Free Essay

Ms. Hana

In:

Submitted By hana0233
Words 2797
Pages 12
F~r~: Wo(d~

01

~

Sy~1rY~

2o1o~)

Karma
Bi~ Kiislzwaii f Sin gli, 1950
Kushwant Singh (1915 -) An important Indo-Anglican novelist. Singh published his first volume of short fiction in 1950, three years after
India’s independence. Almost ali of the stones deal with rural and urban Indian life with its many contrasts: tradition Vs. modern ideas;
India vs. (post)colonial Britain and religion VS. secularism. Singh is best known for his humorous way of giving a political commentary to the social and behavioral characteristics of Westerners and Indians. Also, he has translated Sikh religious texts and Urdu poetry.

Pre-reading
1. Match word and definition: secularism sb verds lighed oxide sb oxyd (kemisk stof) ~rans’lucent ad] gen nemsigtig patronage sb riedla denhed in’different ad] ligegyl dig, ligeglad murmur vb mumle old chap ‘gamle jas’ dis’tinguished adi distingveret, elegant trimmed ad] klippet
Savile Row sb berømt skræddergade i Lon don car’nation sb nellike scented ad] parfumeret smoothe vb glatte
Balliol sb berømt col lege i Oxford umpteen ad] ‘hundrede og sytten’ koi hai indisk kom her livery sb uniform wire gauze sb trådvæv

Karma

The sum of a person’s actions which decides your future life and reincarnations
Destiny/fate
A power believed to control events decided before hand in a way that cannot be changed or control led 2. Try to explain the two concepts in your own words, and discuss whether you believe in any of thern.
3. How would you live your life if you belieVed in karma and des tiny/fate respectively?

Sir

Mohan Lai looked at himseif in the mirror of a first-class waiting room at the railway station. The mirror was obviously made in lndia.
The red oxide at its back had come off at several places and long lines of translucent glass cut across its surface. Sir Mohan smiled at the mirror with ari air of pity and patronage.
‘You are so very much like everything else in this country, inefficient, dirty, iridifferent,’ he murmured.
The mirror smiled back at Sir Mohan.
‘You are a bit of all right, old chap,’ it said. ‘Distinguished, efficient — even handsome. That neatly trimmed moustache — the suit from Savile
Row, the carnation fri the buttonhole — the aroma of eau de cologne, talcum powder, and scented soap ali about you! Yes, old fellow, you are a bit of all right.’
Sir Mohan threw out his chest, smoothed his Balliol tie for the ump teenth time and waved a goodbye to the mirror.
He glanced at his watch. There was still time for a quick one.
‘Koi hai?’
A bearer in white livery appeared through a wire gauze door.

5

10

15

20

178

I.

5

10

15

20

25

30

Goilig

~lloi~ai

-

b.

‘Ek chota,’ ordered Sir Mohan, and sank into a large cane chair to drink and ruminate.
Ontside the waiting room Sir Mohan Lai’s luggage lay piled along the wall. On a smail grey steel trunk Lachmi, Lady Mohan Lai, sat chewing a betel leaf and fanning herseif with a newspaper. She was short and fat and in her middle forties. She wore a dirty white san with a red border. On one side of her nose glistened a diamond nose ring and she had several gold bangles on her arms. She had been talking to the bearer until Sir Mohan had summoned him inside. As soon as he had gone, she hailed a passing railway coolie.
‘Where does the zenaria stop?’
‘Right at the end of the piatform.’
The coolie flattened his turban to make a cushion, hoisted the steel trunk on his head, and moved down the piatform. Lady Lai picked up her brass tiffin carrier and arnbled along behind him. On the way she stopped by a hawker’s stall to replenish her silver betel leaf case, and then joined the coolie. She sat down on her steel trunk (which the coolie had put down) and started talking to hirn.
‘Are the trains very crowded on these lines?’
‘These days ali trains are crowded, but you’ll find room in the zenana.’ ‘Then I might as well get over the bother of eating.’
Lady Lal opened the brass carrier and took out a bundle of cramped chapaties and some mango pickle. While she ate, the coolie sat opposite her on his haunches, drawing lines in the gravel with his finger.
‘Are you travelling alone, sister?’
‘No, I am with my master, brother. He is in the waiting roorn. He traveis first class. He is a vizier and a barrister, and meets 50 many officers and Englishmen in the trains — and I am only a native woman.
I can’t understand English and don’t know their ways, so I keep to my zenana inter-class.’

