Free Essay

Nt1430 Unit 1

In:

Submitted By darthbane
Words 527
Pages 3
Unit 1 Assignment 1

* Chap. 1

1.) What is Free Software? a. Here are three characteristics of free software. * The freedom to run the program, for any purpose (freedom 0) * The freedom to redistribute copies so you can help your neighbor (freedom 2) * The freedom to study how the program works, and adapt it to your needs (freedom 1) 4.) What are the Free Software Foundation/ GNU? What is Linux? What else has helped refine this OS? a. The (FSF) is a 501 non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to create, distribute and modify computer software, with the organization's preference for software being distributed under copy left. b. Linux is an open-source operating system modeled on UNIX c. Thousands of people helped refine the operating system online.

* Chap. 2

1.) What does the process of installing an OS like Fedora involve? a. Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible.

* Chap. 3
1.) What is a live system? What advantages does it have over an installed system? a. A live system gives you a chance to preview Fedora without installing it. It does not write to hard disks. b. You can view what a system might look like without taking the time of installing it and finding out it was not worth your time.
4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? a. Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive.
Multiple IDE or EIDE drives: the primary controller 8.) What does a fedora/RHEL system start X by default? a. How the user set it up, there is no default some will start automatically others will require a traditional login, or start the X server manually.

* Chap. 11 1.) How does single-user mode differ from multiuse mode? a. Single –user mode can only be used by one person at a time. Multiuse is multiply users
3.) What do the letters of the SU command stand for? What can you do with SU besides give yourself root privileges? How would you log in as Zach if you did not know his password but knew the root password? How would you establish the same environment that Zach has when first logs in? a. Super user b. You can read from or write to almost any file on the system c. You a terminal emulator window, when you supply the root password, you will be running with root privileges
7.) Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember a. Use symbols, uppercase letters and numbers to make a strong password.

Similar Documents

Free Essay

Nt1430 Unit 1 Excercises

...Unit 1 Exercises Chapter 1. 1. Free software is user can uses software at no charge. The characteristics of free software are no cost, full version, no expiration. 4. Free software Foundation/GNU is free to redistribute, modify, and study it. Linux is operating system developed through the cooperation of numerous people around the world, is product of the internet and is a free operating system. Linux provides UNIX and GNU. Linus Torvalds helps refine Linux system. Chapter 2. 1. The process installing Fedora/RHEL: a. Make sure the BIOS is set to boot from DVD drive. b. Check installation medium. c. Creates RAM disk uses in place of the hard disk. d. Configure system. e. Writes the operating system files to the hard disk. f. Completing installation on boot up. g. Ready to use. Chapter 3. 1. Live system can run on computer without installing Linux on the computer. Live system does not require installation and hard drive. 4. The /boot partition should be on first partition on hard drive. 8. Fedora system start X by default when enters runlevel 5 (graphical environment). Chapter 11. 1. Single-user mode has only the system console is enabled. Multi-user mode has all appropriate file systems are mounted, users can log in from all connected terminals, dial-up lines, and network connections. 3 The su command, also referred to as substitute user, super user, or switch user, allows a computer operator to change the current user account associated with the running...

Words: 328 - Pages: 2

Premium Essay

Nt1430 Unit 1 Ex 1

...Chapter 1 1. What is free software? Software that a user has the freedom to distribute and change 2. What are 3 characteristics of free software? Freedom to study how the program works, freedom to redistribute copies, and freedom to improve the program 3. What is GNU? Gnu’s not UNIX, is the complete UNIX-compatible software system that was written to be given away free to everyone who can use it. 4. What is Linux? An open-source operating system modelled on UNIX. 5. What did each provide to Linux? UNIX introduced people to the concept, GNU insured total freedom with it, and ran FreeBSD and NetBSD in Linux compatible binary. 6. Who helped build the O.S.? The internet helped mold Linux. Chapter 2 1. What does installing Fedora involve? 1. Set Bios to boot from CD/ DVD 2. Wait 60 seconds, it will install 3. RAM sets up instead of hard disk so it can be cancelled at any time 4. Configure Fedora 5. Write hard disk 6. First boot runs 7. Ready to use Chapter 3 1. What is a live system? An operating system from a removable medium 2. What advantages does it have over an installed system? Customization, cost, free market, stability, and community 3. Where is the /boot partition put? It must reside completely below cylinder 1023 of the hard disk. 4. When does Fedora system start X by default? It depends on distribution and how the user sets it up. Chapter 11 1. How does single-user differ from multi-user mode? Some...

