Free Essay

Unit 1 Exercises

In:

Submitted By Mixelplik
Words 470
Pages 2
Page 20-21
1. What is free software? List three characteristics of free software. Free software is a matter of the users’ freedom to run, copy, distribute, study, change and improve the software. Three characteristics are: Freedom to run the program for any purpose, freedom to redistribute copies, and freedom to improve the program and release your improvements to the public.
4. What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU is a project for creating an operating system, both kernel and system programs. Linux is a free kernel that was written in 1991. Linus Torvalds contributed the kernel while the GNU project contributed the system programs. It was built and refined by like-minded programmers all over the world.
Page 50
1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? It involves copying the operating system files from the installation media to the hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware.
Page 86
1. What is a live system? What advantages does it have over an installed system? A live system is when you run Linux from a CD/DVD instead of installing it on the computer. The advantage is you can test out Linux without disturbing your current operating system.
4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? On the physical volume.
8. When does the Fedora/RHEL system start X by default? After Anaconda probes the video card and monitor.
Page 498
1. How does single-user mode differ from multi-user mode? Single-user mode only has the system console enabled. Multi-user mode has the full operating system and all its features enabled.
3. What do the letters of the su command stand for? (Hint: it is not Superuser.) What can you do with su besides give yourself root privileges? How would you log in as Zach if you did not know his password but knew the root password? How would you establish the same environment that Zach has when he first logs in? The su command stands for substitute user. The su command can also allow you to login as another user. To login as another user, enter the su command followed by the user name and supply the root password.
7. Develop a strategy for coming up with a password that an intruder would not be likely to guess but that you will be able to remember? A strategy for password selection is to not use dictionary words, use both uppercase and lowercase letters, use numbers and symbols.

Similar Documents

Premium Essay

Unit 1 Exercise 1

...NT1310 Unit 1 Exercise 1 6/17/14 The world is connected more than ever through the use of the internet. From paying bills to shopping or enjoying leisure time on the web; taking advantage of the internet has become second nature to society. Focusing in on one specific type of networking entertainment, online gaming has become a major league sport in its own right. Online gaming allows people from all around the world to connect together to team up or fight against one another. Behind the scenes is where the real magic happens. Between the gamers sits countless devices and hardware not to mention miles and miles of land. Using Call of Duty as an example, each gamer has a copy of the map being played on installed onto their local computer. Every time the gamer moves the direction of their character, their data is sent from their machine to their router, and then out past the demarc point. On the other side of the demarc is where the service provider picks up the data and moves the data from local network to the central office (better known as the local exchange). The central office then sends the data over the MAN (metro area network) or WAN (wide area network) to continue the data to game server. If the data hasn’t reached the server yet (for example the gamer lives in Michigan and the server is in California) the data will be passed over the core (also known as long-haul) network which connects MANs and WANs of different geographies together. On the off chance...

Words: 398 - Pages: 2

Free Essay

Unit 1 Exercise 1

...Composition 1 Composition 1Composition 1didnt didn’t didn’t didn’t did nt didi did did did did did did did did did did did did did did did did did idid id idi did idid did did did dmdidi didid idid idid didid didid didi didididid didiid dididid iediddjiiiiiiiiiii did did didi did idid didi dd didi didii didid didid dddid didid didid diid idid idid idid ididididi did ididi idid ddi didi didi didi idid didid did dididi didid didid didi diid didid didi did idi did id id id I I did id id id id id I ii ii I I I I j j j j j j j d djdjd jdj du dudu dudu dud dud ud dudu dudud dudu dudud dud didi didi diid did idid didi didi did did idd didi diid d idid idi didi idi diid idi did did did id did did id di did did idid ddi didi didi didi did did did did did did did did didid didid didid didid didid did did did dd did id did did did di did di did did did did didi did didid did didid didi did d did did did dd didid did did did did di did did did did did did did did did did did did did did did didid did id did did did did dd did did d did did did did did did did did did did ddid did di didid id diidi di did idid dd...

