deletion 11 NTFS file deletion 12 Timestamps 12 Timestamps Evidence of Categories FTK processing options FTK Evidence Refinement FTK RAM acquisition FTK Memory Analysis FTK searching Registry analysis Hives Backup Hives 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 408.2‐.3 19 33 37 110 112 124 143 144 145 408.2‐.3 144 User Registry Hives 408.2‐.3 144 usrclass.dat 408.2‐.3 149 Registry Hives 408.2‐.3 408.2‐.3 150 KEYS AND VALUES 151 last write time reg key 408.2‐.3 152 MRU LISTS 408.2‐.3 408.2‐.3 154 offline vs online reg viewing 155 deleted reg keys 408.2‐.3 161 reg keys review 408.2‐.3 163 Registry Key Analysis 408.2‐.3 164 system hives 408.2‐.3 164 user hives 408.2‐.3 408.2‐.3 408.2‐.3 170 SAM 171 Sam ‐ local users 173 Password policy 408.2‐.3 177 SYSTEM config 408.2‐.3 178 SYSTEM OS 408.2‐.3 181 System control set 408.2‐.3 183 SYSTEM computer name 408.2‐.3 185 SYSTEM timezone 408.2‐.3 187 Last Access Time on/Off 408.2‐.3 188 Network Interfaces 408.2‐.3…

    • 3292 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Group Outline

    • 1323 Words
    • 6 Pages

    6. While analyzing unallocated space, you locate what appears to be a 64-bit Windows date…

    • 1323 Words
    • 6 Pages
    Good Essays
  • Good Essays

    it320 assignment 1-3

    • 1779 Words
    • 8 Pages

    9. A student writes a report using a word processor, saving the report in a file called my_report. The student stores the file on his laptop hard disk drive. Later, he posts the file on a file-sharing site for a classmate to review the report. Then, he copies an updated version of the file to a flash drive to submit it to his instructor. Which of the following are some of the important features supplied by files defined by a computer OS? ()…

    • 1779 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Uli101 quiz 4b Q A

    • 341 Words
    • 2 Pages

    6. using the shortest paths possible create a file18 in Brian’s home directory that contains a directory listing of the docs2012 directory…

    • 341 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Protection Scheme in UNIX

    • 354 Words
    • 2 Pages

    The next three positions (2-4) will determine the owner permissions with r = read, w = write, and x = execute.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CompTIA Linux1

    • 5924 Words
    • 37 Pages

    Which of the following is the difference between the --remove and the --purge action with…

    • 5924 Words
    • 37 Pages
    Satisfactory Essays
  • Powerful Essays

    This section reviews some basic important functions needed for this course under MSDOS (Microsoft Disk Operating System) and learn how to write C++ programs. Creating source codes and compiling them will be the most frequent activity that you will do. You will learn about how to use CodeBlocks to create source codes and compile them and execute the output.…

    • 876 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Linux:introduction

    • 904 Words
    • 4 Pages

    Linux and its Application1 Sunil Bhooshan Introductory Importance of Linux ... The File System Basic File Utilities Linux and its Application-1 Sunil Bhooshan Department of ECE JUIT Linux and its Application1 Outline Sunil Bhooshan Introductory Importance of Linux ... 1 Introductory 2 Importance of Linux ... 3…

    • 904 Words
    • 4 Pages
    Powerful Essays

Related Topics