Free Essay

Lab 4.1: Using Linux Command-Line Basics

In:

Submitted By nikid
Words 780
Pages 4
Labs

Lab 4.1: Using Linux Command-Line Basics

What is the purpose?

This lab demonstrates how to redirect data from a process and how to identify and kill a process.
What are the steps?
• Task 1: Redirecting and piping standard output
Procedure
1. Obtain a list of files from the home directory, including the hidden files. Redirect the output to a file named Listing by using the ls -a > listing command.
2. Obtain a long list of files, including the hidden files, and append the output to the same file.
3. Use the cat listing | less command to view the file and pipe the output to less.
4. Use the cat command to view the file again. However, this time, pipe the output to lpr to print the file.
5. Redirect the output of ls to the special file /dev/null.
What happens?
It’s redirected to dev/null
Why?
It’s null.

• Task 2: Putting tasks in the background and terminating the job
Procedure
1. Use the tail –f command to view your listing file from the previous task. The –f option tells tail to follow changes; therefore, the file will continue to run this command until you cancel the command by pressing Ctrl+C. Put the file in the background using the tail -f listing & command. You may need to press Enter again to view the command prompt.
2. Put the process in the background and display the prompt again. Run the top command in the foreground. This will provide you a list of your top 20 processes by CPU usage. Put this list in the background and stop it by pressing Ctrl+Z.
3. Run Nautilus from the command line and in the background by using the nautilus & command.
4. Start Firefox from the command line by typing firefox in the background.
5. Use the jobs command to see a list of background jobs by their job numbers, statuses, and names. Kill the tail job using the percent sign with the job number, for example kill %1.
6. Obtain the process identification number (PID) for top using ps -ef and pipe that to grep using the ps -ef | grep top command. Use this PID to kill the process. The PID for each process will vary.
7. Use kill and the job number to kill Nautilus.
8. Obtain the process id for Firefox and kill it using the process id.
9. Show your completed setup to your instructor.

Did it work? o Did the data end up in the listing file that you expected? Yes o Were you able to kill the process as expected? Yes o Did the processes go into the background as expected? Yes

Lab 4.2: Using bash Features
What is the purpose?
This lab demonstrates how to redirect error messages, how to recall and reuse previous commands, how to autocomplete directory and file names, and how to create aliases for Linux commands.
What is present in the file? /bin/bash
Task 2: Using Bash History
1. Press the up arrow key on your keyboard when you are at the bash prompt. What happens? The last command typed appears.
4.
6. cat find.out

Task 3: Using the bash command-line completion
2. cd /usr/ sbin
Did it work?
Were you successful in filtering the error output from standard output? Yes
Were you successful in using the Up Arrow key and the bang to recall previous commands? Yes
Were you able to use the Tab key to autocomplete directory names? Yes
Lab 4.3: Using vi/vim
What is the purpose?
In this lab, you will practice working on the vimtutor
What are the steps?
Task 1: Learning vim Procedure
1. Run the vimtutor from the command prompt and follow the directions to create a new directory.
2. Complete all the steps as directed.
3. Save your work in your home directory so that your instructor can review it.

Task 2: Creating aliases
Procedure
1. In your home directory, open the .bashrc file in vim.
2. To the last line of the file, add the line alias ll=’ls –l’. This will create an alias to the command ls –l.
3. Type 11 and press enter.
4. Create three other aliases of your choice. Select the aliases that will make it easier for you to work with the commands or easier names for existing commands, such as an alias mapping the word “search” to grep.
5. Show your completed .bashrc file to your instructor.

Did it work? o Was the file saved in your home directory?
 Yes o Does the file contain all your changes from the tutorial?
 Yes o Did your aliases work?
 Yes

Similar Documents

Premium Essay

Itech 1005

...ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha ATMC Sydney Assignment has to be submitted online on Moodle on or before the due date. SUBJECT CODE: ITECH1004 SUBJECT TITLE: NETWORK OPERATING SYSTEM ASSIGNMENT NUMBER AND TITILE: 1- NETWORKING ASSIGNMENT WORD COUNT (IF APPLICABLE): 3274 DUE WEEK: WEEK-6 LAB/TUTORIAL GROUP: LAB 2 LECTURER: SANJAY JHA TUTOR: SANJAY JHA STUDENT ID (FedUni): 30314027 STUDENT FAMILY NAME: KIRAN STUDENT GIVEN NAMES: RIJAL I declare that this assignment is my individual work. I have not worked collaboratively nor have I copied from any other student’s work or from any other source except where due acknowledgement is made explicitly in the text, nor has any part been written for me by another person. I realize that the penalties may ensure for late submission or any other breaches of assignment rules. 1 20 December 2015 ITECH1002 Assignment 1 Lecturer’s Name: Sanjay Jha Kiran Rijal Student ID: 30314027 Contents 1. INTRODUCTION ................................................................................................................... 3 1.1 VIRTUALIZATION .................................................................................................................... 3 1.2 NUMBER SYSTEM .................................................................................................................. 3 CONVERSION .....................................................

