Free Essay

Unix/Linux

In:

Submitted By tiffanycarb0607
Words 437
Pages 2
Chap 3

1. What is a live system? What advantages does it have over an installed system? A live system is a Linux session you run on a computer without installing Linux on the computer. When you reboot after a live session, the computer is untouched. They also give you the chance to preview without installing it.

2. Describe the Anaconda installer. Anaconda can perform background processing. You can still be entering information while Anaconda is installing packages and you can skip over the screens that are irrelevant to your install.

3. Where can the installation image used by Anaconda be located? The virtual console

4. Why is it important to test the installation medium? How can you do so? The data can become corrupted while fetching an installation image. It is also possible for a transient error to occur while writing an image to a recordable medium. It can also save you hours of aggravation if the install fails.

5. What should you do if the graphical installer does not work? Try waiting a while and if the installation hangs or try performing a textual installation.

6. When might you specify an ext2 file system instead of ext4? When partitions who data do not change often, because ext4 offers no benefits.

7. Which utilities can you use to partition a hard disk prior to installation? The gnome-disks using a GUI. You can also use the parted or fdisk from the command line.

8. What do you need to do before you can install Fedora as the second operating system on a Windows machine (to create a dual-boot system)?

Make sure there is enough free space on a Windows system. When you boot the updated system you will be able to choose which OS you want to run.

9. How does Anaconda set up a hard disk by default? If the local system only has one disk, Anaconda places a tick over it and it will install the new OS in it.

10. How would you turn off DMA (direct memory access) for all disk controllers when you install a new system? The nodma turns off DMA. To use nodma to turn off DMA you must interrupt the automatic boot process by pressing the SPACE bar while the system is counting down when you first booth from a Live Image or Install Image. Use the ARROW keys to highlight the selection you want before proceeding. With the desired selection highlighted, press the TAB key to display the boot command-line parameters. Enter SPACE followed by nodma and then press RETURN to boot the system.

Similar Documents

Premium Essay

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active...

Words: 2760 - Pages: 12

Free Essay

It Unix Linux

...Introduction to UNIX and Linux UNIX was developed at Bell Laboratories by Ken Thompson and Dennis Ritchie in 1969 and it was created on a minicomputer called the PDP-7. (Muse) Computer aided design, manufacturing control systems, laboratory simulations, even the Internet its self, all began life with and because of UNIX systems. (unix.org) The reason for building UNIX was to create a simple interactive operating system, called “Multics” (Multiplexed Information and Computing System). (Kioskea.net) UNIX went through growing pains through the years, but in 1991, Linus Torvalds, commenced Linux development and the distro Solaris 1.0 debuts. (unix.org) Torvalds writes “Sadly, a kernel” (which is what Linux is and has always been) “by itself gets you nowhere. To get a working system you need a shell, compliers, a library, etc.” (Moody, pg 44) “Linus Torvalds had a kernel but no programs of his own, Richard Stallman and GNU had programs but no working kernel.” (linux.org) GNU is a recursive acronym that means GNU is Not Unix. UNIX/Linux can literally be used anywhere. While completing my AAS, my final project was to build a Samba server, which I needed a Linux distro to make happen, and I went with Ubuntu. Samba is the standard Windows interoperability suite of programs for Linux and UNIX. (Samba.org) Basically, Samba makes file transfer between a Linux/Unix server, and a Windows server, seamless. To Windows, Samba looks just like another Windows server so it allowes easy file...

Words: 515 - Pages: 3

Premium Essay

Unix/Linux Comparison Matrix

...Unix® and Linux® Comparison Matrix - 5 Marks 1. Name three versions of Unix 1. BSD/OS 2. AIX 3. Solaris 2. Name three versions of Linux 1. Canonical's Ubuntu 2. Novell's openSUSE 3. Red Hat's Fedora 3. Describe 3 major differences between Unix and Linux 1. Cost- Linux is free and Different flavors of UNIX have different cost structures according to vendors. 2. Linux is an example of Open Source software and UNIX is a closed source OS. 3. Text mode interface: Linux- BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters. UNIX- Originally the Bourne Shell; now it's compatible with many others including BASH, Korn & C. 4. Which of the following is not a UNIX or Linux variant a. SunOS b. RedHat c. DOS d. HP-UX e. Debian 5. Use the command to change directory locations. a. cd b. rm c. mkdir d. cut 6. Use the command to delete a directory. a. delete_dir b. mkdir c. rmdir d. cat 7. Which of the following are text editors? (Choose all that apply.) a. vi b. emacs c. ls d. cat 8. The command creates a directory named winchester in the root directory. a. mkdir /winchester b. mkdir ../Winchester c. mkdir \winchester d. md /Winchester 9. The command allows you...

