...1. 사무실에서 상사가 금요일 10:30 회의에 참석하라고 급하게 지시했는데, 이 일정을 메모할 펜을 찾을 수가 없다. 어떤 Linux 명령을 써서 Meeting이라는 파일에 이 메모를 저장할 수 있는가? 답 : B. cat > Meeting (cat이라는 명령어로 미팅이란 파일에 내가 입력한 내용을 저장) 2. 앞의 문제 1에서 메모하기 전에 금요일의 날짜를 메모에 포함시키기로 하였다. 어떤 Linux명령으로 금요일의 날짜를 알 수 있을까? 답 : A. cal (달력을 출력하는 명령어) 3. 명령을 타이핑하는 중에 명령과 함께 표시해야 할 파일 이름을 잘못 쳤다. 다음 중 어느 명령줄 키 조합(command-line key combination)이 되돌려서 오류를 정정할 수 있나? 답 : A. Ctrl+b (이전문자로 이동하는 명령줄 키 조합) (Alt+End, Ctrl+2, Shift+Alt+m 해당하는 조합은 책 어디에도 없었습니다.) 4. 지난 몇 달 동안 당신은 패스워드를 변경하지 않았고, 이제 새 패스워드로 바꾸려고 한다. 다음 명령 중 어느 것을 써야하나? 답 : D. passwd (패스워드를 새로지정하는 명령어) 5. cat명령에서 -n 옵션이 무엇에 쓰는 것인지 생각나지 않는다. 다음 중 어느 것을 써야 cat의 -n 옵션의 목적을 알아낼 수 있나? 답 : C. man cat (‘man 명령어‘는 해당 명령어의 매뉴얼을 볼수잇는 명령어) 6. 다음 중 어느 것이 AT&T Bell 연구소가 원래 개발한 UNIX 배포판인가? 답 : D. System V 7. Linux에서 쓰이는 기본 명령해석기(command interpreter)는 어느 shell인가? 답 : A. Bash shell (본문에 리눅스는 기본명령해석기로 bash shell를 사용한다고 나와있습니다.) 8. Annual_Report라는 파일의 끝에 텍스트 한 줄을 추가하려한다. 다음 명령 중 텍스트 한 줄을 추가할 수 있는 명령은 어느 것인가? 답 : C. cat >> Annual_Report (cat >> 파일이름 : 해당파일에 내용추가) 9. SSH는 (하는데) 쓰일 수 있다. 답 : B. 네트워크 상의 다른 컴퓨터에 로긴(log-in) 10. 오늘은 Linux서버관리자로서 첫날이어서 상사가 root 패스워드를 알려줬다. root가 무엇인가? 답 : D. UNIX/Linux 시스템에 완전한 접근을 할 수 있는 관리자 계정 11. project라 부르는 문서 파일에서 파일의 생성 날짜와 마지막으로 갱신된 날짜를 파일의 마지막 두 줄에 기록했다. 어느 명령이 project 파일의 마지막 두 줄을 보여줄까? 답 : c. tail -n 2 project (답은 이것이 맞으나 실제 실행시 저 문구대로 실행한다면 오류가 뜨면서 사용법을 보여준다. 그러므로 정확한 답은 tail –2 project) 12. man명령으로...
Words: 815 - Pages: 4
...Review Questions 1. b cat > Meeting 2. a cal 3. a Ctrl + b 4. d passwd 5. c man cat 6. d System V 7. a Bash shell 8. c cat >> Annual_Report 9. b log in remotely to another computer on a network 10. d the administrative account that has complete access to a UNIX/Linux system 11. c tail –n 2 project 12. a q 13 A SUSE Linux Enterprise B Mandriva C Fedora D Red Hat Enterprise Linux 14. a less b cat 15. a the users on the local system C a listing of all authorized users on a system, regardless of whether or not they are logged in 16 d clear 17. d Use the shut Down option even though your coworker may want to access the computer after you, becuase this is the best way to fully reinitialize security for the next user session 18. b a peer-to-peer network 19. a a mainframe computer B a desktop pc C a sever D a workstation used for scientific research 20. c press the up arrow key one time 21. b date -u 22번. 스크롤을 아래로 내려 파일의 내용을 볼 수 있습니다 23번. Telnet은 원격 컴퓨터, UNIX, 리눅스, 또는 Windows PC를 연결하는데 사용될 수 있다. 24번. 유닉스와 리눅스는 예민하다, 그러므로 달력을 표시하기 위해서 cal명령과 not cal명령을 사용해야만 한다. 25번. 한줄에 한 개이상의 명령을 실행시키기 위해서는 :세미콜론을 사용하여 각각의 명령을 구분시킨다. 1장 DISCOVERY EXERCISES 1. 현재 파일목록확인을 할 때 사용하는 명령어이다. 현재디렉토리의 파일 목록뿐만 아니라 원하는 파일이 어느 디렉토리에있는지도 확인가능하다. 2. –R 옵션을 찾을 수가 없습니다. 3. 알아볼것 없음 4. 저는 1995년 8월 20일 생입니다. 확인 결과 일요일입니다. 4. 2008년 2012년 6. 화면에 clear를 입력 후 화면을 정리하고 .. 7. Date –u로 출력합니다. 8. cal...
