...Oracle Database 11g Release 2 (11.2) Installation On Oracle Linux 6 This article describes the installation of Oracle Database 11g Release 2 (11.2) (64-bit) on Oracle Linux 6 (64-bit). The article is based on a server installation with a minimum of 2G swap, with both SELinux and the firewall disabled. The following package groups were included for this installation. * Base System * Base * Debugging Tools * Directory Client * Hardware monitoring Client * Large Systems Performance * Network file system client * Performance Tools * Perl Support * Servers * Server Platform * System administration tools * Desktops * Desktop * Desktop Platform * Fonts * General Purpose Desktop * Graphical Administration Tools * X Windows System * Applications * Internet Browser * Development * Development Tools An example of this type of Linux installations can be seen here. Alternative installations may require more packages to be loaded, in addition to the ones listed below. Note. At the time of writing Oracle have not certified any of their database products on OL6 or RHEL6, so you shouldn't use these operating systems for anything important until the certification is complete. * Download Software * Unpack Files * Hosts File * Set Kernel Parameters * Setup * Installation * Post Installation Download Software Download the...
Words: 1320 - Pages: 6
...Build Your Own Oracle RAC Cluster on Oracle Enterprise Linux and iSCSI (Continued) The information in this guide is not validated by Oracle, is not supported by Oracle, and should only be used at your own risk; it is for educational purposes only. 12. Create "oracle" User and Directories Perform the following tasks on both Oracle RAC nodes in the cluster! In this section we will create the oracle UNIX user account, recommended O/S groups, and all required directories. The following O/S groups will be created: Description | Oracle Privilege | Oracle Group Name | UNIX Group name | Oracle Inventory and Software Owner | | | oinstall | Database Administrator | SYSDBA | OSDBA | dba | Database Operator | SYSOPER | OSOPER | oper | We will be using the Oracle Cluster File System, Release 2 (OCFS2) to store the files required to be shared for the Oracle Clusterware software. When using OCFS2, the UID of the UNIX user " oracle" and GID of the UNIX group " oinstall" must be the same on both of the Oracle RAC nodes in the cluster. If either the UID or GID are different, the files on the OCFS2 file system will show up as "unowned" or may even be owned by a different user. For this article, I will use 501 for the " oracle" UID and 501 for the " oinstall" GID. Note that members of the UNIX group oinstall are considered the "owners" of the Oracle software. Members of the dba group can administer Oracle databases, for example starting up and shutting down databases. Members...
Words: 13991 - Pages: 56
...Guide to UNIX Using Linux Fourth Edition Chapter 5 Answers to the Chapter 5 Review Questions 1. You have just finished a 25-page paper that you have written using Emacs. The file containing the paper is called /assignments/data_sources. After your instructor has briefly looked at the paper, she recommends that you change all instances of the reference “data is” to “data are” before you submit it. Which of the following commands can you use to locate these references in the file for a quick assessment of how much you have to change? c. grep "data is" /assignments/data_sources 2. You are interested in determining the number of words in your /assignments/data_sources file mentioned in Question 1. Which of the following commands should you use? a. wc -w /assignments/data_sources 3. Which of the following are examples of manipulation and transformation commands? (Choose all that apply.) a. sed b. pr c. join d. paste 4. Which of the following is true of the pipe operator? (Choose all that apply.) d. It redirects the output of one command to the input of another command. 5. Because the data was formatted the same in two inventory files, you decided to combine their contents into one file. Now you want to determine if there are duplicate entries on consecutive lines in the new file. Which of the following commands enables you to find the duplicate entries? c. uniq 6. Your friend is using the command comm entryfile, but is getting an error message. What...
Words: 971 - Pages: 4
...NETW240 Final Exam Study Guide YOU MAY WANT TO PRINT THIS GUIDE. 1. The Final Exam is open book, open notes. The maximum time you can spend in the exam is 3 hours, 30 minutes. If you have not clicked the Submit For Grading button by then, you will be exited from the exam automatically. In the Final Exam environment, the Windows clipboard is disabled, so you will not be able to copy exam questions or answers to or from other applications. 2. You should click the Save Answers button in the exam frequently. This helps prevent connection timeouts that might occur with certain Internet service providers and also minimizes lost answers in the event of connection problems. If your Internet connection does break, when you reconnect, you will normally be able to get back into your Final Exam without any trouble. Remember, though, that the exam timer continues to run while students are disconnected, so students should try to log in again as quickly as possible. The Help Desk cannot grant any student additional time on the exam. 3. See Syllabus "Due Dates for Assignments & Exams" for due date information. 4. Reminders * You will only be able to enter your online Final Exam one time. * Click the Save Answers button often. * If you lose your Internet connection during your Final Exam, log on again and try to access your Final Exam. If you are unable to enter the Final Exam, first contact the Help Desk and then your instructor. * You will always be able to see...
