Free Essay

It250

In:

Submitted By mycanthus
Words 539
Pages 3
Chapter One (History of Linux): The history of Linux begins not with the release of Linux in 1991 but with the creation of GNU (which stands for Gnu’s not UNIX). This started with the purpose of creating a free OS to anyone who wanted with. By 1991 everything was complete except for the kernel which Linus Torvalds provided. The Code was free, this dated to back to when UNIX was released to Universities for a low cost and that way its students would be familiar with it and it would slowly permeate the marketplace once those students got out of the schoolhouse and made their way up the ladder of business. Some of the best things about Linux is the fact that is has a large selection of applications written for it that range from word processing to graphical tools to security administration software. It provides a wide range of peripherals and easy to install software. It works on a variety of platforms as well with a variety of hardware which allows it to be extremely portable. Another big key in this development is the creation of UNIX in B programming language which gave rise to C, C++ and Objective C. Linux has the shells to be able to interpret command language and programming language. GUI allows people to customize the desktop environment to suit their needs or tastes.
Chapter Two and Three (Installation and Step by Step Installation): In the installation of Linux there are many different mediums to install it from. You can install it form a Live CD, An install DVD and net boot CD. You’ve got to keep in mind hardware requirements such as hard drive space and how much available memory you have. You also have to worry about which Partitions you have to create for example the root partition, the swap partition and the boot partition. You are able to create RAID to employ more than 1 hard drive of similar size to create fault tolerance and enhance performance with certain types of configurations.
Chapter Four (Introduction to the Fedora and red hat Enterprise Linux): The different users that use Linux each have a user name and password. Linux is a multi user operating system with a single account being the administrator from the /root directory. Once you are a valid user on a system you can make yourself an account to play with and customize the components to your liking. You are able to create shortcuts and control stuff on the windows, panels and menus tailored to your needs. In addition to the GUI interface there is a command-line interface that you can execute applications thru.
Chapter Eight (Linux GUIs: X and Gnome) The X windows system started off at MIT with a distributed computing project this developed into several releases of the X system. It eventually had its license changed so the Xfree86 4.4 could not be used due to its restrictions and not being compatible with the GPL. The X system works in layers and it can be used to run applications on remote computers. Gnome and KDE are desktop environments. These are both graphical interfaces that allow a users to customize desktops to suit their needs.

Similar Documents

Free Essay

It250 Week 9

...Unit 9: Basic Linux Administration Objectives 9: Administer and maintain a Linux system. 9.1: Create users and groups by using the CLI and GUI tools. 9.2: Back up a Linux system by using the tar utility. 9.3: Maintain effective logs by using the log rotate utility. Readings A Practical Guide to Fedora and Red Hat Enterprise Linux Chapter 11, pp. 407-425 * Chapter 16 In-Class Assessment * Week 9 Quiz: Homework The following homework is designed to cover the course objectives for this unit. Assignment 9.1: Complete the following exercise in your textbook: * Chapter 16: Question 1-5 on page 643 Submit your written answer to your instructor at the start of Unit 10. Labs Instructor Notes: Assign students the following lab which can be printed from Appendix D. Lab 9.1: Using tar to Back Up Files What is the purpose? This lab exercise lets you perform basic file backup on your Linux system. What are the steps? Task 1: Backing up with tar Procedure 1. Open a terminal window as a regular user. 2. Create a directory named backup in your home directory. 3. Copy some files from your home directory into your new directory. 4. Create a backup of your new directory by using tar and compress the file with bzip2. Make sure that the backup file is not placed in the directory you are backing up. You will need to: a. Create permission. b. Choose verbose mode option. c. Choose the bzip2 file format. d. Specify...