Words: 378 - Pages: 2

Premium Essay

Unix, Linux, and Windows Server Critique

...UNIX, Linux, and Windows Server Critique Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently active are just a few of the ways that help close the gap...

Words: 2750 - Pages: 11

Free Essay

Ms Windows vs. Unix/Linux

...Ms Windows vs. Unix/Linux MS Windows vs. Unix/Linux University of Phoenix POS/420 Introduction to Unix October 20, 2008 Scott Stewart MS Windows vs. Unix/Linux  The Microsoft and Linux operating systems have been long considered to be in a competition to be the best operating systems on the market. This paper will compare and contrast these operating systems to help the consumer decide which is right for his or her environment. Such subjects as; cost, market share, hardware requirements, file processing, programming capabilities, availability if application software, networking, and user interface will be examined. Cost The cost difference between running a Linux desktop / server compared to a Microsoft desktop / server is overwhelming. In all scenarios, Linux ends up being the cheaper and more “functionality rich” option. In the first scenario, let’s compare the cost difference between a Linux and Microsoft desktop. The first cost difference in this scenario is the cost of obtaining the software. A copy of most Linux distributions can be obtained for under $60 dollars, and free if it is downloaded from such sites as www.linuxiso.com. A Microsoft desktop is not so cheap however; the initial cost of purchasing a full copy of Windows Vista is currently $319.95, a much larger cost than that of Linux desktop. Functionality wise, both the Linux and Microsoft desktops provide the basic needs of the “home user,” however, such additional features as an Office...

Words: 324 - Pages: 2

Free Essay

Unix/Linux Versus Mac Versus Windows

...to start when trying to understand the basics of any computer hardware system would the operating system. Operating systems are a program which manages the computer’s hardware. These systems provide a basis for application programs and intermediate between the computer’s user and its hardware. There are many different types of Operating serves that are available to use. There are four main Operating systems that are used in today’s Technological world: UNIX, Linux, Mac, and Windows. Each one of these systems has its own unique aspects to offer users, while still sharing the same basics that an operating system needs. Memory Management UNIX/Linux In comparison to other operating systems, UNIX is quite different when it comes to managing its memory. It uses extremely sophisticated memory management algorithms to make the best use of memory resources. Though UNIX and Linux are extremely similar when it comes to how things work internally, there are slight differences that make UNIX distinct. One process that UNIX uses is Swapping; this is done by moving chunks of the Virtual Memory, known as pages, out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page is expected to be needed in the very near future it is called a resident set. This can lead to errors due to memory allocation issues. If the CPU attempts to access a page that...

Words: 4984 - Pages: 20

Premium Essay

Ch 4 Test Linux/Unix

...Ch 4 test lux 205 True/False Indicate whether the statement is true or false. _T___ 1. UNIX/Linux store data, such as letters, product records, or vendor reports, in flat ASCII files. _F___ 2. The command rmdir can be used to delete a directory that is not empty. _T___ 3. Moving and renaming a file are essentially the same operation. _F___ 4. When you are moving files, using the -o option with the mv command can be a good idea so that you don’t unexpectedly overwrite a destination file with the same name. _F___ 5. When you use cat to combine two files into a third file, the first line of the output contains the first line of the first file followed by the first line of the second file. __F__ 6. When you use the paste command, by default, the pasted results appear in columns separated by commas. __T__ 7. You can complete a project using awk that you cannot complete using a combination of paste, cut, sort, and join. Multiple Choice Identify the choice that best completes the statement or answers the question. __C__ 8. In UNIX/Linux, text files and binary files are considered to be ____ files. a.|executable|c.|regular| b.|document|d.|dynamic| __A__ 9. Character special files are used by input/output devices for communicating one character at a time, providing what is called ____ data. a.|raw|c.|ASCII|| b.|binary|d.|block| __C__ 10. System administrators and programmers refer to standard input as ____. a.|sin|c.|stdin|| b.|stin|d.|standardin| ...