~5

40

Lachxni chatted away merrily. She was fond of a little gossip and had no one to talk to at horne. Her husband never had any time to spare for her. She lived in the upper storey of the house and he on the ground floor. He did not like her poor illiterate relatives hanging about his bun galow, so they never carne. He came up to her once in a while at flight and stayed for a few minutes. He just ordered her about in anglicized
Hindustani, and she obeyed passively. These nocturnal visits had, how ever, bome no fruit.
The signal came down and the clanging of the bell announced the approaching trairi. Lady Lai hurriedly finished off her meal. She got up, stil licking the stone of the pickled mango. She emitted a long, bud belch as she went to the public tap to rinse her mouth and wash her hands. After washing she dried her mouth and hands with the loose

ek choLa indisk en lille drink cane chair ah kurvestol rumlnate th gruble,

[ænke pile oh stable op trunk sb kuffert betel sb plante hvis blade og nødder bruges som nydelsesmiddel i
Asien
bang le ah armbånd suinmon vb tilkalde hail vb kalde på coolie sb kuli, arbejder ze’nana indisk kvinder nes afdeling i toget hoist oh løfte brass sb messing tiffin carrier sb frokostspand ambie oh lunte hawker sb gadehandler stall sb bod re’plenish oh genop fylde bother sb besvær cramped adj sammenpresset, mast cha’pati ah fladt, rundt brød sit on one’s haunches sidde på hug gravel sb grus vi’zier ah vesir: højtstå ende embedsmand barrister ah sagfører inter-class sb klasse mellem 2. og 3. klasse merry ad] munter upper storey sb øverste etage il’literate adj uuddan net, analfabetisk anglicized ad] engelskpræget
Hindu’stani ah hindi
(et sprog der tales i
Indien)
noc’turnal ad] natlig an’nounce vb annon cere ap’proach ob nærme sig e’mit vb udstøde

179

Global Indla
~

4

REÅT h~NM PI~NINSULÅ ~
RAILWAY
4~
Fm

Bt (‘let ~

T,t,

(I ‘t
,n,

N

ih

~l’

i

i

BY THE

-~

r~n riir~ ri n r
~1J~U UJJL~\UL

TIM 1~
3~

-~

SPEED, COIiFORT& PLEASuRE.
-v••~_~

~

~—

‘~

belch ab bøvs (udtryk for tilfredshed) tap sb vandhane filling adj mættencie squat adj tætbygget bulky ad] tyk frame sb her: krop anna sb indisk mønt, charged adj her: fyldt minced ad] finthakket thrust vb stikke, skubbe bulge vb bule ud idly ada dovent, uden at lave noget jostle vb puffe, skubbe sangfroid sb upåvir kethed bustle sb travlhed breeding sb dannelse eminently ada overor denligt tickety-’boo ‘tip-top’ fancy vb være glad for! stolt af re’fined ad] forædlet