Words: 253 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Unit 1 Exercise 1 Local Exchange When you send an email from New York to Japan, that email,is sent from your home to the local exchange point over the access network. Once it is in the local exchange it is then sent to aggregating points in different cities and counties over the regional network. Then it is aggregated and transported over the long-haul network so that it reaches the launching point at the country shoreline where it is then sent over the ocean network to Japan. Once there, the email is sent back over the long-haul or regional network to the local exchange and then on to the individual receiving the email. This occurs using mostly fiber optics so the speeds at which all this takes is at the speed of light which is approximately 127,000 miler per second. understand how to interface with the local exchange you must first understand the different networks that comprise it. The first network, being the access network. The access network is the network that connects the individual user or business with the telecommunications system. This is made up of a series of fiber-optic and copper cabling and passive and active equipment that connects you to the local exchange. The central office at the local exchange contains the switching equipment to direct your telephone, data , video, etc. to where it needs to go. The access network is very important to the local exchange since it’s the part that reaches the end user, who is you, and connects them. The metro network, sometimes...

Words: 339 - Pages: 2

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange carrier...

Words: 263 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...IP Addressing Scenario Unit 1 Exercise 1 ITT Technical Institute Floyd Washington Jr. April 4, 2015 When setting up a network that will consist of many host computers, one of the first things that an administrator must do is to determine what class of networks that they must administer to a given business. This is the point where every administrator must know how to implement classful and classless IP addressing. A classful network is a network addressing architecture used in the internet from 1981 until the introduction of Classless Inter-Domain Routing (CIDR) in 1993. Classful IP addressing divides the addtess space on the internet into five address classes. Each class is coded in the first four bits of the address. Today the classful network concepts remain in play only limited scope of the default configuration parameters. There are 32 bits contained in any IPv4 IP address. A Class A network has eight bits in the network number field and 24 bits in the rest of the field and covers a range of 0-126 in the leading field. There are 128 Class A networks with 16,777,216 hosts capability per network. The range of the Class A networks are 0.0.0.0 to 127.255.255.255. A Class B network has 16 bits in the network number field and has 16 bits in the rest of the fields and covers a range from 128.0.0.0 to 191.255.255.255. There are 16,385 Class B networks and each network has the capability of having 65,536 network hosts. A Class C network has 24bits in the network number...

Words: 756 - Pages: 4

Premium Essay

Unit 8 Exercise 1

...Unit 8 Exercise 1 Ja’Martay Bentley GE375 Tami Gary May 16, 2016 Freud’s psychoanalytic perspective emphasized unconscious and unresolved past conflicts (Carpenter & Huffman, 2011). Freud believed the psyche (mind) contained three levels of consciousness: conscious, preconscious, and the unconscious (Carpenter & Huffman, 2011). Conscious is the thoughts or motives that a person is currently aware of or is remembering (Carpenter & Huffman, 2011). Preconscious are thoughts or motives that are just beneath the surface of awareness and can be easily brought to the mind (Carpenter & Huffman, 2011). The unconsciousness are thoughts and motives that lie beyond a person’s normal awareness, which still exert great influence (Carpenter & Huffman, 2011). Freud believed that most psychological disorders originate from repressed memories and instincts (sexual and aggressive) that are hidden in the unconscious (Carpenter & Huffman, 2011). Freud also believed that personality was composed of three mental structures: id, ego, and superego (Carpenter & Huffman, 2011). The id is totally unconscious and serves as a reservoir of mental energy (Carpenter & Huffman, 2011). The id is made up of innate, biological instincts and urges. It is immature, impulsive, and irrational (Carpenter & Huffman, 2011). The id wants what it wants and when it wants it – pleasure principle (Carpenter & Huffman, 2011). As a child grows older, the ego develops (Carpenter...

Words: 901 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...Diabetes is when a disease results in too much sugar in the blood. Also known as high blood glucose. There are two types of diabetes; diabetes 1 and 2. 8 things people with diabetes have to do is test their blood sugar and record it in a log book, take a medication prescribed by your doctor, check your feet as you may get wounds such as blisters, brush and floss your teeth; blood sugar levels can increase plaque in the mouth, be physically active; exercising improves blood flow, increase energy, helps from the impact of stress and makes sleeping better, focus on eating healthy meals and snacks, protect your skin; diabetes may cause fungal infection, Get a good night sleep; this increases metabolism. Diabetes 1 usually occurs to people who are now in their 40’s....

