Free Essay

Linux Cheat Sheet

In: Computers and Technology

Submitted By justbkuz
Words 1322
Pages 6
THE ONE PAGE LINUX MANUAL
A summary of useful Linux commands
Version 3.0 May 1999 rm name

squadron@powerup.com.au
Remove a file or directory called name Kill off an entire directory and all it’s includes files and subdirectories Copy the file called filename to the /home/dirname directory Move the file called filename to the /home/dirname directory Display the file called filetoview Display man pages containing keyword Display the file called filetoview one page at a time, proceed to next page using the spacebar Display the first 10 lines of the file called filetoview Display the first 20 lines of the file called filetoview Display the last 10 lines of the file called filetoview Display the last 20 lines of the file called filetoview

Starting & Stopping rm -rf name shutdown -h now halt shutdown -r 5 shutdown -r now reboot startx Shutdown the system now and do not reboot Stop all processes - same as above Shutdown the system in 5 minutes and reboot Shutdown the system now and reboot Stop all processes and then reboot - same as above Start the X system cp filename /home/dirname mv filename /home/dirname cat filetoview man -k keyword more filetoview

Accessing & mounting file systems mount -t iso9660 /dev/cdrom /mnt/cdrom mount -t msdos /dev/hdd /mnt/ddrive mount -t vfat /dev/hda1 /mnt/cdrive umount /mnt/cdrom Mount the device cdrom and call it cdrom under the /mnt directory Mount hard disk “d” as a msdos file system and call it ddrive under the /mnt directory Mount hard disk “a” as a VFAT file system and call it cdrive under the /mnt directory Unmount the cdrom

head filetoview head -20 filetoview tail filetoview tail -20 filetoview

Installing software for Linux rpm -ihv name.rpm rpm -Uhv name.rpm rpm -e package rpm -l package rpm -ql package rpm -i --force package Install the rpm package called name Upgrade the rpm package called name Delete the rpm package called package List the files in the package called package List the files and state the installed version of the package called package Reinstall the rpm package called name having deleted parts of it (not deleting using rpm -e) Decompress the files contained in the zipped and tarred archive called archive Execute the script preparing the installed files for compiling

Finding files and text within files find / -name fname find / -name ”*fname*” locate missingfilename Starting with the root directory, look for the file called fname Starting with the root directory, look for the file containing the string fname Find a file called missingfilename using the locate command - this assumes you have already used the command updatedb (see next) Create or update the database of files on all file systems attached to the linux root directory Show the subdirectory containing the executable file called missingfilename Starting with the directory called dir , look for and list all files containing textstringtofind

updatedb

which missingfilename grep textstringtofind /dir

tar -zxvf archive.tar.gz or tar -zxvf archive.tgz ./configure

The X Window System xvidtune XF86Setup Xconfigurator xf86config Run the X graphics tuning utility Run the X configuration menu with automatic probing of graphics cards Run another X configuration menu with automatic probing of graphics cards Run a text based X configuration menu

User Administration adduser accountname passwd accountname su exit Create a new user call accountname Give accountname a new password Log in as superuser from current login Stop being superuser and revert to normal user

Moving, copying, deleting & viewing files ls -l ls -F ls -laC List files in current directory using long format List files in current directory and indicate the file type List all files in current directory in long format and display in columns

Little known tips and tricks ifconfig apropos subject usermount List ip addresses for all devices on the machine List manual pages for subject Executes graphical application for mounting and unmounting file systems

/sbin/e2fsck hda5 fdformat /dev/fd0H1440 tar -cMf /dev/fd0 tail -f /var/log/messages cat /var/log/dmesg

Execute the filesystem check utility on partition hda5 Format the floppy disk in device fd0 Backup the contents of the current directory and subdirectories to multiple floppy disks Display the last 10 lines of the system log. Display the file containing the boot time messages - useful for locating problems. Alternatively, use the dmesg command. wildcard - represents everything. eg. cp from/* to will copy all files in the from directory to the to directory

File permissions

*

?