180

end of her san, and walked back to her steel trunk, belching and thank ing the gods for the favour of a fihling meal.
The train steamed fri. Lachmi found herseif facing an almost empty inter-class zenana compartment next to the guard’s van, at the tail end of the train. The rest of the train was packed. She heaved her squat, bulky frame through the door and found a seat by the window. She produced a two-anna bit from a knot fri her san and dismissed the coolie. She then opened her betel case and made herself two betel leaves charged with a red and white paste, minced betel nuts and cardamoms.
These she thrust into her mouth till her cheeks buiged on both sides.
Then she rested her chin on her hands and sat gazing idly at the jostling crowd on the platform.
The arrival of the train did flot disWrb Sir Mohan Lai’s sangfroid.
He continued to sip his Scotch and ordered the bearer to tell him when he had moved the luggage to a first-ciass compartment. Excitement, bustle, and hurry were exhibitions of bad breeding, and Sir Mohan was eminently well bred. He wanted everything ‘tickety-boo’ and orderly.
In his five years abroad, Sir Mohan had acquired the manners and atti tudes of the upper ciasses. He rarely spoke Hindustani. When he did, it was like an Englishman’s only the very necessary words and properly anglicized. But he fancied his English, finished and refined at no iess a


5

10

15

20

GoIr~g Global - lndia

place than the University of Oxford. He was fond of conversation, and like a cultured Englishman he could talk on almost any subject books, politics, people. How frequently had Fie heard English people say that
Fie spoke like an Englishman!
Sir Mohan wondered If he would be travelling alone. It was a Canton ment and some English officers might be on the train. His heart warmed at the prospect of an impressive conversation. He never showed any sign of eagerness to talk to the English as most Indians did. Nor was he bud, aggressive, and opinionated like them. He went about his busi ness with an expressionless matter-of-factness. He would retire to his corner by the window and get out a copy of The Times. He would fold it in a way fri which the name of the paper was visible to others whule he did the crossword puzzle. The Times always attracted attention.
Someone would like to borrow it when he put it aside with a gesture signifying ‘I’ve finished with it.’ Perhaps someone would recoguize his
Balliol tie which he always wore while travelling. That would open a vista leading to a fairyland of Oxford colleges, masters, dons, tutors, boat races, and rugger matches. If both The Times and the tie failed, Sir
Mohan would ‘Koi hai’ his bearer to get the Scotch out. Whisky never failed with Englishmen. Then followed Sir Mohan’s handsome gold cigarette case filled with English cigarettes. English cigarettes in India?
How on earth did he get them? Sure he didn’t mmd? And Sir Mohan’s understanding smile of course he didn’t. But could he use the Englishman as a medium to commune with his dear old England? Those five years of grey bags and gowns, of sports blazers and mixed doubles, of dinners at the luns of Court and nights with Piccadilly prostitutes.
Five years of a crowded glorious life. Worth far more than the forty-five in India with his dirty, vulgar countrymen, with sordid details of the road to success, or nocturnal visits to the upper storey and all-too-brief sexual acts with obese old Lachmi, smelling of sweat and raw onion.
Sir Mohan’s thoughts were disturbed by the bearer announcing the installation of the Sahib’s luggage in a first-class coupe next to the engine. Sir Mohan walked to his coupe with a studied gait. He was dis mayed. The compartment was empty. With a sigh he sat down in a cor ner and opened the copy of The Times he had read several times before.
Sir Mohan looked out of the window down the crowded platform.
His face ht up as he saw two English soldiers trudging along, looking in ali the compartments for room. They had their haversacks slung behind their backs and walked unsteadily. Sir Mohan decided to wel come them even though they were entitled to travel only second class.
He would speak to the guard.
One of the soldiers came up to the last compartment and stuck his face through the window. He surveyed the compartment and noticed the unoccupied berth.
“Ere, Bill,’ he shouted, ‘one ‘ere’.