Words: 1554 - Pages: 7

Free Essay

Unix/Linux Paperwork Week 3

...for the liscencs / permissions to use the GNU. 2. Describe the relationship between Linux and the GNU Project. Linux and Gnu are used together basicly most systems would be GNU + Linux combinded , Linux is a kernel where GNU is the whole. 3. List and describe in detail four advantages of Linux The Performance of linux is alot stronger where you can do alot more seeing as how it is open source. Linux is Free. Linux also offers you a bunch of free tools from networking stuff, Security, Graphical much more. Also runs on older hardware 4. . List three examples of different hardware platforms on which Linux has been ported. A feware Alpha, Apple Pcs , Compaqs 5.What are the minimum system requirements for Fedora 15 with the GUI installed? Fedora 15 This is basicly for CPUs such as AMD, Cyrix and VIA compatible with equivalent or the following intel processors Recommended for text-mode: 200 MHz Pentium Pro or better Recommended for graphical: 400 MHz Pentium Pro or better Minimum RAM for text-mode: 256 MiB Minimum RAM for graphical: 640 MiB Recommended RAM for graphical: 1152 MiB Processors and memory requirements for the x86_64 architectures Minimum RAM for text-mode: 256 MiB Minimum RAM for graphical: 640 MiB Recommended RAM for graphical: 1152 MiB Can use up to a little more then 9GB of disk space 6. What is the Primary file system type used by Fedora 12 Linux EXT4 7. . What is LVM? What advantages does LVM have over traditional partitions? ...

Words: 352 - Pages: 2

Free Essay

My Homework(Linux & Unix)

...1. 사무실에서 상사가 금요일 10:30 회의에 참석하라고 급하게 지시했는데, 이 일정을 메모할 펜을 찾을 수가 없다. 어떤 Linux 명령을 써서 Meeting이라는 파일에 이 메모를 저장할 수 있는가? 답 : B. cat > Meeting (cat이라는 명령어로 미팅이란 파일에 내가 입력한 내용을 저장) 2. 앞의 문제 1에서 메모하기 전에 금요일의 날짜를 메모에 포함시키기로 하였다. 어떤 Linux명령으로 금요일의 날짜를 알 수 있을까? 답 : A. cal (달력을 출력하는 명령어) 3. 명령을 타이핑하는 중에 명령과 함께 표시해야 할 파일 이름을 잘못 쳤다. 다음 중 어느 명령줄 키 조합(command-line key combination)이 되돌려서 오류를 정정할 수 있나? 답 : A. Ctrl+b (이전문자로 이동하는 명령줄 키 조합) (Alt+End, Ctrl+2, Shift+Alt+m 해당하는 조합은 책 어디에도 없었습니다.) 4. 지난 몇 달 동안 당신은 패스워드를 변경하지 않았고, 이제 새 패스워드로 바꾸려고 한다. 다음 명령 중 어느 것을 써야하나? 답 : D. passwd (패스워드를 새로지정하는 명령어) 5. cat명령에서 -n 옵션이 무엇에 쓰는 것인지 생각나지 않는다. 다음 중 어느 것을 써야 cat의 -n 옵션의 목적을 알아낼 수 있나? 답 : C. man cat (‘man 명령어‘는 해당 명령어의 매뉴얼을 볼수잇는 명령어) 6. 다음 중 어느 것이 AT&T Bell 연구소가 원래 개발한 UNIX 배포판인가? 답 : D. System V 7. Linux에서 쓰이는 기본 명령해석기(command interpreter)는 어느 shell인가? 답 : A. Bash shell (본문에 리눅스는 기본명령해석기로 bash shell를 사용한다고 나와있습니다.) 8. Annual_Report라는 파일의 끝에 텍스트 한 줄을 추가하려한다. 다음 명령 중 텍스트 한 줄을 추가할 수 있는 명령은 어느 것인가? 답 : C. cat >> Annual_Report (cat >> 파일이름 : 해당파일에 내용추가) 9. SSH는 (하는데) 쓰일 수 있다. 답 : B. 네트워크 상의 다른 컴퓨터에 로긴(log-in) 10. 오늘은 Linux서버관리자로서 첫날이어서 상사가 root 패스워드를 알려줬다. root가 무엇인가? 답 : D. UNIX/Linux 시스템에 완전한 접근을 할 수 있는 관리자 계정 11. project라 부르는 문서 파일에서 파일의 생성 날짜와 마지막으로 갱신된 날짜를 파일의 마지막 두 줄에 기록했다. 어느 명령이 project 파일의 마지막 두 줄을 보여줄까? 답 : c. tail -n 2 project (답은 이것이 맞으나 실제 실행시 저 문구대로 실행한다면 오류가 뜨면서 사용법을 보여준다. 그러므로 정확한 답은 tail –2 project) 12. man명령으로...