Words: 3418 - Pages: 14

Free Essay

Cpa Requirements

...copyright. No part may be reproduced in any form or by any means, including photocopying, or utilized by any information storage and retrieval system without permission of the copyright owner. All rights reserved PARCA V 3.5 Page 1 PARCA CPAS2014 Requirements Certified PACS Associate (CPAS) requirements This document contains the detailed requirements for the certification of a CPAS2014 or Certified PACS Associate. The focus is on general technical and clinical understanding. CPAS2014 is an update to the original CPAS requirements published in 2005 to include new technologies and developments. The requirements are split up in two sections: A) Technical (IT) and B) Clinical. A. Technical (IT) requirements 1. Computer basics (20%) 1.1 Hardware: A computer has hardware components, i.e. CPU, memory, Disk, removable media, display card and display and data entry devices (aka peripherals) such as keyboard and mouse and others. There are several standard interfaces, such as serial and parallel ports, FireWire and several choices of disk and network interfaces. – Know how to distinguish between these components and interfaces and the function and characteristics of each of them. 1.2 CPU and Memory: The CPU and memory determine to a high degree the performance of the computer. – Know impact of the number of parallel processors, their speed and I/O path width (in bits) of the different processor types, the impact of dedicated processing boards and performance...

Words: 2505 - Pages: 11

Premium Essay

Class Notes - Networking

...PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. Essential Linux Administration: A Comprehensive Guide for Beginners Page 1 of 4 PRINTED BY: Norman Puga . Printing is for personal, private use only. No part of this book may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted. ESSENTIAL LINUX ® ADMINISTRATION: A COMPREHENSIVE GUIDE FOR BEGINNERS i CHUCK EASTTOM WITH SERGE PALLADINO Course Technology PTR A part of Cengage Learning 9781133795308 i ii Essential Linux Administration: A Comprehensive Guide for Beginners Chuck Easttom with Serge Palladino Publisher and General Manager, Course Technology PTR: Stacy L. Hiquet Associate Director of Marketing: Sarah Panella Manager of Editorial Services: Heather Talbot Marketing Manager: Mark Hughes Acquisitions Editor: Heather Hurley Project and Copy Editor: Marta Justak Technical Reviewer: Danielle Shaw Interior Layout Tech: MPS Limited, a Macmillan Company Cover Designer: Mike Tanamachi Indexer: Sharon Shock Proofreader: Kelly Talbot © 2012 Course Technology, a part of Cengage Learning. ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording...

Words: 34239 - Pages: 137

Free Essay

Blah

...……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction...

Words: 4400 - Pages: 18

Free Essay

Paper

...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work under...

Words: 22047 - Pages: 89

Premium Essay

Module 3 Essay

...Syllabus NT1210 Introduction to Networking SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory, 22 Lab) Prerequisite: NT1110 Computer Structure and Logic or equivalent © ITT Educational Services, Inc. All Rights Reserved. -1- 05/08/2013 Introduction to Networking SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments. MAJOR INSTRUCTIONAL AREAS 1. Networking fundamentals 2. The OSI model and its use in networking 3. LANs, WANs, MANs and their implementation 4. Physical layer fundamentals 5. Basics of the data link layer 6. The functions of TCP/IP 7. IP addressing, subnetting, and supernetting 8. Diagramming the physical components that comprise a network 9. Logic created by the interconnectivity of network components 10. Applying network security 11. Future developments in networking COURSE OBJECTIVES 1. Explain key networking concepts and terminology. 2. Identify the advances...

Words: 4795 - Pages: 20

Free Essay

Technology

...VOCATIONAL HIGHER SECONDARY TEACHER’S SOURCE BOOK COMPUTER SCIENCE FIRST YEAR Government of Kerala Department of Education SCERT - 2005-06 STATE COUNCIL OF EDUCATIONAL RESEARCH AND TRAINING Vidyabhavan, Poojappura, Thiruvananthapuram-12 Prepared by: State Council of Educational Research & Training (SCERT) Vidyabhavan, Poojappura, Thiruvananthapuram -12 Kerala E-mail:scertkerala@asianetindia.com Type setting by: SCERT Computer Lab. © Government of Kerala Education Department 2005 P REFACE Dear Teachers, Computer Science is concerned with the gathering, manipulation, classification, storage and retrival of knowledge. Understanding Computer Science, is necessary because of its power and influence in modern society. Learning of Computer Science should be activity based, process oriented, student-centred, environmental based and life oriented. The approach to learning is based on five domains of science: Knowledge domain, process domain, application and connection domain, domain of attitudes and values and creativity domain. But we know that most of the present vocational higher secondary teachers are not familiar with this paradigm. Hence for the first time we are introducing sourcebooks for all the subjects in the vocational higher secondary curriculum. This source book for computer science aims to provide guidelines to the teachers of our state to change their pedagogy from the conventional content-based approach to the process...