Single character wildcard. eg. cp config.? /configs will copy all files beginning with the name config. in the current directory to the directory named configs.

[xyz]

Choice of character wildcards. eg. ls [xyz]* will list all files in the current directory starting with the letter x, y, or z.

If the command ls -l is given, a long list of file names is displayed. The first column in this list details the permissions applying to the file. If a permission is missing for a owner, group of other, it is represented by - eg. drwxr-x—x
Read = 4 Write = 2 Execute = 1 File permissions are altered by giving the chmod command and the appropriate octal code for each user type. eg chmod 7 6 4 filename will make the file called filename R+W+X for the owner, R+W for the group and R for others. Full permission for the owner, read and execute access for the group and others. Make the file called filename executable to all users.

linux single

At the lilo prompt, start in single user mode. This is useful if you have forgotten your password. Boot in single user mode, then run the passwd command. List current processes Kill a specific process eg. kill 123

chmod 7 5 5 chmod +x filename

ps kill 123

Configuration files and what they do
/etc/profile /etc/fstab System wide environment variables for all users. List of devices and their associated mount points. Edit this file to add cdroms, DOS partitions and floppy drives at startup. Message of the day broadcast to all users at login. Bash script that is executed at the end of login process. Similar to autoexec.bat in DOS. Conatins full hostname including domain. There are 4 directories that automatically execute all scripts within the directory at intervals of hour, day, week or month. A list of all know host names and IP addresses on the machine. Paramters for the Apache web server Specifies the run level that the machine should boot into. Defines IP addresses of DNS servers. Config file for the SAMBA server. Allows file and print sharing with Microsoft clients. Define configuration for some Xapplications. ~ refers to user’s home directory. Config file for X-Windows. Defines the windows manager loaded by X. ~ refers to user’s home directory.

X Shortcuts - (mainly for Redhat)
Control|Alt + or Alt | escape Shift|Control F8 Right click on desktop background Shift|Control Altr Shift|Control Altx Increase or decrease the screen resolution. eg. from 640x480 to 800x600 Display list of active windows Resize the selected window Display menu Refresh the screen Start an xterm session

/etc/motd etc/rc.d/rc.local

/etc/HOSTNAME /etc/cron.*

Printing
/etc/rc.d/init.d/lpd start /etc/rc.d/init.d/lpd stop /etc/rc.d/init.d/lpd status lpq lprm lpr lpc man subject | lpr man -t subject | lpr printtool Start the print daemon Stop the print daemon Display status of the print daemon Display jobs in print queue Remove jobs from queue Print a file Printer control tool Print the manual page called subject as plain text Print the manual page called subject as Postscript output Start X printer setup interface

/etc/hosts /etc/httpd/conf /etc/inittab /etc/resolv.conf /etc/smb.conf

~/.Xdefaults

/etc/X11/XF86Confi g ~/.xinitrc

Get your own Official Linux Pocket Protector - includes handy command summary. Visit: www.powerup.com.au/~squadron

Similar Documents

Free Essay

Cheating

... Cheating: * Any attempt to give or obtain assistance in a formal academic exercise (like an examination) without due acknowledgment. * dishonesty and breaking the rules. Reasons of cheating 1. Performance concerns * Need to excel at any cost 2. External pressures * Academic * Semester workload too heavy * Others’ cheating puts me at disadvantage * Professor/text did not adequately explain material * Too many tests on one day * Nonacademic * Pressure from parents * Job leaves no time for study * Illness prevents adequate preparation * GPA for athletic qualification * Financial aid depends on GPA * Good grades needed for job or graduate school 3. Unfair professors * Overly harsh grading * Unfair tests designed to fail students * Unreasonable workload in course 4. Lack of effort * Did not attend class * Did not study, do reading, etc. 5. Adherence to other loyalties * Helping a friend * Loyalty to a group (fraternity) 6. All’s fair in love and academia 7. Opportunity * Unexpected opportunity arose * Instructor left room during exam * Instructor wasn’t watching carefully * Other students didn’t cover their paper 8. Campus ethos * Others do it * No one ever really gets punished/caught Some ways of cheating 1. Copying Homework ...