Words: 362 - Pages: 2

Free Essay

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message, then...

Words: 270 - Pages: 2

Free Essay

Nt1430 Linux Networking (Unit 1 Linux Server Installation and Configuration)

...1. What are multiuser systems and why are they successful? Multiuser operating systems allow the multiple users to access the resources of single systems at a time or at different time. It allows many users to take advantage of the computer's resources simultaneously. Some permit 100's to 1000 users to take advantage of the computer's resources simultaneously. They are successful because of the powerful, efficient, stable and secure operating systems like LINUX. It has a capability of providing each user the same data ensuring total privacy from each user even while accessed by 100's of users simultaneously. 2. What is the Free Software Foundation/GNU? Linux? Which parts of the GNU/Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation (www.fsf.org) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compilers that are part of the GNU/Linux Operating Systems. Linux is the name of an operating system kernel developed by Linus Torvalds and expanded and improved What are multiuser by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the GNU/Linux Operating System. 3. In what language is Linux written? What does the language have to do with the success of Linux? Linux is written in the C programming language and because it is written in the C language the language can be imbedded in all type of devices...

Words: 1467 - Pages: 6

Premium Essay

Nt1430 Unit 2 Lab Procedure

...Unit 2 Lab Procedure ***IMPORTANT: Read the lab procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read...

Words: 1532 - Pages: 7

Free Essay

Nt2640

...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for All...

Words: 403 - Pages: 2

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

... Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Linux Week 1assignment 1

...NT1430 6/27/13 Unit 1 Exercises Assignment 1 Unit 1: 1. Free software is something that is free from the hands of the people you get it from and from this you can change it and modify it to what fits your needs. a. One characteristic of a free software is that the code must go along with the program. b. Users are encouraged to modify the code to make it better and share it with others. c. And lastly you can’t stop or restrict people from sharing this free software. 4. The Free Software Foundation/GNU was a project that was started by Richard Stallman who believed that giving the resources for free software was the way of the future. He also wrote the GNU kernel and system. Linux was developed by Linus Torvalds and was first introduced in September of 1991. Thousands of people world wide have helped make Linux/GNU what it is today. Unit 2: 1. Installing Fedora/RHEL is when you copy the operating system from a CD/DVD and you set up the files so that it works properly on Linux. Unit 3: 1. A live system gives the user the chance to view Fedora without actually installing it. 4. You put /boot at the beginning of the first partition so that Linux has no issue from booting on the drive. 8. You have to set the runlevel to 3, which is text based, and then you can log in and change it to startx. Unit 11: 1. If you log into the system in single-mode you can only sign in at a designated console and some filesystems may not be loaded. However...

Words: 364 - Pages: 2

Free Essay

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh and...

Words: 284 - Pages: 2

Free Essay

Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos...

Words: 1139 - Pages: 5

Free Essay

Nt1430

...Nt1430 Unit 4 Chptr 14 1. Which commands can you use from the command line to send a file to the default printer? lp or lpr 2. Which command would you give to cancel all print jobs on the system? Either sudo lprm – or sudo cancel –a will remove all jobs from the print queues 3. Which commands list your outstanding print jobs? lpq or lpstat 4. What is the purpose of sharing a Linux printer using Samba? Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? System-config-printer lpinfo Displays available drivers lpadmin configures printers The cups native protocol is IPP Chptr 10 1. Describe the similarities and differences between these utilities: a. scp and ftp SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were originally based on their own protocols, but both now use different protocols b. ssh and telnet Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the users against anyone with malicious intent while Telnet has no security measures whatsoever c. rsh and ssh They...

Words: 459 - Pages: 2

Premium Essay

Nt2640

...the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Free Essay

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Premium Essay

Unit 1 Graded Assignment 1

...Unit 1 Chapter Exercises (NT1430.U1.GA1) Chapter 1, Ex. 1, 4: 1. What is free software? List three characteristics of free software. Open licenses, no activation methods, frequent upgrades and patches. 4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation (www.fsf.org) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compiler, that are part of the Linux operating system. Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the Linux operating system. Chapter 2, Ex. 1: 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? An installation, sometimes referred to as a clean install, writes all fresh data to a disk. The installation program overwrites all system programs and data as well as the kernel. You can preserve some user data during an installation depending on where it is located and how you format/partition the hard disk. Alternatively, you can perform a clean install on an existing system without overwriting data by setting up a dual-boot system. Chapter 3, Ex. 1, 4, 8: 1. What is a live system? What advantages does it have over an installed system...

Words: 613 - Pages: 3