Free Essay

Nt1430 Assignment 1

In:

Submitted By capthook51183
Words 416
Pages 2
Assignment 1
Chapter 1 1. Free software gives the user the freedom to run, copy, distribute, change and improve the software. Three of the characteristics are: a. The freedom to run the program for any purpose. b. The freedom to redistribute copies to help your neighbor. c. The freedom to study how the program works and adapt it to their needs. 4. The Free Software Foundation is a non-profit organization that promotes computer user freedom and their rights and GNU is an ongoing effort to provide a total operating system that is licensed as free software. Linux is an open source operating system modeled on the old UNIX system. Richard Stallman created most of the system, and Linus Torvalds wrote the kernel.
Chapter 2 1. Installing Fedora/RHEL is the process of copying the system files from a portable data medium to a hard disk and setting up the system configuration so that Linux will run properly.
Chapter 3 1. A live system gives you the opportunity to preview the Fedora system without doing an install and it does not require a hard disk. 4. You should put you /boot at the start, or partition 1, so that Linux does not have to travel too far to find the files. 8. Fedora/RHEL will do a default start X differently depending on how your system is set up. If you have runlevel 5 set, it will start when the system boots up. If you have runlevel 3 set, you can enter the text screen, login and type ‘startx’.
Chapter 11 1. In single-user mode, you can only log in at the console and only some of the filesystems and daemons will be running. In multiuser mode, you can log in at any terminal or workstation and most of the filesystems and daemons will be running. 3. The letters su stand for substitute user. With this command you can give yourself privileges to any user that you have the password to and you can execute commands as that user. To log in as Zach without his password, log in as root first and then type su zach or type su – zach to establish the same environment as Zach would have. 7. When you are developing a password, some strategies that you can use to prevent intruders from guessing are: a. Do not use personal information. b. Do not use people, places, or nicknames. c. Always use upper case, lower case, numbers and special characters.

Similar Documents

Free Essay

Nt1430 Week 1 Assignment

...Chapter 1 Exercise 1 Free software is software which is not charged for; as such you can share it with whoever you want, as many times as you want. You can also install it on as many of your home computers as you wish. Chapter 1 Exercise 4 GNU a group dedicated to creating an operating system compatible with the Unix software system. Linux is based off the original Unix operating software. Unix provided the kernel, while Linux provided the interface that people used in place of another operating system like windows or apples own software. Linus Torvalds developed the Linux kernel, and Richard Stallman created the GNU Project Chapter 2 Exercise 1 Depending on the installation being done, Fedora/RHEL either overwrites all the files on the hard drive, or updates the software that has new versions Chapter 3 Exercise 1 A live system is where you have a linux running on top of another operating system like windows. The advantages are that none of the changes you make are kept, as it doesn’t write to the hard drive Chapter 3 Exercise 4 I honestly could not find the answer to this question Chapter 3 Exercise 8 Disk Druid is a GUI program that allows users to add, delete or modify partitions on a hard disk Chapter 11 Exercise 1 Single user mode is where only the system console is enabled, you can run programs from the console, so long as they are not graphical programs (Text only). Multi user Mode is where you have a graphical interface to use. Chapter 11 Exercise 3 SU...

Words: 464 - Pages: 2

Free Essay

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message, then...