Words: 1150 - Pages: 5
...possible to retrieve the source code of the next release 2 months after it was ready for purchase. SUSE Linux strategy was to create a technically superior Linux distribution with the large number of employed engineers, that would make users willing to pay for their distribution in retail stores. Since the acquisition by Novell in 2003 and with the advent of openSUSE this has been reversed: starting with version 9.2, an unsupported 1 DVD ISO image of SUSE Professional was made available for download as well as a bootable Live DVD evaluation. The FTP server continues to operate and has the advantage of "streamlined" installs: Only downloading packages the user feels they need. The ISO has the advantages of an easy install package, the ability to operate even if the user's network card does not work "out of the box", and less experience needed (i.e., an inexperienced Linux user may not know whether or not to install a certain package, and the ISO offers several preselected sets of packages). The initial stable release from the openSUSE Project, SUSE Linux 10.0, was available for download just before the retail release of SUSE Linux 10.0. In addition, Novell discontinued the Personal version, renaming the Professional version to simply "SUSE Linux", and repricing "SUSE Linux" to about the same as the old Personal version. As of version 10.2, the SUSE Linux distribution was officially renamed to openSUSE. Over the years, SuSE Linux...
Words: 456 - Pages: 2
...Linux GUI, 45 from the FOSS Open Source Suite, and 15 dealing with FOSS email programs (Microsoft's Smith and Gutierrez, 2007). Since this issue in 2006, FOSS has prospered beyond belief. Not only has FOSS survived, but it has grown enormously. Also in 2006, Microsoft signed a deal with Novell, agreeing that neither would sue the other (Upfold, 2006). Instead of fighting the FOSS business model Microsoft chose to instead join them with Novell's SuSE Linux model. Novell and Microsoft worked together in an attempt to collaborate with both open and closed source software. Their main competitor was Red Hat, who also was working on their own Linux system. Even more recently, Novell sold 882 patents to CPTN Holdings LLC in 2011. Upon the transaction, CPTN would dissolve itself. The patents were split up and purchased by Apple (25%), EMC (25%), Oracle (25%), and Novell's parent company Attachmate (25%). Another agreement of the deal allowed all companies involved to be free of any suits stemming from all 882 patents (Fosspatents blog, 2011). Microsoft was not negatively affected by the deal as they would essentially co-own the 25% share of patents Attachmate would recieve, as their deal with Novell allowed. This deal would allow FOSS continued growth full speed ahead. Today, all smart phones and many other devices, such as Ipads, run on some version of FOSS. Our government and military use many different versions of FOSS as well. The NSA created their own upgrades to FOSS, such as...
Words: 448 - Pages: 2
...by phone or over the web, customers using SUSE Linux Enterprise benefitted from the best customer support on the market. In addition, this article also recognized that for the fourth year in a row, Novell has been named “Best Web Support” by the Association of Support Professionals. This study gathered the opinions of technical personnel at companies who have used Linux support services provided by Novell, Oracle, and Red Hat within the previous 12 months. This reported that out of the users rating percentages for these three distributions, Novell was 71 percent, which was 6 percent higher than Oracle users and 10 percent higher than Red Hat users. It also showed the differences for mixed-platform environments, which were even more pronounced. Novel was rated a 7 or higher by 70 percent of respondents, compared to 59 percent for Red Hat and 44 percent for Oracle. It goes on to recognize that Novell technical support personnel are highly knowledgeable and experienced to produce one of the best technical support and services organizations. Furthermore, the Association of Service Professionals recently named Novell as one of the top 10 companies for best web support in 2010. Markus Rex, senior vice president and general manager of Open Platform Solutions at Novell, said, "Novell is an innovative company that continues to offer the best products and services available to its customers and partners. We are proud of our technical support organization for maintaining...