Words: 484 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...Introduction: With the advances of micro electro mechanical system technology, wireless communications and digital electronics, Wireless Sensor Networks have been used in everywhere such as battlefield surveillance, environment supervision and traffic control has become a reality. Wireless Sensor Networks consist of large number of sensor nodes which collect and route data to the external sink with a certain transmission regulation. Due to the limitations of bandwidth memory and computing capability of such nodes the applied routing topology should ensure the minimization of energy consumption and hence maximization the lifetime of the network. When the energy is limited, our main aim is to find a route which can minimize the energy consumption and maximize the network lifetime. In typical WSNs applications, data about a particular event is collected by the sensor nodes and then sent to the Base Station. Since nodes are deployed densely, the high density of the network may lead to nodes generating and transmitting redundant data, which results in unnecessary energy consumption. Data aggregation can be the solution for this problem. Data aggregation basically eliminates redundant data and reduces the communication load. Clustering method has been extensively exploited for increasing the network scalability. In this paper we propose an energy efficient load balanced data gathering routing protocol to minimize energy consumption and thus enhance the network lifetime. The cluster...

Words: 924 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...The implications of the above results are discussed next. As it can be seen in Figure 1, ESSENDON1 drug seemed to not to be effective in the Forced Swim Test experiment. The data shows that there is a higher percentage of immobility in the control group (mean = 54.3 +12.4%) compared to the ESSENDON1 test group (mean = 47.5 +7.6 %). This indicates that the test group demonstrated to have less escape - related behaviour and was found to be more anxious than the control group. Moreover, the t–test (p=0.6497) indicates there is ~65% chance that the immobility is the same and hence there is no significant differences between the two groups. The bar graph of the Elevated plus-maze test in Figure 2 demonstrates the effectiveness of ESSENDON1. Through immediate observation, the...

Words: 889 - Pages: 4

Free Essay

It Unit 6 Exercise 1

...1. You triangulate your research by looking for looking for information from three different and three sources are considered reliable. 2. Primary sources are actual records or artifacts while secondary sources are writings from knowledgeable people who have studied the topic. 3. Three strategies that help to narrow an internet search are using exact words, using quotations, and using plus or minus signs. 4. A few of the questions researchers should ask is if the source can be trusted, what will the author get out of this publication and do the sources clearly define fact and fiction? 5. Researchers can use documentaries, television, and radio if they are reliable sources; you use quotes and cite the sources. 6. A wiki is a more fact based source while the blog and podcast tend to be more opinion based. 7. Three of the periodical indexes available in the ITT Virtual Library are academic journals, magazines, and newspapers. 8. The information that can be found in these publications is usually more exact and current. 9. Empirical sources include observations, experiments, surveys, and interviews. Researchers use them to confirm and to challenge online and print sources. 10. One of the best benefits of conducting an interview is to gather quotes that you can use for the text of your research. 11. The strategies for conducting a follow up interview is to write down what you remember, get your quotes right, check facts, and most importantly...

Words: 339 - Pages: 2

Premium Essay

Nt1310 Unit 1 Exercise 1

...__________________________________ Score: _______ Section: ___________ Instructor: _______________________ Date: ________ Activity 4.1A HYPOTHESIS TESTING I. Problem Solving: A. Formulate the null and and alternative hypothesis of the following statements. 1. The Department wants to know if the average working hours in preparing full meal is 3 hours. Ho: ______; ______________________________________________________ H1: ______; ______________________________________________________ 2. A teacher wants to know if there is a significant difference in the performance task of STEM and ABM strand in Personal Development subject. Ho: ______; ______________________________________________________ H1: ______; ______________________________________________________...