Words: 3122 - Pages: 13

Free Essay

Stuff

...| IT250 Linux Operating System | Jerry Black | Spring 2012 | | | | Course Description: Installation, configuration and management of a Linux operating system will be explored. Focus will be on functions that resemble the UNIX environment. Directory and file management, user account management and certain device management (such as drives, printers, interface cards, etc.) will be discussed. Prerequisite(s) and/or Corequisite(s): Prerequisite: IT103 Operating Systems Credit hours: 4 Contact hours: 50 (30 Theory Hours, 20 Lab Hours) Syllabus: Linux Operating System Instructor | Jerry Black | Office Hours | Thursday, 4PM-6PM | Class Hours | Monday, 6:00PM – 10:20PM | Contact | Ms. Travis, 937-264-7707 | | jblack@itt-tech.edu | Major Instructional Areas 1. Introduction to Linux 2. Linux installation 3. Graphical user interface (GUI) desktops 4. Command-line interface (CLI) essentials 5. Hardware configuration: display, network, and printer 6. Networking: Resource sharing and remote access 7. Backup and restore utilities 8. Installing software in Linux 9. Scripting: Bourne Again Shell (bash) and Perl 10. Apache Web Server installation and configuration Course Objectives 1. Discuss the history and unique characteristics of the Linux operating system. 2. Perform an installation of Linux. 3. Use the components and features of the GNOME desktop environment. 4. Perform basic tasks by...

Words: 2032 - Pages: 9

Premium Essay

Wireless Hacking Presentation

...Wireless Hacking – Haifux Wireless Hacking Edri Guy Mar 04 ,2013 See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux DISCLAIMER 1 – The following discussion is for informational and education purpose only. 2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden. 3 – Misused could result in breaking the law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless...

Words: 2941 - Pages: 12

Premium Essay

Wireless Tutorial

...Wireless Hacking – Haifux Wireless Hacking Edri Guy Mar 04 ,2013 See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux DISCLAIMER 1 – The following discussion is for informational and education purpose only. 2 – Hacking into private network without the written permission from the owner is Illegal and strictly forbidden. 3 – Misused could result in breaking the law so use it at your own risk. See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Overview ● We're going to learn how WiFi (802.11) works ● Start with terminology ● Types ● Vulnerabilities ● Attacking them ● Surprise demonstration of....:) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● AP - Access Point MAC – Media Access Control a unique id assigned to wireless adapters and routers. It comes in hexadecimal format (ie 00:11:ef:22:a3:6a) See-Security Mar 04 2013 – Wireless Hacking - Haifux Wireless Hacking – Haifux Introduction WiFi Classes Vulnerabilities Attack Terminology ● ● BSSID – Access Point's MAC Address ESSID - Access Point’s Broadcast name. (ie linksys, default, belkin etc) Some AP’s will not broadcast their name,But Airodump-ng can guess it. See-Security Mar 04 2013 – Wireless...

