Preview

Personal Computing on a Linux Box

Good Essays
Open Document
Open Document
725 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Computing on a Linux Box
1. For accurate time stamps in logs, for ensuring that processes run on time, and also for applications that depend on keeping good time.
2. “Root” is the user name or account that by default has access to all commands and files on a Linux OS. It is also referred to as the root account, root user and the superuser.
3. It is intended primarily for workstation use--i.e., personal computing on a Linux box.
4. “p” for primary,”e” for extended, and “l” for logical partitions
5.
a. Make it easier to recover a corrupted file system or operating system installation.
b. Smaller file systems are more efficient
c. Separation of the operating system files from user files may result into a better and secure system.
d. Easier backup and recovery
e. You can increase disk space efficiency by formatting disk with various block sizes. It depends upon usage
f. Boot multiple operating systems such as Linux, Windows and FreeBSD from a single hard disk.
6. It serves as 'backup' RAM. One of the most popular ways to configure SWAP is to double your RAM.
7. Ext4 will use the new data structures only on new data, the old structures will remain untouched and it will be possible to read/modify them when needed.
8. Stores essential information, which is required during login. Username, Password, User ID (UID), Group ID (GID), User ID Info, Home directory, Command/shell.
9. fstab is a system configuration file on Linux and other Unix-like operating systems that contains information about major filesystems on the system.
a. Device name: This is the UNIX filename representing the physical device or partition. Typically, this name starts with /dev.
b. Mount point: This is the UNIX filename on the directory structure where the device or partition is to be mounted.
c. File system type: This field represents the filesystem to be used when mounting the device or partition. Typical values for this field are ext2, ext3, reiserfs, vfat, iso9660, and udf. auto can be used if

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. During the install, the option to sync with a NTP (Network Time Protocol) server was checked. From a security perspective, why is it important for a system to keep accurate time?…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Chapter Exercises

    • 458 Words
    • 3 Pages

    References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.…

    • 458 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Study Guide

    • 1178 Words
    • 5 Pages

    A Database is generally used for storing data in a structured way in an efficient manner for insert, update and retrieval of data in well defined formats. On the other hand, in file system the data stored in unstructured manner with an unrelated data.…

    • 1178 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Create a dedicated physical disk or logical partition (separate from OS and server application) for server data, if applicable.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    What command would you use to manually mount the standard CD-ROM device /dev/db1 at /media/disk?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Quiz

    • 2196 Words
    • 9 Pages

    Windows distinguishes between the different drives by means of a naming convention. Each drive is designated by a letter followed by…

    • 2196 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Key Terms

    • 986 Words
    • 4 Pages

    Administrator account- In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations.…

    • 986 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    1. Your OS will use the hard drive as a "swap file" or virtual memory, if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are slower than RAM. You must have enough memory, adding more does not help if you are not doing anything that needs more memory. Today, a modern PC and a modern OS need about 4 gigs to achieve this for most standard users. You want enough RAM so the OS doesn't start using the hard drive as memory.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Early operating systems generally supported a single type of disk drive and only one kind of file system. Early file systems were limited in their capacity, speed, and in the kinds of file names and directory structures they could use. These limitations often reflected limitations in the operating systems they were designed for, making it very difficult for an operating system to support more than one file…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Directions: Choose three different versions of the UNIX® or Linux® operating systems to compare in the following matrix. Insert the three chosen versions and fill out the columns based on the components on the left-hand side of the matrix.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Compare HFS+, Ext3fs, and NTFS. Choose the most reliable file system and justify your answers. (SLO 15)…

    • 706 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1110Module4 SA

    • 302 Words
    • 1 Page

    The New Technology File system also provides support for the larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users. It allows administrators to set a guideline for people who can access certain files and folders. It also allows administrators to set up specific accounts with limits for each person to tighten the security.…

    • 302 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Unit 2 Explore and Discuss

    • 1383 Words
    • 6 Pages

    C.1.a) POSIX - a family of standards specified by the IEEE for maintaining compatibility between operating systems.…

    • 1383 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What command would you use to manually mount the standard CD-ROM device /dev/db1 at /media/disk?…

    • 266 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nosql

    • 1273 Words
    • 6 Pages

    * Document stores go beyond this slightly by imposing a little more structure on the binary object. The objects must be documents, encoded in some recognizable format, such as XML or PDF, but there are no requirements about the structure or content of the document. Each document is stored as the value portion of a key/value store and may be accompanied by metadata embedded in the document itself.…

    • 1273 Words
    • 6 Pages
    Powerful Essays

Related Topics