Words: 367 - Pages: 2
...wanted Microsoft to work out the patent issues directly with the commercial distributors like Red Hat and Novell. (Red Hat has about 65 percent of the paid Linux server market, according to IDC, while Novell has 26 percent.) Microsoft and Novell agreed not to sue each other's customers for patent infringement. That would be okay, because it's something that the GPL does not address. On those terms, Novell agreed to give Microsoft a percentage of all its Linux revenue through 2011 (or a minimum of $40 million). The pact also included a marketing collaboration. Microsoft agreed to pay Novell $240 million for "coupons" that it could then resell to customers (theoretically for a profit), who would, in turn, trade them in for subscriptions to Novell's Linux server software. In addition, Microsoft gave Novell another $108 million as a "balancing payment" in connection with the patent part of the deal. It might seem counterintuitive that Microsoft would end up paying millions to Novell when Microsoft is the one trying to get royalties for its patents. Microsoft's explanation is that this balancing payment was calculated as it would be in any cross-licensing deal: Novell has valuable network-computing patents that Microsoft products may infringe, and since Microsoft's products bring in so much more revenue than Novell's, Microsoft owed a balance. Microsoft and Novell unveiled their...
Words: 587 - Pages: 3
...Date: March 22, 2012 To: Mrs. Depano From: Joffrey A. Peji Subject: Web access to Novell Group Wise, Pegasus Mail, Lotus Notes and Mozilla Novel Group Wise GroupWise can operate on a number of server and workstation platforms. Server platforms include NetWare, Linux, and Windows. One client runs on Microsoft Windows platforms, and a Java client operates on Linux and on Mac OS X. Novell has delivered closer client-feature parity in GroupWise 8.[1] There are also GroupWise connectors for Microsoft Outlook and Novell Evolution. The basic features of this is a messaging and collaborative software platform from Novell that supports email, calendaring, personal information management, instant messaging, and document management. The platform consists of the client software, which is available for Windows, Mac OS X, and Linux, and the server software, which is supported on Windows Server, NetWare, and Linux. The latest generation of the platform is GroupWise 2012. Pegasus Mail (PMail) is suitable for single or multiple users on stand-alone computers and for internal and Internet mail on local area networks. Pegasus Mail has minimal system requirements compared with competing products, for instance the installed program (excluding mailboxes) for version 4.52 requires only around 13.5 MB of hard drive space. Since Pegasus Mail does not make changes to the Windows registry or the system directory, it is suitable as a portable application for USB drives. Language packs are available...
Words: 481 - Pages: 2
...Active Directory Design Scenario My first question: Is what type of business or industry the company represents? Who will be the executive sponsor, the project architect, project manager? Will this person also be in charge of the Active Directory? What is the budget, time-frame and schedule of this project? Does the other company have an IT Administrator or are they using a consultant? If so, it would be more cost effective to hire an IT Administrator. What are the business needs of the company we are merging with? Who is the WAN person responsible for the network? Have him/her provide a map of your current WAN network. What applications will be integrated in the AD/DS design? Will a variety of technologies, different levels of security and a global presence now or in the future be required? Where will all your data be stored? Will we be having geographically separate data rooms? Who are the Active Directory Service and Data Owners? (Service owners include the forest owner, the AD/DNS owner, and the site topology owner. The Data Owners will include organizational unit Owners. Will the other site have a Service Administrator or a Data Administrator? Because it is cost saving having Data Administrators. The Data Administrators are users within a Domain, who are responsible for both, maintaining data that is stored in the AD/DS i.e. user and group accounts and maintaining computers that are members of their domain. Service Administrators require...
Words: 293 - Pages: 2
...Лабораторная работа № 1. ИССЛЕДОВАНИЕ ВЗАИМОДЕЙСТВИЙ РАБОЧИХ СТАНЦИЙ СЕТИ В ПРОТОКОЛЕ NETBIOS. Цель работы: Изучение протокола NETBIOS сети Novel Netware. 1.Общее описание протокола NETBIOS фирмы Novel. Протокол NETBIOS (Network Basic Input/Output System) – базовая сетевая операционная система ввода/вывода, разработанная IBM. Этот протокол работает на трех уровнях семиуровневой модели OSI: транспортном, сетевом и уровне каналов связи. Протокол NETBIOS поддерживается в сетях IBM (IBM PC LAN), Novell Netware, Microsoft Windows for Workgroups и других сетях. Для работы с протоколом NETBIOS в сетях Novell NetWare специальный эмулятор NETBIOS - программу netbios.exe, входящую в операционнцю систему. Эмулятор NETBIOS фирмы Novel функционирует на основе протокола IPX(межсетевой обмен пакетами). Это позволяет совмещать NETBIOS с любой из более ста ЛВС поддерживаемых Netware. Ниже приводится схема реализации NETBIOS для ЛВС персональных компьютеров, поддерживаемых Netware. -----------------------¬ ¦ Уровни ¦ +----------------------+ ¦7. Прикладной ¦ Сетевые прикладные программы +----------------------+ ¦6.Представление ¦ MS-DOS-оболочка +----------------------+ ¦5. Сеансовый ¦ Эмулятор NETBIOS +----------------------+ ¦4.Транспортный ¦ Протокол межсетевого обмена IPX ...