Words: 815 - Pages: 4

Free Essay

Guide to Unix Using Linux

...Review Questions 1. b cat > Meeting 2. a cal 3. a Ctrl + b 4. d passwd 5. c man cat 6. d System V 7. a Bash shell 8. c cat >> Annual_Report 9. b log in remotely to another computer on a network 10. d the administrative account that has complete access to a UNIX/Linux system 11. c tail –n 2 project 12. a q 13 A SUSE Linux Enterprise B Mandriva C Fedora D Red Hat Enterprise Linux 14. a less b cat 15. a the users on the local system C a listing of all authorized users on a system, regardless of whether or not they are logged in 16 d clear 17. d Use the shut Down option even though your coworker may want to access the computer after you, becuase this is the best way to fully reinitialize security for the next user session 18. b a peer-to-peer network 19. a a mainframe computer B a desktop pc C a sever D a workstation used for scientific research 20. c press the up arrow key one time 21. b date -u 22번. 스크롤을 아래로 내려 파일의 내용을 볼 수 있습니다 23번. Telnet은 원격 컴퓨터, UNIX, 리눅스, 또는 Windows PC를 연결하는데 사용될 수 있다. 24번. 유닉스와 리눅스는 예민하다, 그러므로 달력을 표시하기 위해서 cal명령과 not cal명령을 사용해야만 한다. 25번. 한줄에 한 개이상의 명령을 실행시키기 위해서는 :세미콜론을 사용하여 각각의 명령을 구분시킨다. 1장 DISCOVERY EXERCISES 1. 현재 파일목록확인을 할 때 사용하는 명령어이다. 현재디렉토리의 파일 목록뿐만 아니라 원하는 파일이 어느 디렉토리에있는지도 확인가능하다. 2. –R 옵션을 찾을 수가 없습니다. 3. 알아볼것 없음 4. 저는 1995년 8월 20일 생입니다. 확인 결과 일요일입니다. 4. 2008년 2012년 6. 화면에 clear를 입력 후 화면을 정리하고 .. 7. Date –u로 출력합니다. 8. cal...

Words: 1150 - Pages: 5

Free Essay

Secring Windows and Unix/Linux Servers

...Securing Windows and Unix/Linux Servers Floyd E. Street DeVry University Securing Windows and Unix/Linux Servers With the constant threat of internet hackers on the rise, Companies must pay close attention to secure their computer networks from would be intruders. In order to maintain the highest level of security within the os servers you must first have knowledge of the vulnerabilities of the running operating system. It is those vulnerabilities in the system that the intruders will be searching your network for. The known shortcomings and vulnerabilities of Windows and Unix/Linux servers have dysfunctions that can be exploited to gain access to a company’s private information. This information in the wrong hands could cost an organization millions of dollars in security damages. One of the ways to prevent this type security breech is to make sure that your Windows and Unix/Linux servers has the right up dated patches for these operating systems. According to, (Conklin, W. A.2009) “One of the most effective measures security professionals can take to address attacks on their computer systems and networks is to ensure that all software is up-to-date in terms of vendor-released patches. Many of the outbreaks of viruses and worms would have been much less severe if everybody had applied security updates and patches when they were released.” Ignoring the update prompts on your system is not a wise thing to do. New vulnerabilities in operating...