Words: 27034 - Pages: 109

Free Essay

Hacking Tips

...Hacking Vol. 2 Number 1 Internet for Dummies -- skip this if you are a Unix wizard. But if you read on you’ll get some more kewl hacking instructions. ____________________________________________________________ The six Guides to (mostly) Harmless Hacking of Vol. 1 jumped immediately into how-to hacking tricks. But if you are like me, all those details of probing ports and playing with hypotheses and pinging down hosts gets a little dizzying. So how about catching our breath, standing back and reviewing what the heck it is that we are playing with? Once we get the basics under control, we then can move on to serious hacking. Also, I have been wrestling with my conscience over whether to start giving you step-by-step instructions on how to gain root access to other peoples’ computers. The little angel on my right shoulder whispers, “Gaining root without permission on other people’s computers is not nice. So don’t tell people how to do it.” The little devil on my left shoulder says, “Carolyn, all these hackers think you don’t know nothin’! PROOVE to them you know how to crack!” The little angel says, “If anyone reading Guide to (mostly) Harmless Hacking tries out this trick, you might get in trouble with the law for conspiracy to damage other peoples’ computers.” The little devil says, “But, Carolyn, tell people how to crack into root and they will think you are KEWL!” So here’s the deal. In this and the next few issues of Guide to (mostly) Harmless Hacking I’ll tell...

Words: 13749 - Pages: 55

Premium Essay

History of Computing

...Computer operating systems (OSes) provide a set of functions needed and used by most application programs on a computer, and the linkages needed to control and synchronize computer hardware. On the first computers, with no operating system, every program needed the full hardware specification to run correctly and perform standard tasks, and its own drivers for peripheral devices like printers and punched paper card readers. The growing complexity of hardware and application programs eventually made operating systems a necessity. Contents [hide] 1 Background 2 Mainframes 2.1 Systems on IBM hardware 2.2 Other mainframe operating systems 3 Minicomputers and the rise of Unix 4 Microcomputers: 8-bit home computers and game consoles 4.1 Home computers 4.2 Rise of OS in video games and consoles 5 Personal computer era 6 Rise of virtualization 7 See also 8 Notes 9 References 10 Further reading Background[edit] Question book-new.svg This section does not cite any references or sources. Please help...

Words: 4042 - Pages: 17

Free Essay

Spcc

...Project Requirement fulfilled by using LabVIEW 6 3.2 Why should I Use LabVIEW? 7 3.3 How does LabVIEW work? 8 3.3.1 Front Panel 8 3.3.2 Block Diagram 9 3.3.3 Icon 9 4. System Analysis 10 4.1 Flow Chart – Client 10 4.2 Flow Chart – Server 11 4.3 Floor Plan 12 5. Protocol Design 13 5.1 The Internet and Client-Server Model 13 14 5.2 Using TCP/IP with LabVIEW 15 5.3 Control Interface - Client Connection 16 5.3.1 TCP Open Connection 16 5.3.2 TCP Write 16 5.4 Indicator Interface - Server Connection 17 5.4.1 TCP Listen VI 17 5.4.2 TCP Read 17 6.4.3 TCP Close Connection 18 5.4.4 Clear Error VI 18 6. Hardware Research 19 7. Extra Features 22 7.1 Alarm 22 7.2 Smart Control 23 7.3 Multiple User Login 23 7.4 Master Control 24 8. Assumption 25 9. Limitation 26 10. Future Enhancement 27 11. Conclusion 28 12. References 29 13. Appendix 31 13.1 User Manual 31 13.2 Class Work Program 37 13.2.1 Television 37 1. Acknowledgement First and foremost, I would like to express my deepest gratitude to everyone that made it possible for me to complete this System Programming and Computer Control (SPCC) assignment. This assignment was one of the most challenging task for me but putting in massive amount of determination, awareness and perseverance eventually helped me to excel and complete this assignment within the deadline. For this assignment, I felt humbled to be able to put all the practices during lab and lecture sessions into the...

Words: 5590 - Pages: 23

Premium Essay

It and Its Scope

...UNIVERSITY OF MUMBAI Bachelor of Engineering Information Technology (Third Year – Sem. V & VI) Revised course (REV- 2012) from Academic Year 2014 -15 Under FACULTY OF TECHNOLOGY (As per Semester Based Credit and Grading System) University of Mumbai, Information Technology (semester V and VI) (Rev-2012) Page 1 Preamble To meet the challenge of ensuring excellence in engineering education, the issue of quality needs to be addressed, debated and taken forward in a systematic manner. Accreditation is the principal means of quality assurance in higher education. The major emphasis of accreditation process is to measure the outcomes of the program that is being accredited. In line with this Faculty of Technology of University of Mumbai has taken a lead in incorporating philosophy of outcome based education in the process of curriculum development. Faculty of Technology, University of Mumbai, in one of its meeting unanimously resolved that, each Board of Studies shall prepare some Program Educational Objectives (PEO‟s) and give freedom to affiliated Institutes to add few (PEO‟s) and course objectives and course outcomes to be clearly defined for each course, so that all faculty members in affiliated institutes understand the depth and approach of course to be taught, which will enhance learner‟s learning process. It was also resolved that, maximum senior faculty from colleges and experts from industry to be involved while revising the curriculum. I am happy to state...

Words: 10444 - Pages: 42

Premium Essay

Police Abuse Essay

...research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided...

Words: 16182 - Pages: 65