Words: 1841 - Pages: 8
...ACTIVE DIRECTORY HEALTH CHECK One of the most critical and challenging aspects of today’s networked computing environments is ensuring that all network services are functioning optimally. The Accudata Systems Network Health Checks proactively examine your network resources to determine the health of your environment and that all resources are readily available and performing as expected. Why should you perform a Microsoft® Active Directory® Health Check? A directory service is the main switchboard of a network operating system. It manages the identities and brokers the relationships between distributed resources so that they can work together. Further, a directory service is a place to store information about corporate and organizational assets such as applications, files, printers, and users. It provides a consistent method for naming, describing, locating, accessing, managing, and securing information about the resources. Microsoft Active Directory was designed to be feature-rich, flexible, and scalable. Active Directory requires a considerable investment of time during the initial planning and design stages as well as throughout the life of the network. As the networking environment changes, it is critical to ensure that Active Directory continues to function as required. Some of the areas of Active Directory that often require attention include: Schema or Global Catalog replications do not occur optimally, causing intermittent directory problems FSMO roles...
Words: 708 - Pages: 3
...My first question: Is what type of business or industry the company represents? Who will be the executive sponsor, the project architect, project manager? Will this person also be in charge of the Active Directory? What is the budget, time-frame and schedule of this project? Does the other company have an IT Administrator or are they using a consultant? If so, it would be more cost effective to hire an IT Administrator. What are the business needs of the company we are merging with? Who is the WAN person responsible for the network? Have him/her provide a map of your current WAN network. What applications will be integrated in the AD/DS design? Will a variety of technologies, different levels of security and a global presence now or in the future be required? Where will all your data be stored? Will we be having geographically separate data rooms? Who are the Active Directory Service and Data Owners? (Service owners include the forest owner, the AD/DNS owner, and the site topology owner. The Data Owners will include organizational unit Owners. Will the other site have a Service Administrator or a Data Administrator? Because it is cost saving having Data Administrators. The Data Administrators are users within a Domain, who are responsible for both, maintaining data that is stored in the AD/DS i.e. user and group accounts and maintaining computers that are members of their domain. Service Administrators require a much higher skill set because they...
Words: 289 - Pages: 2
...Michael Alexander 14 Hart Way ( Sometown, NSW ( 0400 000 000 ( michael@somedomain.com= See CareerOne’s advice articles, videos and resume building tool here |Targeting Entry-Level Help-Desk Positions | • Upcoming XYZ University graduate offering a strong academic background in IT combined with excellent internship experience as a help-desk analyst. • Consistently recognized for technical troubleshooting skills used to rapidly and cost-effectively resolve challenging technical issues. • Quickly learn and master new technology; equally successful in both team and self-directed settings; and proficient in a range of computer systems, languages, tools and testing methodologies. | |Education | | |XYZ UNIVERSITY, Sometown, NSW |Degree expected 12/11 | B.S. in Computer Information Systems ( GPA: 3.7/4.0 Concurrent Employment with studies: • Student Help Desk Technician (2009 to Present): Provide networking/desktop support and perform mainframe and account maintenance tasks. Earned commendations for teamwork, flexibility and work excellence in providing IT support to students and faculty. • Sales Representative...
Words: 365 - Pages: 2
...Cover Page Kashif Tahir Research Assignment Lesson 8 Professor Espinoza ISM4220 Active Tree three for a hypothetical organization with multiple departments The difference between Active Directory Tree and NDS: The concept of using directory services in networked computing environments is not new. For example, many companies have implemented white pages using first-generation directories to make basic information about employees (for example, location, e-mail address and telephone number) available across the organization. E-mail applications have provided directories in the form of address books to simplify the process of finding people and sending them e-mail. In addition, products such as Novell's NetWare have shown that it is possible to simplify basic management tasks by including a directory service as part of their offering. With the increase of distributed computing based on Internet technologies, however, the role that most companies need directory services to play is changing. Directory services must be capable of being used in all of the following roles: * User and network resource management—by providing a scalable, hierarchical information repository to simplify tasks such as delegating administrative privileges and locating network resources such as printers * Security authentication and authorization services—by providing flexible authentication and consistent authorization services that minimize barriers to doing business over the Internet...
Words: 794 - Pages: 4