Words: 471 - Pages: 2

Free Essay

Unix/Linux Versus Mac Versus Windows

...Learning Team Outline POS 355, Outline of the UNIX/Linux Versus Mac versus Windows Paper I. Memory management a. UNIX®/Linux® i. Memory ii. Memory Management iii. Aging iv. Life Cycle b. Mac® v. Organization of memory vi. System Heap vii. System Global Variables viii. Temporary Memory ix. Pointers x. Invalid Handlers xi. Low-Memory Conditions xii. Virtual Memory c. Microsoft® Windows® Operating systems xiii. Paging in x86 processor xiv. Page Management xv. Memory Protection xvi. Logical Memory Layout II. Process management d. UNIX®/Linux® xvii. Process management within the UNIX OS is based of command prompts via Linux Terminal. xviii. Top ten commands that are helpful in process management * Top * Htop * Ps * Pstree * Kill * Pgrep * Pkill & killall * Renice * Xkill e. Mac® xix. Activity Monitor: process manager within the Mac OS. xx. User interaction and efficiency how does Activity Manager help. f. Microsoft® Windows® Operating systems xxi. Task Manager xxii. User interaction and efficiency how does Task Manager help and or is less effective than Activity Manager. III. File management xxiii. Compare and contrast how file management operates respectively...

Words: 307 - Pages: 2

Free Essay

Unix/Linux vs. Mac vs. Windows

...are many operating systems to choose from but below four specific operating system are compared. Process Management, File Management, Memory Management, and Security are going to be compared between Windows, Linux, UNIX, and Mac operating systems. Every operating system is different and is interesting to see how every piece of software has the same outcome but has different procedures in between. Process management is defined as how the OS manages multiple programs running at the same time. A thread is a feature of an OS that enables parallel processing within a single process. UNIX, Windows, and Mach are all multitasking systems that support both processes and threads. They can be compared in several respects with regard to the process management features. When executing a program on UNIX, the system creates an environment for that program. In this setting there is everything needed to execute that program. The OS tracks processes though a five digit number Recognized as the Process ID. Each process has its own unique PID. PID’s ultimately repeat because all the probable numbers are used, and the next PID repeats the system again. At any time, no two Processes with the same PID occur in the system, because it is the PID that UNIX uses to track its processes. Each UNIX process has two ID numbers. The PID or process ID, and PPID or Parent process ID. Each user process in the system has a PPID. Normally, when a child process is killed, the parent process is told by a SIGCHLD...

Words: 452 - Pages: 2

Premium Essay

Unix/Linux Versus Mac Versus Windows

...start when trying to understand the basics of any computer hardware system would the operating system. Operating systems are a program which manages the computer’s hardware. These systems provide a basis for application programs and intermediate between the computer’s user and its hardware. There are many different types of Operating serves that are available to use. There are four main Operating systems that are used in today’s Technological world: UNIX, Linux, Mac, and Windows. Each one of these systems has its own unique aspects to offer users, while still sharing the same basics that an operating system needs. Memory Management UNIX/Linux In comparison to other operating systems, UNIX is quite different when it comes to managing its memory. It uses extremely sophisticated memory management algorithms to make the best use of memory resources. Though UNIX and Linux are extremely similar when it comes to how things work internally, there are slight differences that make UNIX distinct. One process that UNIX uses is Swapping; this is done by moving chunks of the Virtual Memory, known as pages, out of the main memory and moving others in. In order for this process to work at its best, those pages that are needed must be accessible in the Main Memory at the demand of the CPU. When a page is expected to be needed in the very near future it is called a resident set. This can lead to errors due to memory allocation issues. If the CPU attempts to access a page...

Words: 341 - Pages: 2

Free Essay

Project 9 Unix Linux Admin1

...Part I 1-What version number of webmin did you install? Version 1.791-1 2- What do you do to update webmin, and all webmin modules? After we open the webmin go to webmin configuration then click on upgrade webmin Click on upgrade webmin then update modules. 3- Using webmin, create a new user account auser with the real name Anne User.  Use defaults for all other values. A. What was the default group used? auser B. What was the default shell used? /bin/sh C. Was the account created enabled or disabled? Enable D. What was the password used? Aaa4321 E. When (if ever) does the password expire? I didn’t put expire password F. When (if ever) does the account expire? There’s no expireation for the account What files were modified on your system as a result of the user account creation?  Passwd , group, gshadow, shadow 4- A. Set new accounts default shell to /bin/bash. useradd -s /bin/bash auser1 B. Set new accounts to expire on December 15 (of this year). useradd -e 2016-12-15 auser2 C. Set new account passwords to expire after 3 months. useradd –f 45 D. Set new accounts to be disabled one week after the password has expired.  (That is, after one week of inactivity after the password has expired.) useradd –e 2016-08-05 –f 45 auser3 What were the options used for each command? 5- create a new user account buser with real name Bob User.  Make...

Words: 924 - Pages: 4