Words: 2941 - Pages: 12

Premium Essay

Nmap.Cookbook.the.Fat-Free.Guide.to.Network.Scanning

...Nmap® Cookbook The fat-free guide to network scanning 2 Nmap® Cookbook The Fat-free Guide to Network Scanning Copyright © 2010 Nicholas Marsh All rights reserved. ISBN: 1449902529 EAN-13: 9781449902520 www.NmapCookbook.com BSD® is a registered trademark of the University of California, Berkeley CentOS is property of CentOS Ltd. Debian® is a registered trademark of Software in the Public Interest, Inc Fedora® is a registered trademark of Red Hat, Inc. FreeBSD® is a registered trademark of The FreeBSD Foundation Gentoo® is a registered trademark of The Gentoo Foundation Linux® is the registered trademark of Linus Torvalds Mac OS X® is a registered trademark of Apple, Inc. Windows® is a registered trademark of Microsoft Corporation Nmap® is a registered trademark of Insecure.Com LLC Red Hat® is a registered trademark of Red Hat, Inc. Ubuntu® is a registered trademark of Canonical Ltd. UNIX® is a registered trademark of The Open Group All other trademarks used in this book are property of their respective owners. Use of any trademark in this book does not constitute an affiliation with or endorsement from the trademark holder. All information in this book is presented on an “as-is” basis. No warranty or guarantee is provided and the author and/or publisher shall not be held liable for any loss or damage. 3 4 Contents at a Glance Introduction....................................................................................... 15 Section 1: Installing Nmap...

Words: 25175 - Pages: 101

Free Essay

Blah

...……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72

Premium Essay

Android Applictions

...constant support throughout helping and guiding me. I would say it wasn’t easy for her but she did her best replying to our mails n helping us in correcting our mistakes. She also helped us in selecting a topic of our choice and interest so we could work harder and with more interest. I was happy to have her as my guide and will look forward to work under her again. A special thanks to you mam. I would also thank my parents for their never ending care n support. Table of content 1. Introduction * History * Design * Features 2. Applications 3. Google play 4. The 100 best apps of 2012 5. The 12 best android tablet app 6. Android software development 7. References Introduction Android is a Linux-based operating system for mobile devices such as Smartphone and tablet computers. It is developed by the Open Handset Alliance, led by Google, and other companies. Google purchased the initial developer of the software, Android Inc., in 2005. The unveiling of the Android distribution in 2007 was announced with the founding of the Open Handset Alliance, a consortium of 86 hardware, software, and telecommunication companies devoted to advancing open standards for mobile devices. Google releases the Android code as open-source, under the Apache License. The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android. Android has a large community of developers writing applications ("apps") that extend...

Words: 11004 - Pages: 45

Premium Essay

Computer Book

...The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advocacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in electronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version 13.07 09.12 09.11 09.10 Date July 6, 2013 December 14, 2009 November 19, 2009 October 3, 2009 Description Second Internet Edition. First Internet Edition. Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. Second draft incorporating the first editing pass. Completed first draft. 09.08 09...

Words: 100185 - Pages: 401

Premium Essay

Ethics

...things what is right and wrong. Even though I do things that is wrong, I always do a good things and a ethical way, here are some of my experience that included an ethical way: - When I always in the bus and there’s no more seat, I stand, when someone stands in their seat, I always check if there’s any women who is standing and struggling to balance herself in a very fast bus and I always do is poking or making a sign in the girl for her to know that there was a available seat for her to seat and not struggling. I always do that in order for me to be a gentleman and doesn’t want girls to struggle to stand. - When do I have a exam and I don’t have a time to review, I do is a quick review, when the exam starts, I struggle and tempted to cheat, but I don’t do it, cause it is ok to got a low grade rather than to gather a answer that is not yours. - My parents usually asking a favor to buy some things in the store and gave a big bill, if I finished buying the things and have a excess change, I usually gave it full and no less and I have no intention to steal it to my parents cause I usually ask money to them and...

