Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

What is the difference between the reported size of directories when using the command ls versus the command du? Explain.

What is the difference between the command df and the command du? Provide a scenario where a system administrator would use each.

Suppose you needed to install a program which had both methods available (binary and source) and that dependencies and control over the installation directories were not an issue with this particular program. Provide and explain a pro/con for each method.

Suppose you have a new killer app, which does NOT require the user to be root, which you want to make available to only some users (a specific list now, but more people may need to use it later). How would you manage the access of the program to the selected users?
Part II: Commands (70%):

Please simply write the command(s) which performs the following tasks Debian (your VM) in as few commands as possible. Note: If you do not indicate which shell you are using, I will assume you are using the bash shell (whether or not you are actually using this shell)

Suppose you had a program that stored log files in the directory /var/log/impProgram and you were worried about the disk running out of room because of the logging requirements for that program. Additionally, the configuration files for this important program are in /etc/impProgram and you need to protect the configuration files from the rest of the computer by making them read-only and on their own read-only partition. These two directories must be available at boot. Suppose you have a 100MB drive laying around your office which you decide to use to solve this problem.

NOTE: you will need to create the directories and insert something in them (simple text files will work), you will need to create a 100MB VirtualBox virtual disk and add it to the VM, partition it into two partitions, format them, and so on to solve the problem. You need to list commands and instructions for interactive commands and you will need to show the outputs of the various commands including the contents of fstab and the results of df -h after rebooting when finished

Create three users cutler, forte, and royal using system defaults for all three using the useradd command. After creating the users, set their home directories to /home/bears/username where username is their username. Add a group named bears and add all three users to this group.

Create a saints group. Change the defaults for adding users using the following defaults: base directory -> /home/neworleans, shell -> /bin/sh. Create three users: brees, watson, and snead using the new defaults. Change the defaults back to the original defaults.

Create the football group and then create a directory for anyone in the football group to share named /usr/shared/football and change its permissions so that members of the group have full access to the group. Add a member to the football group and create a link to the directory inside their home directory.

Remove all users and groups created thus far and remove all of their home directories!

Install the Java JDK using apt-get (you will need to use apt-cache search to search for it)

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91549960
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Taskthe first task is to create your business narrative

Task The first task is to create your business narrative. Some of the questions that you should address include (but are not limited to) the following. •What is the name of your business? •Who will be the users of the sy ...

Discuss the importance of using an access control model in

Discuss the importance of using an access control model in determining how employees in an organization should gain access to resources.

Suppose a coworker approaches you and asks what an ethical

Suppose a coworker approaches you and asks what an ethical hacker does. She does not understand the role that an ethical hacker plays in the security industry and assumes that such a hacker intentionally causes damage. E ...

With respect to bus request interruptswhat must be allowed

With respect to bus request interrupts: What must be allowed to complete before the interrupts is serviced? What resources (CPU, buses, memory, etc..) is the ISR expected to use? What is the ISR typically expected to do? ...

The formulas a rarr b and c and a rarr b and a rarr c are

The formulas A → (B ∧ C) and (A → B) ∧ (A → C) are logically equivalent. For this problem, you are going to prove that they are equivalent in two different ways. Prove that A → (B ∧ C) ≡ (A → B) ∧ (A → C) by writing two ...

Scruffie the cat has 15 to spend each month on cat toys

Scruffie the cat has $15 to spend each month on cat toys, which cost $3 each, and cat treats, which cost $1.50 each. Draw a budget line to show the combination of each good that scuffie can afford if she spends her entir ...

Round robin rr jobs are processed using a fixed time-slice

Round Robin (RR): Jobs are processed using a fixed time-slice. The jobs are initially kept in a queue based on the order of arrival. The job at the front of the queue is removed and served similar to the FIFO algorithm. ...

Explain the differences between working in the web based

Explain the differences between working in the web based version of Outlook in Office 365 to the desktop application version of Outlook.

Question after reviewing the assigned reading materials

Question: After reviewing the assigned reading materials, complete the following activities: 1. Develop a product service idea. A. Describe the product/service including the benefits of using the product/service B. Discu ...

A series of information frames with a mean length of 100

A series of information frames with a mean length of 100 bits is to be transmitted across the following data links using an idle RQ protocol. If the velocity of propagation of the links is 2 * 10 8 ms -1 , determine the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As