Words: 1361 - Pages: 6
...Ronlad Sturgess IT-250 / Linux Assignment 6.1 Pg.582 1. Which commands can you use from the command line to send a file to the default printer? a. lpr/lp, sends jobs to the printer b. lpr, prints a file 3. Which commands list your outstanding print jobs? a. lpq/lpstat – Displays the status of the print queue 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. System-config-printer b. lpinfo Displays available drivers c. lpadmin configures printers d. The cups native protocol is IPP Pg.669 1. What advantage does a switch have over a hub? a. Switches are faster and switches have a repeater which boosts your speed 3. Name two servers that allow you to share directories between systems. b. NFS c. Samba 5. What is a common function of a router? What is this function called? a. A router connects a LAN to another network, such as the internet. A router can perform several functions, the most common of which is allowing several systems to share a single Internet connection and IP address is NAT. When a router uses NAT, the packets from each system on the LAN appear to come from a single IP address; the router passes return packets to the correct system. b. A router can also act as a firewall. 7. Which tool can you use to configure a wireless NIC (rather than having it be configured automatically)? a. The network manager applet b. CLI:...
Words: 254 - Pages: 2
...Ryan Pilatowski IT 250 linux 1/23/13 1. A. make the file executable : $ chmod +x filename.sh Run the script: $ ./filename.sh B. it reads the name from stdin and cats it to journal-file rather than stdout. 2. If you replace "$@" with "$*" in the out script, cat or less would be given a single argument: a list of all files you specified on the command line enclosed within single quotation marks. This list works when you specify a single filename. When you specify more than one file, the shell reports No such file or directory because there is not a file named the string you specified on the command line (the SPACEs are not special characters when they are enclosed within single quotation marks). 3. Sort,tsort diff, patch,diff3, sdiff, cmp, comm, uniq, expand, unexpand, cut, colrm, paste, join, head, tail, grep, look, sed,awk, sed, awk, wc, tr, fold, fmt, ptx, column, nl, pr, gettext, iconv, recode, groff, gs, TeX, lex, yacc, 4. $ function pores } * Chmod u+x $1 * } * a. When might such a function be useful? * When you are writing many shell scripts, it can get tedious to give many * chmod commands. This function speeds up the process. * b. Revise the script so that it takes one or more filenames as arguments * and adds execute permission for the user for each file argument. * $ function perms { * > chmod u+x $* * > } * c. What can you do to make the function available every time you log in? * Put the...
Words: 447 - Pages: 2
...Hardware and software COMPUTERS 1 Computers ENIAC – 1950 2 What is a computer? A data processing device designed to: } input … } data (e.g. mp3 3ile) } software (e.g., iTunes) } process data by applying software } output results } store data / program / results between uses Apple II – 1977 3 Computer hardware Storage Nonvolatile Non-portable (hard disk) Portable (e.g. CD) Battery Wall plug RAM (Random Access Memory) Volatile Power Source Mouse Keyboard Tablet Input Microphone Devices Webcam Accelerometer Central Central Processing Processing Units Units (cores) (cores) Monitor Printer Output Plotter Devices Projector Input Processing Output 4 Components of a computer } Hardware } CPU (Central Processor Unit): } I/O devices (Input / Output) } Storage } Power source } Software } Operating System } Applications Is it a computer? Universal computation } A processor with the right software can emulate any other data processing device } E.g., a smartphone can be a music player, translator, calculator, GPS navigator,...
Words: 2444 - Pages: 10
...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...
Words: 228961 - Pages: 916
...The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advocacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in electronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version 13.07 09.12 09.11 09.10 Date July 6, 2013 December 14, 2009 November 19, 2009 October 3, 2009 Description Second Internet Edition. First Internet Edition. Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. Second draft incorporating the first editing pass. Completed first draft. 09.08 09...
Words: 100185 - Pages: 401
...Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need to Use This Book.........................................................................................................4 What Is Linux? ........................................................................................................................................5 Linus Torvalds and the Birth of Linux.............................................................................................5 Why Choose Linux?.........................................................................................................................6 What Is Red Hat Linux 9?................................................................................................................7 What Is Covered in This Book?..............................................................................................................8 Conventions in This Book......................................................................................................................9 Customer Support...............