5

10

is

20



25

30

35

40

cultured ad] kultiveret cantonnsentsb miii tærpost prospect sb udsigt o’plnlonated ad] påstå dig go about oh udføre matter-of-factness sb nøgternhed vista sb perspektiv master sb her: mandlig lærer (gl.dags) don sb universitetslærer tutor sb vejleder rugger = rugby medium sb her: middel com’mune vb føre en fortrolig samtale (for melt) grey bags sb knæbuk ser gown sb kappe the luns of Court advokatsamfund i Lon don bestående af fire juristkollegier Picca’dilly sb plads i centrum af London sordid adj trist o’bese ad~ fed, over vægtig Sahib indisk tiltale: herren studied adj indstuderet gait sb gangart dis’mayed ad] nedslået, forarget trudge ab traske haversack sb rygsæk en’titled adj berettiget sur’vey vb tage et over blik berth sb soveplads
‘ere here (dialektalt)

181

in’ebriated adj beruset bedding sb sengetøj
Hvid ad/ligbleg pre’posterous adj uri melig, oprarende the King’s (Enghsh) overklasseengelsk yer your ruddy = bloody reel vb vakle toodle-oo ‘hej-hej’ bloaLed adj opsvulmet sa’liva sb spyt clear vb passere jet sb stråle dribbie sb savl, spyt

His companion came up, also looked in and looked at Sir Mohan.
‘Get the nigger ont,’ he muttered to his companion.
They opened the door, and turned to the haif—smiling, half-protest— ing Sir Mohan.
‘Reserved!’ yelled Bill.
‘Janta — Reserved. Army — Fauj’ exclaimed Jim, pointing to his khaki shirt. ‘Ek dum jao — get out!’
‘I say. I say, surely,’ protested Sir Mohan in his Oxford accent.
The soldiers paused. it almost sounded like English, but they knew better than to trust their ir-iebriated ears. The engine whistled and the guard waved his green flag.
They picked up Sir Mohan’s suitcase and flung it onto the platform.
Then foliowed his Thermos-flask, suitcase, bed ding and The Times. Sir
Mohan was hvid with rage.
‘Preposterous, preposterous,’ he shouted, hoarse with anger. ‘I’ll have you arrested — guard, guard!’
Bill and Jim paused agaixi. Tt did sound like English, but it was too much of the King’s for them.
‘Keep yer ruddy mouth shut!’ And Jim struck Sir Mohan fiat on the face. The engine gave another short whistle and the train began to move.
The soldiers caught Sir Mohan by the arms and flung him out of the train. He reeled backwards, tripped on his bedding, and landed on the suitcase. ‘Toodle-oo!’
Sir Mohan’s feet were glued to the earth and he lost his speech. He stared at the lighted windows of the train going past him in quickening tempo. The tail end of the train appeared with a red light and the guard staridirig in the open doorway with the flags in his hands.
In the inter-ciass zenana compartment was Lachmi, fair and fat, on whose nose the diamond nose ring ghstened against the station lights.
Her mouth was bloated with betel saliva which she had been stormg up to spit as soon as the train had cleared the station. As the train sped past the lighted part of the platform, Lady Lai spat and sent a jet of red dribbie flying across like a dart.

Comprehension
1. The setting: When and where is the story set?
2. Give an account of the events that take place, seen from Sir Mohan
Lai’s point of view. Use the following words: inefficient, dirty, indiffer

ent, distinguished, efficient, handsome, tickety-boo, anglicized Hindustani,
The Times, Balliol tie, whisky, firs t-class coupe, English soldiers, preposter ons, flung out, lost his speech
182

10

15

20

25

30

35

~~Globa1~1nd1a~,

3. Give an account of the events that take place, seen from Lady Mohan
Lai’s point of view. Use the foilowing words: betel leaf, gold bangle,

in keeping with Idi overensstemmelse med

coolie, zennnn, gossip, illiterote, ;iocturnal visist, belcli, red dribble Jh/ing ncross like o dart

Analysis and interpretation
1. How does Sir Mohan Lai describe himseif? What does he do to main tam the image he wants to sec reflected fri the mirror?
2. What does Sir Mohan Lai think of Iridia and the Indians?
3. What is his reiationship to his wife like?
4. How do the English soldiers see Sir Mohan?
What is meant by too rnuch of the King’s for them?
5. How do you interpret what happens fri the end?
6. Why is the story calied Karma?

