Premium Essay

Nt1420

In:

Submitted By jlhubbard80
Words 457
Pages 2
1. What is the difference between scp and sftp utilities? Both are transfer protocols but sftp is more secure and offers more flexibility 2. How can you use ssh to find out who is logged in on a remote system ssh host who 3. How would you use scp to copy your ~/.bashare file from the system named plum to the local system. Scp and then the user@remote: /”path to plum” /”path to save” 4. How would you use ssh to run xterm on bravo and show the disply on the local system? ssh bravo xterm 5. What problem can enabling compression present when you are using ssh to run remote X applications on a local display? Lag, the bandwidth and overhead on compression will not agree with ssh 6. When you try to connect to another system using an Open SSH client and you see a message warning you that the remost host identification has changed, what has happened? What should you do? Means something has changed drastically on the remote machine. Such as OS. Contact Admin to ensure change was deliberate and once verified delete the old key and try to log in again and let the new config create a new key file.

1. By default, email addressed to system goes to root. How would you also save a copy in the /var/logs/systemmail? Edit aliases to include root, /var/logs/systemmail 2. How would Max store a copy of his email in ~/mbox and send a copy to max@bravo.com? $ cat ~/.forward, ~/mbox, max@bravo.com, \max 3. If your firewall allowed only the machine with the IP address x.x.x.x to send email outside the network how would you instruct the local copy of sendmail to use this server as a relay? edit the /etc/mail/access and add the following Connect 192.168.1.1 RELAY 4. What does dnl stand for in the m4 macro language; what are dnl commands used for? Delete new line and it lets the compilier

Similar Documents

Premium Essay

Nt1420 Lab 4

...4.1.1 So that every company follows the same rules and guidelines. Otherwise, there might be different companies that wire the same thing a different way. 4.1.2 Because the signal only needs to be strong enough to be detected on the receiving end. Anything more could lead to difficulties. 4.1.3 Machinery, PA systems, phone lines. Optimize performance, minimize interference. 4.1.4 Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 16 Mbps | 10BaseT Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | 100BaseT Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 1 Gbps | Gigabit Ethernet | 6a | 10 Gbps | Gigabit Ethernet | 4.1.5 Pin | Side A | Side B | 1 | Orange-white | Green-white | 2 | Orange | Green | 3 | Green-white | Orange-white | 4 | Blue | Blue | 5 | Blue-white | Blue-white | 6 | Green | Orange | 7 | Brown-white | Brown-white | 8 | Brown | Brown | 4.1.6 First, there’s the center core. Around that is the dielectric insulator. Covering that is the metallic shield. Followed by the plastic jacket. 4.1.7 It will function properly up to 100 meters. 4.1.8 A to S1 – Straight. B to S1 – Straight. C to S1 – Straight. C to D – Crossover. S1 to S2 – Crossover. E to S2 – Straight. F to S2 – Straight. F to G – Crossover. G to S2 – Straight. 4.1.9 No. The connection between S1 and S2, and between S2 and G. Simply move G closer to S2, and use some kind of router or modem in the middle...

Words: 595 - Pages: 3

Premium Essay

Nt1420 Lab 4

...4.1.1 So that every company follows the same rules and guidelines. Otherwise, there might be different companies that wire the same thing a different way. 4.1.2 Because the signal only needs to be strong enough to be detected on the receiving end. Anything more could lead to difficulties. 4.1.3 Machinery, PA systems, phone lines. Optimize performance, minimize interference. 4.1.4 Category | Maximum Speed | Application | 1 | 1 Mbps | Telephone Cabling (POTS) | 2 | 4 Mbps | Token Ring | 3 | 16 Mbps | 10BaseT Ethernet | 4 | 20 Mbps | Token Ring | 5 | 100 Mbps | 100BaseT Ethernet | 5e | 1 Gbps | Gigabit Ethernet | 6 | 1 Gbps | Gigabit Ethernet | 6a | 10 Gbps | Gigabit Ethernet | 4.1.5 Pin | Side A | Side B | 1 | Orange-white | Green-white | 2 | Orange | Green | 3 | Green-white | Orange-white | 4 | Blue | Blue | 5 | Blue-white | Blue-white | 6 | Green | Orange | 7 | Brown-white | Brown-white | 8 | Brown | Brown | 4.1.6 First, there’s the center core. Around that is the dielectric insulator. Covering that is the metallic shield. Followed by the plastic jacket. 4.1.7 It will function properly up to 100 meters. 4.1.8 A to S1 – Straight. B to S1 – Straight. C to S1 – Straight. C to D – Crossover. S1 to S2 – Crossover. E to S2 – Straight. F to S2 – Straight. F to G – Crossover. G to S2 – Straight. 4.1.9 No. The connection between S1 and S2, and between S2 and G. Simply move G closer to S2, and use some kind of router or modem in the middle...