Words: 270 - Pages: 2

Free Essay

Nt2640

...NT1430 Linux Networking STUDENT COPY: Assignment 1 for All Units Assignment 1 for All Units: Chapter Exercises (NT1430.GA1) Learning Objectives and Outcomes Each unit exercise covers the Learning Objectives and Outcomes for that unit. You can review those objectives and outcomes in your syllabus. Assignment Requirements Type out answers for the end-of-chapter exercise questions indicated in the list below for each unit. You will be graded on accuracy and completeness. Required Resources Sobell, M. G. (2012). A practical guide to Fedora and Red Hat Enterprise Linux. (6 ed.). Upper Saddle River, NJ: Prentice Hall. th Submission Requirements Submit your word-processed answers to your instructor at the beginning of the next class after the assignment. Units 1-10 Chapter Exercises Unit 1 § § § § Unit 2 § § Unit 3 § § § Unit 4 § § Sobell, Chapter 14, p. 582, Exercises 1-5 Sobell, Chapter 10, p. 403, Exercise 1 Sobell, Chapter 7, pp. 251, Exercises 1, 3, 4, 8 Sobell, Chapter 9, pp. 356, Exercises 1, 2, 3, 4, 5, 6, 8 Sobell, Chapter 9, pp. 357, Advanced Exercises 10, 11 Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10 Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6 Chapter 1, pp. 20-21, Exercises 1, 4 Chapter 2, p. 53, Exercise 1 Chapter 3, p. 86, Exercises 1, 4, 8 Chapter 11, p. 498, Exercises 1, 3, 7 © ITT Educational Services, Inc. All Rights Reserved. -118- Change Date: 05/30/2012 NT1430 Linux Networking STUDENT COPY: Assignment 1 for All...

Words: 403 - Pages: 2

Premium Essay

Nt1430 Unit 2 Lab Procedure

...procedure completely before beginning. Reading for Next Week Chapter 11 and 12 in Practical Guide to Red Hat Linux Exercise 1: Virtual Library research Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: * bash scripts * bash history * the bourne shell * bourne again shell * commands in Linux Required Resources Access to the Internet Access to ITT Tech Virtual Library Submission Requirements * Students bring to class the following: * one printed copy of one pertinent resource found through the ITT Tech Virtual Library * one printed copy of one pertinent resource found through the Internet * Students should be prepared to share and discuss one or two critical points from each resource with classmates. * After small group discussion, students will hand in the printed copies of resources for a pass/fail grade. (print an extra copy for yourself to take notes on and keep.) The resources must pertain to the given topic to receive a passing grade. * Note: If the resource shared is a full website or tutorial, you can just print the lead page that gives key information about the content of the resource. (cont’d) Exercise 2: Accessing the man Pages 1. Start the primary system and log in as the regular none-privilege user 2. Read the man page on man. ------------------------------------------------- ...

Words: 1532 - Pages: 7

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nt1230 Syllabus

... Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh and...

Words: 284 - Pages: 2

Free Essay

Lab 2

...| Unit 2: Lab 1: Managing Files | | Week 2 Assignments | | Unit 2: Lab 1: Managing Files | | Week 2 Assignments | NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas NT1430 / Bowser Linux networking September 25, 2013 By: Cuneo, Thomas Unit 2: Lab 1: Managing Files CH 6, Lab 1: Managing Files 1. [Denise@localhost ~]$ mkdir Unit2 2. [Denise@localhost ~]$ cd Unit2 [Denise@localhost Unit2]$ mkdir memos reports 3. [Denise@localhost Unit2]$ cd [Denise@localhost ~]$ touch memo.one [Denise@localhost ~]$ touch memo.two [Denise@localhost ~]$ touch memo.three [Denise@localhost ~]$ touch report.jan report.feb report.mar 4. [Denise@localhost ~]$ cp memo.one Unit2/memos 5. [Denise@localhost ~]$ cp memo.two Unit2/memos/memo.2 6. [Denise@localhost ~]$ mv memo.three Unit2/memos ((I removed the forward slash & it worked. Not sure if it is correct or not, but I am going to continue anyway…..)) [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three /Unit2/memos mv: cannot move `memo.three' to `/Unit2/memos': No such file or directory [Denise@localhost ~]$ mv memo.three/Unit2/memos mv: missing destination file operand after `memo.three/Unit2/memos' Try `mv --help' for more information. [Denise@localhost ~]$ mv memo.three/Unit2/memos.3 mv: missing destination file operand after `memo.three/Unit2/memos...