Post-reading
Imagine that Sir Mohari Lai paid the class a visit. Make five questions that you would like to ask Sir Mohan. Let 2-4 students be Sir Mohan, and ask your questions. The answers must be in keeping with Sir Mohan’s character. You could also invite Lady Mohan Lai.

183

Similar Documents

Free Essay

Pos 371 Complete Course Material ( a+Grade )

...Are certain components more critical to a program? If so, explain which ones and why they are more critical. Week 2 DQs Hogan’s (2007) article discusses many software development issues. Pick one of these issues, explain its significance, and critically examine the article’s discussion. Week 3 DQs Find a website that explains the use of a selection structure or an iteration structure in programming. Provide the link and explain why the site is helpful. Week 4 DQs Based on Wirfs-Brock’s (2007) article, discuss whether there is more to good design than beautiful code. Week 5 DQs How are recursion and iteration used in programming? Provide examples of the various types of recursion and iteration, and explain why each is used. Road To Hana – Flowchart Road to Hana.a2w – PPT Space Jump – Flowchart Space Jump.a2w –...

Words: 294 - Pages: 2

Premium Essay

Basic Commands in Linux and Windows

...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................

Words: 2543 - Pages: 11

Free Essay

Realization

... 10 out of 10 points | | | A multi-tasking operating system is capable of executing more than one program at a time for a user.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 2 10 out of 10 points | | | ASCII code is one of the code schemes used to represent characters in a byte.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 3 10 out of 10 points | | | Operating systemAnswer | | | | | Selected Answer: |  d.  all of the above | Correct Answer: |  d.  all of the above | | | | |  Question 4 10 out of 10 points | | | About 95 percent of the UNIX operating system is written in C language.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 5 10 out of 10 points | | | The two major versions of the UNIX operating system are AT&T's UNIX version V and Berkeley UNIX.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 6 10 out of 10 points | | | You must login to use the system. It means that, in response to prompts you type your user Id and password.Answer | | | | | Selected Answer: |  True | Correct Answer: |  True | | | | |  Question 7 10 out of 10 points | | | You can change your password as many times as you wish.Answer | |...

Words: 285 - Pages: 2

Premium Essay

Zara Case

...ZARA: IT for Fast Fashion With ZARA's fashion business expanding, Salgado and Sanchez have a critical decision to make on whether to upgrade the current, seemingly out of date IT system. Like other large clothing retailers, ZARA adopts a highly standardized business model for ordering, design, manufacturing and procurement across all product categories and regions. However, unlike most clothing retailers, ZARA's business model is based on fast delivery times with minimal inventory, decentralized decision making process and very low data integration among different stores. Unlike its competitors, Zara relies on its individual store managers and designers, rather than an elite team of senior managers, to perform market research on latest trends and decide what clothes to design and procure. ZARA's approach to Information Technology is based on its business needs. In order to establish itself as a brand, which aligns closely with customers' taste, ZARA needs to have information on latest trends from all its stores to keep pace with the ever-changing fashion world. On the other hand, ZARA's popularity and high growth requires an upgraded IT system, which can be easily replicated and scalable to new stores. ZARA's current DOS system serves this purpose efficiently as it is easy to install in a newly opened store and requires little training. ZARA's approach of simple, non-integrated low cost IT investment is well in sync with its decentralized...

Words: 1179 - Pages: 5

Free Essay

Zara Case

...According to the point of view of Salgado , Zara is getting bigger and bigger and its operating system getting more and more obsolete. Thus, it gives Zara to have a comparative advantage because for a strategic perspective. Although Zara's advantage over its competitors is not so much a result of IT leverage, the sustainability of its competitive edge might be at risk due to a lack in IT investment.The current assumption for the IT investment states about 18,000 hours. The Zara's staff devoted to IT contains about 50 people divided in several departments. So we can suppose that only 10 people are devoted to POS software and so 10 people are able to handle this project. With a brief calculation, we can figure that it would take too much time to set up this project with an internal team. That is why we are prone to think that externalize would provide a more efficient solution, completely handle by an outsourced professional team. It could be a little more expensive at short and long term that is why if we choose this option we have to integrate a training system of our staff to lower the outsourced fees. An important point is that Zara has always developed its own IT solutions and if we make it through subcontractors we are not sure that it would match with Zara values or way of doing. Zara has been used to make it alone. Thus we think that some member of the IT staff could work with subcontractors in order to lower these expenses and help them to create an It solution...

