Linux Chapter 5

In: Computers and Technology

Submitted By Weirdo825
Words 283
Pages 2
James F Sloan III
4/2/15
IT250
Chapter 5 1. The “who” command helps you determine who is logged in on a specific terminal. 2. Give the command “mesg n” to keep other ordinary users from writing to your terminal. You can take this action when you do not want to be disturbed or are viewing something on your screen that you do not want overwritten. 3. $ cp to_do done – it will overwrite the done file with the new file names to_do.
$ mv to_do done- it will do the same as cp, the to_do file will overwrite the done file. 4. Give the command apropos editor. Most systems have vim, ex, ed, and more. 5. $ grep "Ace Electronics" phone
$ sort phone
$ uniq phone 6. When you compare binary files with diff, diff displays a message saying the files differ when the files differ or no message when the files are the same. The diff utility compares ASCII files on a line-by-line basis; it is not designed to compare binary files on a byte-by-byte basis. Use cmp to compare binary files in that manner. 7. The answer is system dependent. 8. The utility displays a message saying that the command you are looking for is not in the list of directories that are in your search path. For example,
$ which me /usr/bin/which: no me in (/usr/local/bin:/bin:/usr/bin:/usr/X11R6bin:. 9. No. However, some commands that are built into a shell have an executable counterpart that exists as a file (for example, echo). 10. Approximately twenty, not counting files that you cannot read as a nonprivileged user. 11. $ head status.report
$ tail…...

Similar Documents

Chapter 5

...Brett Simons Chapter 5: Cross-cultural Negotiation & Decision Making Negotiation The chapter starts with defining negotiation as the process of discussion by which two or more parties aim for mutually acceptable agreement. It also states that the art of negotiation is widely considered the most important skill in International Business. I find that very interesting and kind of a surprise to me, but when you think about it, all business interactions are based on some type of negotiations (even meaningless stuff like meeting times). Because of this, negotiations also affect the ability for a manager to implement strategy. Finally, just like the running theme of this book, ignorance and poor research of native bargaining rituals, can cause unimpressive result. The Negotiation Process The process in which proper negotiation occurs is broken down into five stages. The first stage is preparation. This, to me, is the most important stage of the process. Before you can move on to any other stage effectively, you have to have done your homework as a manager. The second stage is building a relationship. You need to get to know your counterpart and their positions. It helps you stay ahead of their responses so you can react to them more effectively. The third stage is the exchange of task related information. This can include presentations and such but can be tricky when dealing with different cultures. As the book points out, researching how different cultures......

Words: 506 - Pages: 3

Linux Chapter 7,9 Unit3

...shell (for example, bash scriptfile, where scriptfile is the name of the file containing the script). Under bash, you can give either of the following commands: $ . scriptfile $ source scriptfile Since the shell must read the commands from the file containing a shell script before it can execute the commands, you must have read permission for the file to execute a shell script. 3. A. yes B the first one in the PATH variable C. direct call with pathname e.g. ~/bin/dolt, or ./dolt if you're in ~/bin/ D. PATH=/usr/games:$PATH; 4. Assume that you have made the following assignment: $ person=jenny Give the output of each of the following commands: a. echo $person jenny b. echo '$person' $person c. echo "$person" jenny 5. a) type "chmod +x journal" b)It reads the name from stdin and cats it to journal-file rather than stdout. Source(s): man chmod 6. A. After executing the preceding commands, Jenny’s working directory is /home/jenny/grants/biblios. When CDPATH is set and the working directory is not specified in CDPATH, cd searches the working directory only after it searches the directories specified by CDPATH. B. After executing the preceding commands, Jenny’s working directory is /home/jenny/biblios. When you give cd an absolute pathname as an argument, cd does not use CDPATH. 7. In bash, the variable "$$" contains the pid of the current bash process, while "$PPID" contains the pid of the parent process, so which one to......

