CIS_2550_Topic12_Lab complete
.docx
keyboard_arrow_up
School
Sinclair Community College *
*We aren’t endorsed by this school
Course
2550
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by phillipharris86
CIS 2550 – Lab Worksheets
Topic 12: Maintaining Integrity & Fixing Filesystems
Your Name:
Phillip Harris
Date:
11/11/23
Instructions
:
Complete the tasks described in this worksheet. Read the instructions carefully and submit evidence of your completed tasks (a
screen shot is your evidence). Answer the questions below in the space provided.
Showing Evidence of Completion:
Your evidence of completion is a screen shot, as described in each exercise. Use the
tool of your choice to take a screen shot of the required content.
Screen shots should be pasted at the end of this docu
-
ment.
Answering Questions:
Your answers should be written in carefully edited college-level English, using complete sentences.
Question2 (6 points)
Answer
Using your class material explain the purpose of an in-
ode, and answer the following question in your own
words:
(2 points)
Are there any limitations on availability of in-
odes?
When is the maximum number of inodes speci-
fied?
An inode is a file that holds information about a file. Inode limitations are decided by-
when you create a filesystem, and also let you know the maximum amount once they
are created.
Question2 (6 points)
Answer
Explain what happens when you run a file system check
(fsck) on a mounted partition. What you must do to per-
form the check and how this might affect any users us-
ing the system.
(2 points)
If you were to run fsck on a mounted partition, you would get a warning saying that it
will cause severe damage. You have to unmount the partition first that you are check-
ing. It could affect users that are using files from the partition because you would be
taking access away.
Using your class material describe a super block, and
how many exist for a single file system. Be sure to use
your own words.
(2 points)
A superblock is a collection of data that shows the contents in a file system.
Showing Evidence of Completion:
Your evidence of completion is a screen shot, as described in each exercise. Use the tool of your choice to take
a screen shot of the required content. Paste the screen shot into the table cell as indicated. Make your screen shot image small by clicking on it,
then holding down the SHIFT key while dragging one of the corner nodes inward. If you’re using Windows try the Snipping Tool which lets you se-
lect the area on the screen you want to capture.
Unless noted
all screenshots need a name and date stamp as such
Use the command:
echo “Your Name” && date
this will generate two lines of output.
Example:
Put this before or after the requested output
(NOT in a separate window and pic).
If this is not done or visible in the output the submission will
not be counted.
Screen Pics (14 points)
1.
On any Linux System
.
Provide one screen capture displaying the
df
command, display the disk usage using the human readable format
option
. (3 points)
2.
On CentOS Server.
As root
run the disk use (
du
) command on
/root
with the following (4 points):
a.
Displaying for all files, not just directories option.
b.
In human readable format option.
c.
Pipe it to sort using the numeric sort option.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Overview
Reading and writing to files is a constantly used way of transferring data in many different kinds of programs. Websites, such as news sites, and various phone applications are both excellent examples of this widespread use. Phone apps in particular will always read and write to files, since the alternative of writing to databases would be too large for their purposes. Another example is an application you use for daily tasks such as writing in a Microsoft Word file and uploading it as a Brightspace submission (to later be downloaded by your instructor). All of these demonstrate the importance and prevalence of reading and writing to a file as a method of information sharing.
Later in this course, you will need to be able to share information between C++ and Python as part of completing a larger task. Practicing reading and writing to a file this week will help prepare you for that later work. Although you will eventually have a broader understanding of working with files in…
arrow_forward
Req: mvc model
dont copy/paste please
The system enables the specialist and guardian to treat and follow up on autism disorder cases. The specialist can add exercises and diagnostic tests for the patient, print reports, and communicate with the guardian. The guardian can view the patient's progress, communicate with the doctor, and add reviews or notes.
arrow_forward
Differentiate Solution files (.sln) to Executable files (.exe)4-5 sentences
arrow_forward
Req: mvc model
The system enables the specialist and guardian to treat and follow up on autism disorder cases. The specialist can add exercises and diagnostic tests for the patient, print reports, and communicate with the guardian. The guardian can view the patient's progress, communicate with the doctor, and add reviews or notes.
dont copy paste pealse
arrow_forward
There are several ways to access files. The advantages and disadvantages of putting them into practice are of interest to me.
arrow_forward
A system for monitoring the integrity of files may be designed in line
with a standard.
arrow_forward
What are the requirements for checking the files' integrity?
arrow_forward
Why is it important to understand different paste options?
What problems could you run into when using a large worksheet? How can you prevent these problems?
When is it appropriate to delete an entire row or column, as opposed to deleting data in the row or column?
arrow_forward
Don't want copy paste answer
arrow_forward
Flat files and folders are often confused with computer databases, which is understandable. In your own words, describe three different ways to distinguish a flat file from a computer.
arrow_forward
Case Project 5-1
Creating Flexible Storage
It’s been 6 months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to get low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes. He wants a flexible solution in which drives and volumes aren’t restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a storage enclosure system that can contain up to 10 HDDs. Which Windows feature can accommodate these needs, and how does it work?
arrow_forward
Information technology The data type "Number" is an example of a data type for a data field in the record of an Access table.
True
False
arrow_forward
Access to files may be gained in a number of different ways. I am curious to understand more about the advantages and disadvantages associated with putting them into practise.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Related Questions
- Overview Reading and writing to files is a constantly used way of transferring data in many different kinds of programs. Websites, such as news sites, and various phone applications are both excellent examples of this widespread use. Phone apps in particular will always read and write to files, since the alternative of writing to databases would be too large for their purposes. Another example is an application you use for daily tasks such as writing in a Microsoft Word file and uploading it as a Brightspace submission (to later be downloaded by your instructor). All of these demonstrate the importance and prevalence of reading and writing to a file as a method of information sharing. Later in this course, you will need to be able to share information between C++ and Python as part of completing a larger task. Practicing reading and writing to a file this week will help prepare you for that later work. Although you will eventually have a broader understanding of working with files in…arrow_forwardReq: mvc model dont copy/paste please The system enables the specialist and guardian to treat and follow up on autism disorder cases. The specialist can add exercises and diagnostic tests for the patient, print reports, and communicate with the guardian. The guardian can view the patient's progress, communicate with the doctor, and add reviews or notes.arrow_forwardDifferentiate Solution files (.sln) to Executable files (.exe)4-5 sentencesarrow_forward
- Req: mvc model The system enables the specialist and guardian to treat and follow up on autism disorder cases. The specialist can add exercises and diagnostic tests for the patient, print reports, and communicate with the guardian. The guardian can view the patient's progress, communicate with the doctor, and add reviews or notes. dont copy paste pealsearrow_forwardThere are several ways to access files. The advantages and disadvantages of putting them into practice are of interest to me.arrow_forwardA system for monitoring the integrity of files may be designed in line with a standard.arrow_forward
- What are the requirements for checking the files' integrity?arrow_forwardWhy is it important to understand different paste options? What problems could you run into when using a large worksheet? How can you prevent these problems? When is it appropriate to delete an entire row or column, as opposed to deleting data in the row or column?arrow_forwardDon't want copy paste answerarrow_forward
- Flat files and folders are often confused with computer databases, which is understandable. In your own words, describe three different ways to distinguish a flat file from a computer.arrow_forwardCase Project 5-1 Creating Flexible Storage It’s been 6 months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to get low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes. He wants a flexible solution in which drives and volumes aren’t restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a storage enclosure system that can contain up to 10 HDDs. Which Windows feature can accommodate these needs, and how does it work?arrow_forwardInformation technology The data type "Number" is an example of a data type for a data field in the record of an Access table. True Falsearrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageNp Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengageCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L