Words: 1093 - Pages: 5

Premium Essay

It250 Chapter 2 Assignment

...IT250: HOMEWORK Chapter 2 Assignment 1-      The process of installing Fedora/RHEL involves putting a CD into the DVD drive. Then you go through all the computer specifics, making choices from the menu. 2-      The anaconda is an installation tool that performs an interactive installation using the graphical or textual interface. 3-      I would set up a GUI on a server system to make it more users friendly. 4-      To make a system boot from a DVD, first enter the BIOS and change the settings from hard disk to CD. 5-      Free space in the area of the disk not occupied by any partition. 6-      ISO image files are files that hold data you use to create DVD/CD 7-      Two reason you should not use raid to replace backup are of you computer is stolen, in a fire. 8-      Its RAM that is made to look like a floppy diskette or hard disk. It is frequently used as part of the boot process 9-      SHA-256 is a set of cryptographic has functions. When you process a file using SHA-256 it generates a number based on the file. ASSIGNMENT 3.1 PAGE 184 3. WHAT HAPPENS WHEN YOU GIVE THE FOLLOWING COMMNADS IF THE FILE NAMED DONE ALREADY EXISTS? $ cp to_do done $ mv to_do done ANWSER: cp - copy files and directories mv - move (rename) files. You would just basically overwrite the file. 4. HOW CAN YOU FIND OUT WHICH UTILITIES ARE AVAILABLE ON YOUR SYSTEM FOR EDITING FILES ? WHICH UTILITIES ARE AVAILABLE FOR EDITING ON YOUR SYSTEM? ANWSER:...

Words: 1961 - Pages: 8

Premium Essay

It250 Chapter 1 - Intro to Databases

...Databases Chapter 1 – Intro Lab 1.2 1. Nouns: doctors, patients, drugs, side effects. 2. Major Topics: doctor Records, patient medical records, side effects / symptoms, and screening records. Lab 1.3 1. Major Topics: faculty, software, and computers. 2. Draft statement of work that includes scope, objectives, and preliminary timeline: a. Scope – A database with the ability to track faculty and staff computers and software. b. Objectives – Faculty software, version, license agreement, record of computers with software, location of computer, user access to computer, software install / uninstall timestamps, status of the computer. i. Additional: ability to track software requests and software availability. c. Timeline ii. Gathering data – gather records of the school computers and its staff, a list of software purchased and in use, interview and questionnaire information understand the faculty needs. Time: 1.5 weeks. iii. Analyzing data – Understanding the data to create data model. Know the needs of the faculty members and type of software / computers in use to determine business rules. Time: 2 weeks. iv. Normalization – Data modeling; entities and relationships normalized. Time: 2 weeks. v. Building the physical database – Create RDBMS database. Time: 4 days. vi. Testing and security – Testing using sample data. Create user permission for different levels of faculty, block out...

Words: 369 - Pages: 2

Free Essay

It250 Linux Operating System Homework 5.1

...Exercises stores the complete set of positional parameters as a single string 4. a. When you are writing many shell scripts, it can get tedious to give many chmod commands. This function speeds up the process. b. $ function perms { > chmod u+x $* > } c. Put the function in your .bash_profile, .bash_login, or .profile file to make it available each time you run a log in (using bash). d. Use source to execute the file you put the function in, i.e. $ source .bash_profile 5. A shell function will do nothing unless it is explicitly called by other code A shell script is a runnable, executable process, which can call other shell scripts and/or functions. The question might be worded backwards - it is necessary to write shell functions for shell scripts when certain logical functionality is required to be performed multiple times - they operate the same way. 6. $ cat listdirs file "$@" | grep directory | sed 's/:.*//'. 9. a. #!/bin/bash plus1 () { echo $(($1 + 1)); } echo $(plus1 8) export -f plus1 ./child 14 21 b. Each Name the full file name of the command is determined by searching the directories in $PATH and remembered. c. If command is not specified, a non-interactive shell exits, unless the shell option exefail is enabled, in which case if returns failure. Returns if file cannot be executed. Exercises 1. -w option on the command line 2. Array is an order list of values position by index. Hash is an unordered list...

Words: 292 - Pages: 2

Free Essay

Asssignment 1;1

...Assignment 1.1 Below is a free essay on "Itt Tech It250 Unit 1" from Anti Essays, your source for free research papers, essays, and term paper examples. 1. What did Richard Stallman mean when he stated that GNU was a free operating system? What Richard Stallman meant by stating that GNU was a free operating system is that it was a free software that users had the freedom to distribute and change the product. 2. Describe the relationship between Linux and the GNU Project. The way that Linux and the GNU Project are related by them both being free software based. Also the GNU operating system today uses complete Linux binary compatibility. 3. List and describe in detail four advantages of Linux. The four advantages of Linux include: a) Affordability, Linux has open source software,meaning that there are no license fees. b) Portability, Linux is a generic operating system that can run on different types of operating systems from different companies. c) Security because it is logical based and everything is file based. d) Multiple users, it can run multiple tasks with many different users at the same time. 4. List three examples of different hardware platforms onto which Linux has been ported. Some examples of different hardware platforms that Linux was ported are Compaq's Alpha-based machines, MIPS-based machines, and Motorola's 68K- based machines. 5. What are the minimum system requirements for Fedora 15 with the GUI installed? The minimum system requirements...