Words: 764 - Pages: 4

Linux Chapter 7,9 Unit3

...shell (for example, bash scriptfile, where scriptfile is the name of the file containing the script). Under bash, you can give either of the following commands: $ . scriptfile $ source scriptfile Since the shell must read the commands from the file containing a shell script before it can execute the commands, you must have read permission for the file to execute a shell script. 3. A. yes B the first one in the PATH variable C. direct call with pathname e.g. ~/bin/dolt, or ./dolt if you're in ~/bin/ D. PATH=/usr/games:$PATH; 4. Assume that you have made the following assignment: $ person=jenny Give the output of each of the following commands: a. echo $person jenny b. echo '$person' $person c. echo "$person" jenny 5. a) type "chmod +x journal" b)It reads the name from stdin and cats it to journal-file rather than stdout. Source(s): man chmod 6. A. After executing the preceding commands, Jenny’s working directory is /home/jenny/grants/biblios. When CDPATH is set and the working directory is not specified in CDPATH, cd searches the working directory only after it searches the directories specified by CDPATH. B. After executing the preceding commands, Jenny’s working directory is /home/jenny/biblios. When you give cd an absolute pathname as an argument, cd does not use CDPATH. 7. In bash, the variable "$$" contains the pid of the current bash process, while "$PPID" contains the pid of the parent process, so which one to......

Words: 764 - Pages: 4

Chapter 5

...Chapter 5 Page 187 1. Madeira looks to seek damages under the New York Scaffold Law. The company objected on the basis that he was an undocumented immigrant. He lost his past and future earnings, so the court allowed Madera to receive these benefits. He was seriously injured, which caused him to get compensation. 2. There are many things that contribute to the declining number of deaths in the construction industry. There are more and more workplace laws that come into effect every year. These laws come with very harsh punishments for companies, which in turn gives them greater incentive to keep their workers as safe as possible. The companies issue training to employees, have monthly safety meetings, and provide the proper safety gear for their employees due to the job they are doing. 3. When construction happens in urban areas there should be stricter rules and regulations. I find it very unethical that these companies are taking short cuts that end up costing people their lives. The company that is cutting corners is not a company that is good for its employees. Especially when these incidents lead to the deaths of their employees. Page 190 1. I feel like global slavery has a good impact on the health of ordinary workers. We see how these people that are enslaved are treated, the things they have to go through, and the abuse that comes to them. This opens the eyes of our people and which in turn makes people value their workers more. Laws for workplace safety...

Words: 453 - Pages: 2

Linux Sobell Chapter 5 Pg 182

...modified versions under the same terms/licensing. 4. What is the Free Software Foundation/GNU? Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? GNU stands for "GNU'S Not Unix", and it was designed to be a UNIX-like operating system developed by Richard Stallman. Linux is the name of operating system kernel developed by Linus Torvalds. GNU's tools aside the Linux kernel make the operating system known as “Linux” aka “GNU/Linux”. Thousands of people helped refine the operating system online. 1. What does the process of installing an operating system such as fedora rhel involve? Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. 1. What advantages does a live system have over an installed system? Live System- A computer that runs the Wide Area Progressive games and displays the main system window. Advantages- Customization, cost, free market, stability, and community. 4. Where on the Linux disk should you put your boot partition or the root partition if you do not use the boot partition? To boot Linux, you would need to place the kernel within the area addressable by the BIOS. This......