Words: 600 - Pages: 3

Premium Essay

Effective Managerial Skills

.... Evaluate Microsoft’s strategy in good and poor economic times. In Good Economic Times: Microsoft is the world’s most successful software company. The original mission of this company is “a computer on every desk and in every home, running Microsoft software.” Microsoft's tactic was to be a software manufacturer and make its operating system available to computer manufacturers for use in their personal computer products, and then sell the owners of PCs software to run on that operating system. The history was begins in early 1980, where Microsoft creates DOS Operating System for IBM computer. The company used this inertial success with IBM to sell software to other manufacturer, quickly making Microsoft a major player in this industry. This is one of the changes for Microsoft to grown faster with the inertial advertising efforts focused on communicating the company range products from DOS to the launch of Excel and Windows. Later in 1986, Microsoft went to public with windows operating system and Microsoft office. The strategy contribute to launch this two application is a milestone for Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another...

Words: 321 - Pages: 2

Free Essay

Week Five

...While contrasting UNIX systems to Windows a few of the features discovered in UNIX incorporate: the usage of simple text for saving data; a ordered file system; UNIX manages tools for example printing equipments, mouse and keyboard and also other tools like files. The UNIX system also manages directories and procedures like files. There's only one root directory inside the UNIX operating system hierarchical tree. UNIX utilizes devices and applications via the command line in contrast to utilizing a single monolithic application which includes all the same functionality. The kernel offers services to begin and stop applications, deals with the file system that saves and arranges the computer system files and data. The kernel usually shifts data into as databases for storage and use. Both UNIX and Windows file systems are ordered and both support lengthy names as much as 255 characters. File Processing Evaluation UNIX programs that are based upon simple text files for setup use a lot of powerful devices that are utilized to process text files. Piping is widely utilized to reroute the result of one command to the input of the subsequent command. UNIX deals with most command in a consecutive order (first in first out) but the procedure may be overridden by making use of variables and alternatives (ADD). This lets commands to be installed collectively and implemented without storing all the results to an output file. UNIX utilizes commands that include: Echo - shows text...

Words: 2702 - Pages: 11

Premium Essay

Unix vs Windows Critique

...manufacturers (Apollo Group, Inc., 2005). With manufacturing plants in Albany, Georgia, Pontiac, Michigan, and Hangzhou, China, Riordan’s e-business plays a vital role in continued growth. Riordan’s Internet site states, “Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. Purpose The purpose of this paper is to discuss the differences between UNIX/Linux versus Microsoft Windows. Our paper will discuss facts that cover security, administrative, networking, performance, programmability. Security Technical One of the key differences between the Unix approach to system security and the MS Windows approach is that significant security characteristics of Unix systems are a consequence of good architectural design. Modularity within the system is another example of architectural security in UNIX, but lacking in MS Windows. These differences in the design and relative security of Unix and Microsoft OSs illustrate a distinct difference in philosophy between them. A couple of factors considered in regards to the security features are the importance of privilege separation, user control and automatic execution. Unfortunately, the difference appears to be that where Unix has a philosophy of security built into the...