Words: 364 - Pages: 2

Premium Essay

Course Descriptions

...GE117 Composition I | A 4 credit hour Composition course This course covers phases of the writing process, with special emphasis on the structure of writing and techniques for writing clearly, precisely and persuasively. Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE127 College Mathematics I | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: quadratic, polynomial and radical equations, linear functions and their graphs, systems of linear equations, functions and their properties and triangles and trigonometric functions. Activities will include solving problems and using appropriate technological tools. Prerequisite: GE184 Problem Solving or TB184 Problem Solving or GE150 Survey of the Sciences or equivalent; Prerequisite or Corequisite: TB133 Strategies for the Technical Professional or equivalent GE184 Problem Solving | A 4 credit hour Science course This course introduces students to problem solving techniques and helps them apply the tools of critical reading, analytical thinking and mathematics to help solve problems in practical applications. GE192 College Mathematics II | A 4 credit hour Mathematics course This course will include, but is not limited to, the following concepts: exponential and logarithmic equations and functions, graphs of trigonometric functions, trigonometric equations, polar coordinates, oblique triangles, vectors and sequences. Prerequisite:...

Words: 1186 - Pages: 5

Free Essay

Linux Chapter 5

...James F Sloan III 4/2/15 IT250 Chapter 5 1. The “who” command helps you determine who is logged in on a specific terminal. 2. Give the command “mesg n” to keep other ordinary users from writing to your terminal. You can take this action when you do not want to be disturbed or are viewing something on your screen that you do not want overwritten. 3. $ cp   to_do done – it will overwrite the   done file with the new file names to_do. $ mv   to_do done-   it will do the same as cp, the to_do file will overwrite the done file.  4. Give the command apropos editor. Most systems have vim, ex, ed, and more. 5. $ grep "Ace Electronics" phone $ sort phone $ uniq phone 6. When you compare binary files with diff, diff displays a message saying the files differ when the files differ or no message when the files are the same. The diff utility compares ASCII files on a line-by-line basis; it is not designed to compare binary files on a byte-by-byte basis. Use cmp to compare binary files in that manner. 7. The answer is system dependent. 8. The utility displays a message saying that the command you are looking for is not in the list of directories that are in your search path. For example, $ which me /usr/bin/which: no me in (/usr/local/bin:/bin:/usr/bin:/usr/X11R6bin:. 9. No. However, some commands that are built into a shell have an executable counterpart that exists as a file (for example, echo). 10. Approximately twenty, not counting...

Words: 283 - Pages: 2

Premium Essay

Linux 1 Assignment 6.1

...IT250 – Linux 1 Assignment 6.1 10/2012 EXERCISES, Page 582 1. Which commands can you use from the command line to send a file to the default printer?  lpr/lp – sends job(s) to the printer  lpr – prints a file 3. Which commands list your outstanding print jobs?  lpq/lpstat – Displays the status of the print queue 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol?  System-config-printer  lpinfo Displays available drivers  lpadmin configures printers  The cups native protocol is IPP EXERCISES, Page 669 1. What advantage does a switch have over a hub?  Switches are faster and switches have a repeater which boosts your speed 3. Name two servers that allow you to share directories between systems.  NFS  Samba   5. What is a common function of a router? What is this function called?  A router connects a LAN to another network, such as the internet. A router can perform several functions, the most common of which is allowing several systems to share a single Internet connection and IP address is NAT. When a router uses NAT, the packets from each system on the LAN appear to come from a single IP address; the router passes return packets to the correct system.  A router can also act as a firewall. 7. Which tool can you use to configure a wireless NIC (rather than having it be configured automatically)?  The network manager applet  CLI: nm-connection-editor ADVANCED EXERCISES, Page 669 9. If you...