Words: 1139 - Pages: 5

Free Essay

Linux Week 1assignment 1

...NT1430 6/27/13 Unit 1 Exercises Assignment 1 Unit 1: 1. Free software is something that is free from the hands of the people you get it from and from this you can change it and modify it to what fits your needs. a. One characteristic of a free software is that the code must go along with the program. b. Users are encouraged to modify the code to make it better and share it with others. c. And lastly you can’t stop or restrict people from sharing this free software. 4. The Free Software Foundation/GNU was a project that was started by Richard Stallman who believed that giving the resources for free software was the way of the future. He also wrote the GNU kernel and system. Linux was developed by Linus Torvalds and was first introduced in September of 1991. Thousands of people world wide have helped make Linux/GNU what it is today. Unit 2: 1. Installing Fedora/RHEL is when you copy the operating system from a CD/DVD and you set up the files so that it works properly on Linux. Unit 3: 1. A live system gives the user the chance to view Fedora without actually installing it. 4. You put /boot at the beginning of the first partition so that Linux has no issue from booting on the drive. 8. You have to set the runlevel to 3, which is text based, and then you can log in and change it to startx. Unit 11: 1. If you log into the system in single-mode you can only sign in at a designated console and some filesystems may not be loaded. However...

Words: 364 - Pages: 2

Premium Essay

Nt2640

...the associate degree program in Network Systems Administration and associate degree in Mobile Communications Technology. The following diagrams indicate how this course relates to other courses in respective programs: Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1201 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming Technology Courses General Education/ General Studies 1 Date: 7/18/2011 IP Networking Syllabus Mobile Communications Technology MC2799 MCT Capstone Project NT2640 IP Networking MC2560 Mobile Wireless Communication I MC2660 Mobile Wireless Communication II MC2665 Mobile...

Words: 2573 - Pages: 11

Free Essay

Unit 2 Assignment Nt1430

...Unit 2 Assignment NAME NT1430 DATE 1. What is the utility that can be used to copy a file, including text and executable program (binary) files? cp 2. Which of the following Linux utilities lists the names of files in a single directory? ls 3. What command displays the last 10 lines of a file? -tail What command displays the first 10 lines of a file? -head 4. What is a Process? What Utility provides communication between processes where output of one process provide input for another? 1.) A process is the execution of a command by Linux. They have the ability to communicate with eachother. 2.) | (Pipe) 5. Which of the following utilities do you use to determine the list of users logged on to a specific terminal? who command 6. What does the command pwd do? What does the cd command do? 1.) Prints the working directory. 2.) Changes from the current directory to another working directory. 7. In terms of file or directory permissions, what does U-G-O stand for? What are the 3 permission that can be given to a file or directory? 1.) User: owner of the file, Group: changes group permissions, Other: anyone who isn’t an owner of a file or in a group. 2.) read, write, execute 8. In terms of permissions, what does 777 mean? It means everyone has permission to read, write and execute a file. 9. What does the command chmod do? What happens when I use it with the following? chmod 755 myfile 1.) It modifies the access...

Words: 529 - Pages: 3

Premium Essay

Nt1210 Introduction to Networking Onsite Course

...technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nt 1210

...technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110 Computer Structure and Logic NT1210 Introduction to Networking NT1310 Physical Networking CO2520 Communications SP2750 Group Theories EN1420 Composition II EN1320 Composition I GS1140 Problem Solving Theory GS1145 Strategies for the Technical Professional MA1210 College Mathematics I MA1310 College Mathematics II Networking Technology Courses Programming...

Words: 4400 - Pages: 18

Premium Essay

Nothing

...ITT Technical Institute NT1310 Physical Networking Student Course Package Bring this document with you each week Students are required to complete each assignment and lab in this course package on time whether or not they are in class. Late penalties will be assessed for any assignments or labs handed in past the due date. The student is responsible for replacement of the package if lost. Table of Contents Syllabus 2 Student Professional Experience 19 Graded Assignments and Exercises 23 Labs 47 Documenting your Student Professional Experience 57 ITT Technical Institute NT1310 Physical Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1210 Introduction to Networking or equivalent Course Description: This course examines industry standards and practices involving the physical components of networking technologies (such as wiring standards and practices, various media and interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580...

Words: 10839 - Pages: 44

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154