Words: 2022 - Pages: 9

Free Essay

Os History

...Sistemas Operativos Historia En la década de 1940, los primeros sistemas electrónicos digitales no tenían sistemas operativos. Los sistemas de la década de 1950 en general funcionaban solamente con un proceso a la vez. Y se permitía una sola persona a la vez para utilizar la máquina. Todos los recursos de la máquina estaban a disposición del usuario. La facturación por el uso de la computadora era simple- porque el usuario tenía toda la máquina. Originalmente, cada usuario escribía todo el código necesario para implementar una aplicación concreta, incluidas las muy detalladas de la máquina de nivel de entrada/salida de instrucciones. Muy rápidamente, la codificación de entrada/salida necesaria para implementar funciones básicas se consolidó en un sistema de control de entrada/salida (IOCS). Los usuarios que deseaban realizar operaciones de entrada/salida ya no tenían que codificar las instrucciones directamente. En su lugar, utiliza las rutinas IOCS para hacer el trabajo real. Los primeros sistemas de almacenamiento real para un solo usuario fueron dedicados al trabajo más que al tiempo de ejecución del trabajo en sí. Los trabajos generalmente requerían un tiempo de configuración considerable alto durante el cual el sistema operativo, cintas y paquetes de discos se montaban, y las formas adecuadas se colocaban en la impresora, etc. Cuando los trabajos se completaban, se requería un tiempo considerable de "desmontaje" como cintas y paquetes de discos que eran retiradas, etc...

Words: 4031 - Pages: 17

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...NT1210 Lab 5.4 Basic Network Troubleshooting Exercise 5.4.1 If you needed to determine the computer name used for node E on the network (starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise...

Words: 344 - Pages: 2

Free Essay

Sample

...switching off of the echo command. | Example | echo This line will be echoed twice to the screen, @echo Whereas this line will occur only once. | Command | ECHO | Description | The ECHO command has several different uses. MS DOS batch files use two echo 'modes'. The default echo mode is ECHO ON. When ECHO is set to ON, every command in the batch file is displayed to the screen before it is run. Sometimes this information is not required, and can even be downright annoying for larger batch files. The command ECHO OFF sets the batch echo mode to OFF. In this mode, the commands are not printed to the screen prior to their execution. As well as the echo modes, the ECHO command is used to print a message to the user. Messages are displayed to the user by preceding a line of text with ECHO. | Syntax | ECHO MODE ON : ECHO ON ECHO MODE OFF : ECHO OFF DISPLAY A MESSAGE : ECHO message | Typical Use | The command @ECHO OFF is almost always placed at the top of a batch file to switch off subsequent command echo. ECHO is also the only way a batch file can communicate information to a user. | Example | @ECHO OFF ECHO Please insert a disk in drive A: and press any key when ready. | Command | REM (short for remark) | Description | REM is the MS DOS batch file method of providing comments. Comments are lines of code which are not executed by the batch file, but rather are used to convey information about the workings of the batch file itself. Good batch file programming...

Words: 1676 - Pages: 7

Premium Essay

Itn 261

...conducted internal penetration tests (also called a vulnerability scan) on each system and then helped secure those systems by configuring firewalls and removing vulnerable open ports. Lab Assessment Questions & Answers 1.What is the first Nmap command you ran in this lab? Explain the switches used. The first Nmap command I ran was nmap -O -v 10.20.100.50. The switches used are represented with -O AND –v this allows to detect the operating system used on 10.20.100.50 and also shows the detail of open ports. 2. What are the open ports when scanning 192.168.3.25 and their service names? Open Ports that were open are as follows: PORT SERVICE 80/tcp http 135/tcp msrpc 139/tcp netbios-ssn 445/tcp Microsoft-ds 3389/tcp ms-wbt-server Remote Desktop Protocol 5357/tcp wsdapi Web Services for Devices And other 49152, 49153, 49154, 49155, 49156 and 49157 are DCOM or ephemeral ports. 3. What is the command line syntax for running an SMB vulnerability scan with Nmap against 10.20.100.50? Type nmap –script=smb-check-vulns –p445 10.20.100.50 4.Explain why SMBv2 DoS (CVE-2009-3103) is bad. SMBv2 Dos (CVE-2009-3103) is bad because port 455 exposes the operating system to remote execution of arbitrary code if it is lacking sufficient service pack level or a key security hotfix. 5. What is the operating system of IP address 192.168.40.238? UNIX Operating System 6. What are the reverse IP addresses for the three remote computers scanned in this...