Words: 24802 - Pages: 100

Premium Essay

Daraa

...USA $25.95 CANADA $27.95 • W h y do our headaches persist after taking a one-cent aspirin but disappear when we take a 50-cent aspirin? • Why does recalling the Ten Commandments reduce our tendency to lie, even when we couldn't possibly be caught? • W h y do we splurge on a lavish meal but cut coupons to save 25 cents on a can of soup? • W h y do we go back for second helpings at the unlimited buffet, even when our stomachs are already full? • And how did we ever start spending $4.15 on a cup of coffee when, just a few years ago, we used to pay less than a dollar? hen it comes to making decisions in our lives, we think we're in control. We think we're making smart, rational choices. But are we? In a series o f illuminating, often surprising experi­ ments, M I T behavioral economist Dan Ariely refutes the common assumption that we behave in fundamentally rational ways. Blending everyday experience with ground­ breaking research, Ariely explains how expectations, emotions, social norms, and other invisible, seemingly illogical forces skew our reasoning abilities. N o t only do we make astonishingly simple mistakes every day, but we make the same types of mistakes, Ariely discovers. We consistently overpay, underestimate, and procrastinate. We fail to understand the profound effects of our emotions on what we want, and we overvalue what we already own. Yet these misguided behaviors are neither random nor senseless. They're systematic and predict­ able—making us predictably irrational...

Words: 95122 - Pages: 381

Free Essay

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet...

Words: 48147 - Pages: 193

Premium Essay

Java for Dummies

...Programming Languages/Java ™ Jumpin’ Java! The bestselling Java beginner’s book is now fully updated for Java 7! Open the book and find: ava J • Definitions of the many terms you’ll encounter ® • The grammar of Java • How to save time by reusing code • All about if, for, switch, and while statements • An overview of object-oriented programming • Building blocks — learn to work with Java classes and methods and add comments • Hints about handling exceptions • How to write Java applets ® • The Java scoop — get an overview of Java, the enhancements in Java 7, and the software tools you need • Get loopy — understand the value of variables and learn to control program flow with loops or decision-making statements 5th Edition 5th Edition Java Java, the object-oriented programming language that works on almost any computer, is what powers many of those cool multimedia applications. Thousands have learned Java programming from previous editions of this book — now it’s your turn! Whether you’re new to programming or already know a little Visual Basic or C++, you’ll be doing Java in a jiffy. g Easier! Making Everythin • Ten ways to avoid mistakes • Class it up — explore classes and objects, constructors, and subclasses, and see how to reuse your code • A click ahead — experiment with variables and methods, use arrays and collections to juggle values, and create programs that respond to mouse clicks Learn...

Words: 34460 - Pages: 138

Free Essay

Pc Build

...The Complete Guide To: How to Build a Computer from Scratch. By Whitson Gordon [PDF Created by Sarvesh Lad] Lesson 1: Hardware Basics Building a computer from scratch gives you the perfect machine for your needs, but it can be daunting the first time around. In this edition of Lifehacker Night School, we'll be taking you through the buying, building, and installation process step-by-step. Today, we're going to start with a little computer hardware basics. While you could just go to the store and buy a Dell, you might find that you're happier with a custom-built machine. Building a PC from the ground up means it's perfectly crafted to fit your needs, whether you're a hardcore gamer, video editor extraordinaire, or you're just trying to build a low- or high-powered home theater PC. In some instances, you may save some money, and in all instances you'll have accomplished a project that you'll benefit from for years—a pretty great feeling in and of itself. That said, building is much more time consuming than buying, and your first time through, it can be daunting. This week's Night School series will walk you through building your first (or second, or third) computer from start to finish. Today, we'll be talking about the first step in any computer build: brainstorming what kind of machine you're looking to make and what that means for your hardware. The Types of Machines and their Ballpark Costs Much like we did in our original spec-crafting feature, the the first thing...

Words: 10432 - Pages: 42

Premium Essay

Police Abuse Essay

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...ITT TECHNICAL INSTITUTE NT1210 Introduction to Networking Onsite Course GRADED ASSIGNMENTS Graded Assignment Requirements Retain all handouts issued in every unit, as well as any assignment, research, or lab documents you prepare as part of assignments and labs. Some may be used more than once in different units. NOTE: Always check with your instructor for specific due dates of assignments. Graded Assignments Unit 1 Assignment 1: Computer Basics Review Course Objectives and Learning Outcomes Identify the major needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are...

Words: 16182 - Pages: 65