Words: 667 - Pages: 3

5 Benefits to Linux

...5 Important Features of Linux As with any product (e.g. Diet Coke vs. Diet Pepsi), many arguments boil down to personal preference. And even if one OS proves to be slightly better at handling multi-processing, it’s possible that the other is more user-friendly, which saves employees time (and, eventually, the company money). Regardless, here are a few compelling reasons why you may want to consider a Linux operating system the next time you’re in the market to buy (or quench your thirst): 1. TCO – Total Cost of Ownership. Many experts agree: if you consider all variables (antivirus and spyware programs, licensing, etc.), a Linux platform gets you more for your buck. (Oh, and did I mention it’s FREE?!) 2. A More Dynamic Desktop. Per Wallen (2008), "If you don’t like the way the Linux desktop looks or behaves, change it. If you don’t like the desktop included with your distribution, add another. And what if, on rare occasion, the desktop locks up? Well, Windows might require a hard restart. Linux? Hit Ctrl + Alt + Backspace to force a logout of X Windows.” (#2: Desktop). 3. Security. Linux is open-source, whereas Windows is not. 4. Evolution. For many users, Windows Vista was a step backwards. And it can be argued that Microsoft is still trying to play catch up. Meanwhile Linux makes healthy rates of advancements with each 6 month release. 5. Compatibility. While Linux “plays well with others”, Windows does not have that same flexibility.......

Words: 267 - Pages: 2

Chapter 5

...QUESTIONS CHAPTER 6 1. Do you think governments should consider human rights when granting preferential trading to countries? What are the arguments for and against taking a such positions? A: Yes, because human rights are of great importance in all aspects and must be respected. But you need to take in count that human rights are different in other countries that are not subject to the bill of rights. 2. Whose interests should be the paramount concern of government trade policy the interests of producers (business and their employees) or those of consumers? A: I think both should be of great importance because they must work together to reach all the goals. 3. Given the arguments relating to the new trade theory and strategic trade policy, what kind of trade policy should business be pressuring government to adopt? A: The strategic trade policy because it has best export tariffs and subsides, so you can get strategic effects to their development in the international market and more intervention of other countries. 4. You are an employee of a U.S. firm that produces personal computers in Thailand and then exports them to the Unites States and other countries for the sale. The personal computers were originally produced in Thailand to take the advantage of relatively low labor costs and a skilled workforce. Other possible locations considered at the time were Malaysia and Hong Kong. The U.S. government decides to impose punitive 100 percent and......

Words: 450 - Pages: 2

Linux Unit 5

...computer or device that is connected to the network. Here are the five major reasons that I think NFS is used. * Mobility – Being able to access your information/files on any computer or device that can access the network. * Reliability – The fact that the servers will be replicated allows ease of mind knowing that your information/file will be backed up. * Ease of set up – From my experience with servers; it really isn’t very hard to set up NFS. * Ease of use – All you do to access your information/files as the end user is login. * Versatility – Honestly, so many things use this. A few examples are e-mail, video game networks, and you’ll probably see it in any job you could take. How does Linux make file sharing safe and reliable? Well, in my opinion Linux has pretty good security. It is a good system in general. It would easily do great with NFS. Also if I am not mistaken, windows is always the biggest target....

Words: 492 - Pages: 2

Linux Chapter 12 and 13

...Review Questions 2. B 4. B 6. A, C 8. B, C 10. A 12. B 14. True 16. D 18. A 20. A, C, D Hands On Projects 12-1 1. OK 2. OK 3. Just one device, eth0 for the Ethernet. Just one driver for that device. 4. Most likely when the system was first installed. OK 5. OK 6. OK 7. 8. OK 9. OK 10. The old one as the script has not been read since it was modified. OK 11. OK 12. The new one as the modified script was read at boot.Yes 13. OK 14. OK 15. The modified configuration. 16. OK 12-2 1. OK 2. 3. No DNS servers have been setup. 4. Files then dns. 5. an entry for: 127.0.0.1 server1 localhost.localdomain localhost 6. Yes 7. Yes 8. Yes it was resolved, but not available to contact. 9. Yes it was resolved, but not available to contact. 10. OK 12-3 1. OK 2. 204.152.189.116, yes, zeus-pub.kernel.org. 3. nslookup lists the IP of your DNS server. 4. Detailed query information and statistics. 5. OK 12-4 1. OK 2. 10.0.2.2 3. OK 4. Yes it will interfere with the default gateway. 5. 30 6. No, and at least 1. 7. Ok Discovery Assignments 1. Subnet mask = 255.240.0.0 Hosts per network = 220-2 First five ranges are: 100.0.0.1–100.15.255.254 100.16.0.1–100.31.255.254 100.32.0.1–100.47.255.254 100.48.0.1–100.63.255.254 100.64.0.1–100.79.255.254 2. The cat command is run on the remote system; to......