Words: 595 - Pages: 3

Premium Essay

Nt1420 Unit 4 Assignment

...// This project is submitted as part of the assessment for Year 9 IST. // This is all my own work. I have referenced any work used from other // sources and have not plagiarised the work of others. // (signed) Maximilian Evans //Starting Variables //Game Length Variable var timer = 30; //Game Running? Variable var gameRunning = false; //Current Score Variable var currentScore = 0; //Mole Hit? Variable var moleHit = false; //Number of Moles Variable var i = 40; //==========================================================\\ //START GAME FUNCTION \\ //This function runs when either the start button or restart\\ //button is clicked. It resets the variables, iterates the \\ //game timer, as well as controlling which mole and where \\ //it has to appear next \\ //==========================================================\\ function runGame() { //Variable to determine if game is running gameRunning = true; //Var i = number of moles in game i = 40; //Sets game length to 30 secs timer = 30; //Updates current score document.getElementById("moles-whacked").innerHTML = ('0'); //Starts timer/game var countdown = setInterval(function startGame() { //Hides start button when game starts document.getElementById("start-button").style.display = "none"; //Hides restart button when game starts document.getElementById("restart-button").style.display = "none"; ...

Words: 740 - Pages: 3

Free Essay

Nt1420 Unit 1 Exercise 1

...Unit 1 Exercise 1 An analog signal is any continuous signal which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. A digital signal is a physical signal that is a representation of a sequence of discrete values (a quantified discrete-time signal), for example of an arbitrary bit stream, or of a digitized (sampled and analog-to-digital converted) analog signal. Half-duplex data transmission means that data can be transmitted in both directions on a signal carrier, but not at the same time. Full-duplex data transmission means that data can be transmitted in both directions on a signal carrier at the same time. A ring network is a network topology in which each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node - a ring Long-distance telephone company, such as MCI (before its absorption by Verizon), Sprint and the former AT&T Corporation (before its merger with SBC in 2005). In the United States, it is defined as any carrier that provides inter-LATA communication, where a LATA is a local access and transport area. Long Distance central office, central office (CO) is an office in a locality to which subscriber home and business lines are connected on what is called a local loop. Tandem, telephone switch is a U.S. telephone company central office telephone exchange used to interconnect local exchange carrier...

Words: 263 - Pages: 2

Premium Essay

Unit 1 Research Assignment 1: Exploring Programming Languages

...Unit 1 Research Assignment 1: Exploring Programming Languages NT1420 In the late 1960’s Simula was invented by Nygaard and Dahl as a superset of Algol 60, this was the first language designed to support object-oriented programming. Then between 1969 and 1973 C was developed by Dennis Ritchie and Ken Thompson at Bell Labs. Smalltalk was created in the mid 1970’s that provided a complete ground-up design of an object-oriented language, and about the same time Prolog was designed in 1972 by Colmerauer, Roussel, and Kowalski, this was the first logic programming language. In 1973 Robin Milner built two polymorphic type systems (ML and Lisp) which were used in pioneering statically typed functional programming languages. Now going to the 80’s, Ada was created in 1983 by a team ran by Jean Ichbiah which was designed for built-in language support for explicit concurrency, offering tasks, synchronous message passing, protected objects, and non-determinism. Erlang was developed by Joe Armstrong in 1986 that supports hot swapping, so that code can be changed without stopping a system. In 1985 Eiffel was created as an ISO-standardized, object-oriented programming language designed by Bertrand Meyer. The program emphasizes declarative statements over procedural code and attempts to eliminate the need for bookkeeping instructions. TCL is a scripting language created by John Ousterhout in 1988 which is used for rapid prototyping, scripted applications, GUIs and testing. Perl was developed...

Words: 583 - Pages: 3