Premium Essay

It250 Chapter 2 Assignment

In:

Submitted By bdaddy0506
Words 1961
Pages 8
IT250: HOMEWORK

Chapter 2 Assignment
1- The process of installing Fedora/RHEL involves putting a CD into the DVD drive. Then you go through all the computer specifics, making choices from the menu.
2- The anaconda is an installation tool that performs an interactive installation using the graphical or textual interface.
3- I would set up a GUI on a server system to make it more users friendly.
4- To make a system boot from a DVD, first enter the BIOS and change the settings from hard disk to CD.
5- Free space in the area of the disk not occupied by any partition.
6- ISO image files are files that hold data you use to create DVD/CD
7- Two reason you should not use raid to replace backup are of you computer is stolen, in a fire.
8- Its RAM that is made to look like a floppy diskette or hard disk. It is frequently used as part of the boot process
9- SHA-256 is a set of cryptographic has functions. When you process a file using SHA-256 it generates a number based on the file.

ASSIGNMENT 3.1
PAGE 184
3. WHAT HAPPENS WHEN YOU GIVE THE FOLLOWING COMMNADS IF THE FILE NAMED DONE ALREADY EXISTS?
$ cp to_do done
$ mv to_do done
ANWSER: cp - copy files and directories mv - move (rename) files. You would just basically overwrite the file.
4. HOW CAN YOU FIND OUT WHICH UTILITIES ARE AVAILABLE ON YOUR SYSTEM FOR EDITING FILES ? WHICH UTILITIES ARE AVAILABLE FOR EDITING ON YOUR SYSTEM?
ANWSER: You have to use the 'which or whereis' utility. Which locates utilities by displaying the full pathname of the file for the utility. The whereis utility searches for files related to a utility looking in a standard location instead of using your search path.

PAGE 185
13. TRY GIVING THESE TWO COMMANDS:
$ echo cat
$ cat echo
EXPLAIN THE DIFFRENCES BETWEEN THEM.
ANWSER: echo

Similar Documents

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

It255

...Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating...

Words: 4114 - Pages: 17

Premium Essay

Seeking Help

...aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18

Free Essay

Linux

...Carlos Moises Pelaez | IT250 | Linux Operating System: Assignment 1.1 | 3/30/2013 | 1) In the free software world, there are several uses of the word "free." The two main ones are "free as in speech" and "free as in beer." Free as in speech means you are relatively unfettered in what you can do with the software. You can modify it, use it for whatever you want, and give it to others (or even sell it). Free as in beer means that you can obtain it for no monetary cost. Richard Stallman originally envisioned GNU to be free as in speech. At the time he started the project (in 1983), internet access was slow and expensive, high-capacity storage devices weren't readily available, and very few people had a personal computer. It would have been infeasible to offer GNU on a gratis basis. Stallman actually used to charge $150 for a tape with the GNU software on it, plus $15 for a manual. 2) The GNU project develops programs and utilities for an as yet rudimentary operating system known as "GNU." Since the programs are open-source, they have been adapted to work using the Linux kernel as well. Other than using its programs, there is no direct relationship. 3) Advantage #1 – Stability: If you have used other operating systems, once you have made the switch to Linux, you will notice that Linux has an edge over Windows here. I can remember rebooting Windows many times over the years, because an application crashed, and I could not continue working. Linux can crash also,...

Words: 1208 - Pages: 5