Words: 895 - Pages: 4

Premium Essay

Nt1310 Unit 1 Exercise 1

...MANET is the infrastructureless network without any access point or base station. It consists of the mobile nodes and has dynamic topology. MANET is self configured and self organizing network. In the ad hoc network nodes are free to move anywhere and any pair of nodes can communicate directly if they are in the transmission range of each other otherwise the communicating nodes depend upon the other nodes present in the network for the communication. So, MANET follows the multi-hop pattern for the communication. In the ad hoc network, the nodes can act as the router as well as host. The nodes in the network dynamically exchange the data without their dependency on any wired backbone network. The nodes in the network are differentiated by their processing, energy consumed, memory resources and most important by their high degree of mobility. Routing protocols play an important role in order to transmit the data from one node to another. The goal of the ad hoc network routing protocols is to establish the valid and efficient routes between the nodes so that the messages are delivered within time. The routing protocols must be able to deal with high degree of mobility. Depending upon their network structure the routing protocols are classified into three types: Proactive protocols, Reactive protocols and Hybrid protocols. Proactive protocols are table-driven routing protocols. Each node stores the network topology information and routing information is exchanged periodically. When...

Words: 519 - Pages: 3

Premium Essay

Pt1420 Unit 1 Exercise 1

...the following equation. This equation shows that the rate of change of the human population can be expressed by minus the population of zombies. Consequently, this new model predicts that the zombie population will grow exponentially. It is possible to use this equation to find out how quickly the human population is changing for any number of zombies. For example, if there are 50 zombies, the rate of change of the human population can be expressed by the following. This shows that the rate of change of the human population when there are 50 zombies is -50. This means at this time, the human population will be shrinking at a rate of 50 humans per day. Assuming the population of zombies can be expressed by the equation in kill rate 1, the following substitution can be made. Therefore, it is possible to integrate the equation to find the population of humans over time. It is possible to calculate the value of A by finding the initial conditions. When time is 0, it has already been stated that there are 9999 humans. Therefore, these values can be substituted into the equation and it rearranged for A. Therefore, the population of humans can be modelled by the following equation. Thus, the population of zombies is modelled by, . Both of these can be graphed as follows. Figure 2. Populations of both zombies and humans over time. Using figure 2, it can be seen that the time that it takes the zombies to overtake the human population has drastically decreased...

Words: 454 - Pages: 2

Premium Essay

Nt1330 Unit 1 Exercise 1

...Training We can provide user training for the users, by teaching them how to create strong password, which are memorable. Then after that impose strict security to ensure that whatever is taught must be carried out. Like performing night checks going around desks to look for any papers with password lying around. Can also impose military style in the office where passwords are treated the same way as the the data is. We can also teach them the possible attacks that they could face if they do not choose a strong password, where users would want their account to be compromised? Even running ecommerce, there are ways to teach the users and administrators. Asking administrators to impose password to be at least eight digits long, have at least 1 upper case character and also a symbol to increase the complexity of the password. The password must pass the necessary requirements in order to be registered into the system. While storing in the database, can hash the password, thus the password can never be reversed. We can have a phrase of Four score and seven years ago, our Father which forms 4s&7yaoF. Having a mnemonic password is also recommended when giving users training, because this password does not exist in password cracking dictionary. The phrase can also help them to use different characters such as uppercase or lowercase, punctuations in their passwords. So even when you try to social engineer a user about their password, the user can tell you that their password is “Four...

Words: 1749 - Pages: 7

Premium Essay

Nt1310 Unit 1 Exercise 1

...Watchdog detects malicious misbehavior's by promiscuously listening to its next hop’s transmission. If a Watchdog node overhears that its next node fails to forward the packet within a certain period of time, it increases its failure counter. Whenever a node’s failure counter exceeds a predefined threshold, the Watchdog node reports it as misbehaving. The watchdog is capable of detecting malicious nodes rather than links. These advantages have made the Watchdog scheme a popular choice in the field. Many MANET IDSs are either based on or developed as an improvement to the Watchdog scheme the Watchdog scheme fails to detect malicious misbehavior's with the presence of the following: 1) ambiguous collisions; 2) receiver collisions; 3) limited transmission power; 4) false misbehavior report ; 5) collusion ; and 6) partial...

Words: 581 - Pages: 3