Words: 290 - Pages: 2

Free Essay

Windows vs Linux

...A Comparison of the Security of Windows NT and UNIX† Hans Hedbom1,2, Stefan Lindskog1,2, Stefan Axelsson1 and Erland Jonsson1 1Dept of Computer Engineering 2Dept of Computer Science Chalmers University of Technology S-412 96 Göteborg, SWEDEN {sax, Erland.Jonsson}@ce.chalmers.se University of Karlstad S-651 88 Karlstad, SWEDEN {Hans.Hedbom, Stefan.Lindskog}@hks.se Abstract This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than “standard” UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the “real” level of security between these systems. †Presented at the Third Nordic Workshop on Secure IT Systems, NORDSEC’ 5-6 November, 1998, Trondheim, Norway. 98, 1. Introduction It has been claimed that the security of Windows NT is far better than that of previous commercial operating systems. In order to verify (or refute) this statement we have made a brief comparison of the security of Windows NT to that of UNIX. UNIX was selected as a reference since it is well-known and widely spread. Thus, the target systems were (1) a networked Windows NT 4.0 and...

Words: 6676 - Pages: 27

Premium Essay

It140-1304b-04: Introduction to Operating Systems and Client/Server Environments

...Phase 1 – Individual Project Colorado Technical University IT140-1304B-04: Introduction to Operating Systems and Client/Server Environments Table of Contents Introduction to Operating System 3 Project Organization 3 Windows 3 Linux 5 Virtualization 6 Components of a Computer System 8 Managing Client – Server Environments 9 Securing Operating Systems 10 System Administrators 11 Configuring Windows 7 and Linux+ Prep LabSim Toolkit 12 Phase 1 LabSim 12 References 13 * Introduction to Operating System Project Organization ACME is a pharmacy based healthcare provider that has 25 physical locations across the state of Michigan. The company provides long term patient care to the community mental health organizations across the State of Michigan. The organization is an industry leader in a clinical pharmacy services and has grown tremendously over the past 10 years. The organization is privately held and the senior leadership team as well as the centrally managed and support IT infrastructure is located at a single headquarter facility. ACME’s network is comprised primarily of Windows Server 2008 R2 servers, Windows 7 and Windows XP workstations, Microsoft Exchange Server 2010 for messaging, Microsoft SharePoint server for intranet support and Microsoft SQL server as the database platform. The company also utilizes QS1 Data Systems as its primary patient care system and DocuTrack as the document management system. The ACME network is a spoke and...

Words: 1536 - Pages: 7

Premium Essay

Itsc

...Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS version numbers. 4. List some of the types of system configurations. 5. Explain the need and procedure for booting the system. 6. Explain the function of disk files. 7. Explain the function of and rules for file specifications. 8. List and explain the importance of the two types of computer files. 9. Describe the function and purpose of commands. 10. Compare and contrast internal and external commands. 11. Explain the function and purpose of the DIR, VER, and CLS commands. 12. Explain the purpose of and the procedure for using the DATE and TIME commands. 13. Explain the legal and ethical ramifications of copying disks that were not purchased. 14. Explain the purpose and function of the DISKCOPY command. 15. Explain the necessary steps to end a work session. Student Outcomes 1. Identify your system configuration. 2. Boot the system. 3. Use the DIR command to display the files on the screen. 4. Use the VER command to determine which version of Windows is being used. 5. Use the CLS command to clear the screen. 6. Use the DATE and TIME commands to set or change the date and time on the computer. 7. Make a copy of a disk. 8. End a computer work session. Chapter Overview Most people who use computers are really interested in application software. They want programs that are easy to use and that help them solve specific...

Words: 73166 - Pages: 293