Words: 926 - Pages: 4

Chapter 5

...FOUNDATIONS OF TAOIST PRACTICE by Jampa Mackenzie Stewart When you try to define Taoism, you immediately run into trouble. The great Taoist philosopher and author of the Tao Te Ching, Lao Tzu, begins his first chapter with the warning words, The Tao that can be described is not the eternal Tao. The name that can be named is not the eternal name. Thus Westerners are not the only ones who have a hard time defining Taoism; the Chinese have had difficulty time agreeing on just what Taoism is for millenia. Taoism is sometimes defined as a ritualistic religion, as a philosophy, as Chinese folk religion, as alchemy, as a system of magical lore, or as a series of health practices similar to yoga. The adherants of each school often look with disdain on the others as being heterodoxy, heresy, or simply incomplete portions of the great Tao. The Chinese word Tao (pronounced "dow") means "the way, the path." In the common sense it refers to the way of doing anything, or the pathway to some destination. In its higher meaning, Tao refers to the way of the universe, the way things are. As a spiritual system, Tao means the way to achieving a true understanding of the nature of mind and reality, to the way of living in harmony with the changes of Nature. Thus the Tao is the goal, the path and the journey all in one. A Taoist then, is "a follower of the Way," the same title by which the early Buddhists and Christians dubbed themselves. The earliest Taoists appeared at least four thousand years...

Words: 7643 - Pages: 31

Chapter 5

...Chapter 5—Inventory Merchandiser Makes a profit by buying and selling merchandise. A wholesaler is an intermediary that buys goods from manufacturers or other wholesalers and sells them to retailers or other wholesalers. A retailer buys goods from manufacturers or wholesalers and sells directly to consumers Operating cycle for Merchandisers Begins with the purchase of inventory and ends when cash is received from selling the inventory. Manufacturer Makes a profit by buying raw materials and transforming them into finished goods that can be sold. Operating cycle for Manufacturers Begins with the purchase of raw materials and ends when cash is received from selling the finished goods inventory. Net Income for Merchandisers and Manufacturers First gross profit is determined by subtracting cost of goods sold from net sales. Then net income is determined by subtracting other expenses from gross profit. Gross Profit (gross margin) Sales revenue minus cost of goods sold Inventory cost the cost of any asset, including inventory, is the sum of all the costs incurred to bring the asset to its intended use, including delivery and installations costs, insurance and storage costs, sales and excise taxes, and subtracting any discounts or allowances. Three types of Inventory Costs (Managerial Accounting) 1) Direct materials are the materials used to make the product. 2) Direct labor is the cost of paying workers to make the product. 3)......

Words: 2569 - Pages: 11

Linux Chapter 1

...Chapter 1 Introduction to Linux At a Glance Class Notes Table of Contents • Overview • Objectives • Teaching Tips • Quick Quizzes • Class Discussion Topics • Additional Projects • Additional Resources • Key Terms • Technical Notes for Hands-On Projects Lecture Notes Overview Linux technical expertise is essential in today’s computer workplace as more and more companies switch to Linux to meet their computing needs. Thus, it is important to understand how Linux can be used, what benefits Linux offers to a company, and how Linux has developed and continues to develop. In the first half of this chapter, you will learn about operating system terminology and features of the Linux operating system, as well as the history and development of Linux. Later in this chapter, you will learn about the various types of Linux and situations in which Linux is used. Chapter Objectives In this chapter, you will learn to: • Understand the purpose of an operating system • Outline the key features of the Linux operating system • Describe the origins of the Linux operating system • Identify the characteristics of various Linux distributions and where to find them • Explain the common uses of Linux in industry today Quick Quiz 1 1. What term is used to describe a running program on Linux? a. Application b. Process c. Runtime d. Project 2. What is......