Words: 276 - Pages: 2

Free Essay

Linux Homework

...IT250 Linux Home Work Chapter 4 1) What command can be used to list the files in a directory? dir 2) What command can be used to display the contents of a text file? cat 3) What command can be used to delete a file? rm Chapter 5 1) What commands can be used to compress a file? Gzip and bzip2 2) Name two text editing commands we used. nano and vim 3) What VIM command quits without saving. :q! 4) What VIM command saves and quits. ZZ 5) What VIM command is used to switch from text entry to command mode? Esc Chapter 6 1) What command allows us to check or change permissions? Chmod 2) When working with permissions, what symbolic permissions value of RW? Read and write 3) What is the numeric equivalent of this value? 6 Chapter 7 1) When used with a command, what does the > character do? Redirect output 2) What does grep do? Search file(s) for lines that match a given pattern Chapter 8 1) Define GNOME GNOME is designed to be a Windows-like Desktop system Chapter 9 1) Define BASH. Bourne Again Shell GNU’s command interpreter for UNIX Chapter 10 1) What command can I use to identify the name of the computer I’m using? hostname 2) Define daemon. A program that runs in the background, rather than controlled by the user 3) Identify a daemon. ftp 4) Define FQDN. Fully qualified domain name, is the complete domain name for a specific host 5) Identify one top level domain. Infrastructure top-level domain Chapter 11 1) What is sudo? Super...

Words: 437 - Pages: 2

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

It255

...Operating System I, IT250 Linux Operating System Course Description: This course provides an overview of security challenges and strategies of counter measures in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity and confidentiality aspects of information systems. Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security Capstone Project 400 Level IS404 Access Control, Authentication & KPI IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications IS418 Securing Linux Platforms & Applications IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating...

Words: 4114 - Pages: 17

Free Essay

Linux

...Carlos Moises Pelaez | IT250 | Linux Operating System: Assignment 1.1 | 3/30/2013 | 1) In the free software world, there are several uses of the word "free." The two main ones are "free as in speech" and "free as in beer." Free as in speech means you are relatively unfettered in what you can do with the software. You can modify it, use it for whatever you want, and give it to others (or even sell it). Free as in beer means that you can obtain it for no monetary cost. Richard Stallman originally envisioned GNU to be free as in speech. At the time he started the project (in 1983), internet access was slow and expensive, high-capacity storage devices weren't readily available, and very few people had a personal computer. It would have been infeasible to offer GNU on a gratis basis. Stallman actually used to charge $150 for a tape with the GNU software on it, plus $15 for a manual. 2) The GNU project develops programs and utilities for an as yet rudimentary operating system known as "GNU." Since the programs are open-source, they have been adapted to work using the Linux kernel as well. Other than using its programs, there is no direct relationship. 3) Advantage #1 – Stability: If you have used other operating systems, once you have made the switch to Linux, you will notice that Linux has an edge over Windows here. I can remember rebooting Windows many times over the years, because an application crashed, and I could not continue working. Linux can crash also,...

Words: 1208 - Pages: 5

Premium Essay

Seeking Help

...aspects of information systems. Prerequisite(s) and/or Corequisite(s): Prerequisites: IT220 Network Standards and Protocols, IT221 Microsoft Network Operating System I, IT250 Linux Operating System Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Introduction to Information Systems Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program: IS427 Information Systems Security 400 Level Capstone Project IS418 IS404 Access Control, Authentication & KPI IS421 Legal & Security Issues IS423 Securing Windows Platforms & Applications IS411 Security Policies & Implementation Issues IS415 System Forensics Investigation & Response IS416 Securing Windows Platforms & Applications Securing Linux Platforms & Applications 300 Level IS305 Managing Risk in Information Systems IS308 Security Strategies for Web Applications & Social Networking IS316 Fundamentals of Network Security Firewalls & VPNs IS317 Hacker Techniques Tools & Incident Handling EC311 Introduction to Project Management IT250 Linux operating System ment CNS Program Prerequisites: ©ITT Educational Services, Inc. Date: 10/25/2010 Introduction to Information...

Words: 4296 - Pages: 18