Words: 155032 - Pages: 621
...Contents At a Glance I Advanced UNIX Programming with Linux Advanced Linux Programming 1 Getting Started 3 2 Writing Good GNU/Linux Software 17 3 Processes 45 4 Threads 61 5 Interprocess Communication 95 II Mastering Linux 6 Devices 129 7 The /proc File System 147 8 Linux System Calls 167 9 Inline Assembly Code 189 10 Security 197 11 A Sample GNU/Linux Application 219 III Appendixes A Other Development Tools 259 B Low-Level I/O 281 C Table of Signals 301 D Online Resources 303 E Open Publication License Version 1.0 305 F GNU General Public License 309 Advanced Linux Programming Mark Mitchell, Jeffrey Oldham, and Alex Samuel www.newriders.com 201 West 103rd Street, Indianapolis, Indiana 46290 An Imprint of Pearson Education Boston • Indianapolis • London • Munich • New York • San Francisco Advanced Linux Programming Copyright © 2001 by New Riders Publishing FIRST EDITION: June, 2001 All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. International Standard Book Number: 0-7357-1043-0 Library of Congress Catalog Card Number: 00-105343 05 04 03 02 01 7 6 5 4 3 2 1 Interpretation of the printing code:The rightmost doubledigit number is the year of the book’s printing; the rightmost single-digit...
Words: 80064 - Pages: 321
...|SD2005 DESIGN, CULTURE & TECHNOLOGY | Worksheet no.SD2005 | Weekly Individual Report | 28/9/2012 | POLYU HDMDT | Weekly Group Report Please fill in the form and submit to the course web site: http://courses.sd.polyu.edu.hk/ |Student and Project information | |Student name |Student ID |Role & responsibility | |Lui Yan Yan |11078781D |Define keywords, Collect and Classify data | |Poon Ka Man |11147491D |Define keywords, Collect and Classify data | |Lam Ching Mei |11039135D |Define keywords, Collect and Classify data | |Ngai Sze Ming, Ice |11352703D |Define keywords, Collect and Classify data | | | | | | ...
Words: 1094 - Pages: 5
...Android ™ A Programmer’s Guide This page intentionally left blank Android ™ A Programmer’s Guide J.F. DiMarzio New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2008 by The McGraw-Hill Companies. All rights reserved. Manufactured in the United States of America. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. 0-07-159989-4 The material in this eBook also appears in the print version of this title: 0-07-159988-6. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. For more information, please contact George Hoare, Special Sales, at george_hoare@mcgraw-hill.com or (212) 904-4069. TERMS OF USE This is a copyrighted work and The McGraw-Hill Companies, Inc. (“McGraw-Hill”) and its licensors reserve all rights in and...
Words: 43266 - Pages: 174
...Oracle VM VirtualBox R User Manual Version 5.0.0 c 2004-2015 Oracle Corporation http://www.virtualbox.org Contents 1 First steps 1.1 Why is virtualization useful? . . . . . . . . . . . . . . . 1.2 Some terminology . . . . . . . . . . . . . . . . . . . . . 1.3 Features overview . . . . . . . . . . . . . . . . . . . . . 1.4 Supported host operating systems . . . . . . . . . . . . 1.5 Installing VirtualBox and extension packs . . . . . . . . 1.6 Starting VirtualBox . . . . . . . . . . . . . . . . . . . . 1.7 Creating your first virtual machine . . . . . . . . . . . 1.8 Running your virtual machine . . . . . . . . . . . . . . 1.8.1 Starting a new VM for the first time . . . . . . 1.8.2 Capturing and releasing keyboard and mouse 1.8.3 Typing special characters . . . . . . . . . . . . 1.8.4 Changing removable media . . . . . . . . . . . 1.8.5 Resizing the machine’s window . . . . . . . . 1.8.6 Saving the state of the machine . . . . . . . . 1.9 Using VM groups . . . . . . . . . . . . . . . . . . . . . 1.10 Snapshots . . . . . . . . . . . . . . . . . . . . . . . . . 1.10.1 Taking, restoring and deleting snapshots . . . 1.10.2 Snapshot contents . . . . . . . . . . . . . . . . 1.11 Virtual machine configuration . . . . . . . . . . . . . . 1.12 Removing virtual machines . . . . . . . . . . . . . . . . 1.13 Cloning virtual machines . . . . . . . . . . . . . . . . . 1.14 Importing and exporting virtual machines . . . . . . . 1.15 Global Settings . . . . . . . . . . . . . . . . . . . . . ....
Words: 143714 - Pages: 575
...LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned...
Words: 159689 - Pages: 639