Words: 3777 - Pages: 16

Chapter 5

...Chapter 5 review questions – Abhinav Anand 1. List all decisions a network administrator need to make prior to Oracle database installation. A: Before an installation of an Oracle database server, administrators need to verify the hardware, software, and network compatibility on which the Oracle Server will be running. 2. Of the additional options and features available for Oracle, identify the security-specific applications. A: Advanced security option, an application that offers encryptions and authentication tools to keep data confidential and secure both inside the database and while in transit. Label Security, a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored. Oracle Active Data Guard, improves performance and ensures data recovery by maintaining a replica of a main database to act as a secondary database for workload sharing and failsafe. 3. Explain the advantages and disadvantages of offering an unrestricted, freely downloadable full version of Oracle Database to learners and developers. A: Oracle offers a free download of all editions of the Oracle Database for purposes of education, testing, or development. Personal info or a license key is not required. Disadvantages to this may include granting crackers or cyber threats the ability to freely download versions of Oracle Database for the purpose of understanding how to......

Words: 384 - Pages: 2

Chapter 5

...Personality and Values Organizational Behavior Chapter Outline I. Personality A. B. Definition of Personality Personality Determinants II. The Myers-Briggs Type Indicator A. B. C. D. Extraverted/Introverted Sensing/Intuition Thinking/Feeling Judging/Perceiving III. The Big 5 Personality Model A. B. C. D. E. Openness Conscientiousness Extraversion Agreeableness Emotional Stability or Neuroticism Chapter Outline IV. Other Personality Traits Relevant to Organizational Behavior A. B. C. D. E. F. G. Core Self-Evaluation Machiavellianism Narcissism Self-Monitoring Risk Taking Proactive Personality Other Orientation V. Values A. B. Definition and Importance Terminal vs Instrumental Values 1. Rokeach Value Survey Chapter Outline VI. Generational Values A. B. Dominant Values in the Workplace Linking an Individual’s Personality and Values to the Workplace 1. Person-Job Fit 2. Person-Organization Fit VII. International Values A. B. Hofstede’s Five Dimensions of National Culture 1. Power Distance 2. Individualism vs Collectivism 3. Masculinity vs Femininity 4. Uncertainty Avoidance 5. Long-term vs Short-term Orientation The GLOBE Framework for Assessing Cultures I. Personality ● Personality includes the relatively stable feelings, thoughts, and behavioral patterns a person has ○ ● makes us distinct from other people, and understanding someone’s personality gives us......

Words: 1296 - Pages: 6

Chapters 10 Linux

...Jose Alberto Salazar OECS-205-D02 Homework 2 Answer Exercises 1 and 3 on page 499 (End of chapter 10) 1.- How does single-user mode differ from multiuser mode? When a system is in single-user mode, you can log in only at the console. Not all of the file systems are mounted,and many daemons are not running. With the system in multiuser mode you can login at any terminal or workstation that is set up for login, most or all of the filesystems are mounted, and all of the daemons that your system is set up to run arerunning. 3.-What do the letters of the su command stand for? (Hint: It is not Superuser.) What canyou do with su besides give yourself root privileges? How would you log in as Zach ifyou did not know his password but knew the root password? How would you establishthe same environment that Zach has when he first logs in? The letters su stand forsubstitute user. With su you can use the su utility can spawn a shell or execute aprogram with th identity and privileges of a specified user, including root.Byfollowing the su on the command line with Zach’s name as long as you are working with root privileges will allow you to log on as Zach.By using the su commandutility and the root password will alow you to log on as Zach with the sameenvironment Answer Exercises 1,3,5,6,7 on page 530 (End of chapter 11) 1.- What is the function of the /etc/hosts file? Which services can you use in place of or to supplement the hosts file? ...

Words: 536 - Pages: 3