any four- application areas of databases b) What is business computing? What role does the database play in business computing? . Q4 a) Write short notes on: i) Inventory Control System ii) Payroll System b) Differentiate between Master file and Transaction File (With examples) Q5 a) Write a program to find the factorial of a number b) Write a program to print the Fibonacci series 0 1 1 2 3 5 8-------20 Q6 Write the output for the following: (i) What will be the result of the following commands?
runlevel 2 without rebooting the computer? Pg 431 Telinit 2 7. What type of control does SELinux implement? Pg 414 Mandatory Access Control 8. Know all of the possible states of SELinux . Pg 414 Enforcing Permissive and Disable 9. The files hosts.allow and hosts.deny belong to what security system? Pg 447 TCP Wrappers 10. Given the following entries, what will happen when a client at address 172.16.24.100 tries to access a Web site running on this server? Pg 447-448 hosts.allow
Discovery Exercises – Chapter 4 1. How can you create a file called history by using a redirection operator? >history 2. Wait one minute or more and then change the timestamp on the history file you just created. touch history 3. Back up the history file to the file history.bak. history >history.bak 4. Sort the corp_phones1 file by the last four digits of the phone number. sort –n –k3 corp_phones1 5. Create and use a command that displays only the last names and
File Management Paper – Unix® File Permissions Joe Guckiean POS/355 April 15, 2013 Bob O'Connor File Management Paper – Unix® File Permissions The name Unix® refers to a play on words rather than being an acronym. During the mid-1960 an operating system was developed at MIT that allowed multiple users to work on a system at any one time. It was called Multiplexed Information and Computing System (MULTICS). In the late 1960s, closer to 1970, a couple programmers at Bell Laboratories wrote
Types of file sharing Peer-to-peer file sharing Users can use software that connects in to a peer-to-peer network to search for shared files on the computers of other users (i.e. peers) connected to the network. Files of interest can then be downloaded directly from other users on the network. Typically, large files are broken down into smaller chunks, which may be obtained from multiple peers and then reassembled by the downloader. This is done while the peer is simultaneously uploading the chunks
File Management Student’s name POS/355 November 19, 2012 Instructor’s Name File Management In a system that supports 5,000 users protection and accessibility are key roles for the system. On a system of 5,000 users allowing only 4,990 users to access one file must make good use of protection as well as accessibility. Protection of files needs to be set up so that there is access given to users on a system in three different permission categories. The first is the permission to read
of File Sharing File sharing is the act of someone making a copy of a file and sending it to another person. The method of sharing includes Internet peer to peer transfers, but also includes physical CD copies, emails, and mobile storage devices. Companies are justified in focusing on physical CD sales and online peer to peer file sharing, as their sales have potential to cause harm. Loss of sales is indeed what is happening. Consumers need to be more aware of the risks of file sharing. File sharing
purposes, so some modifications may be required.If you?re using this as a speech, it will be around eight minutes long. Word Count: 1,054 Introduction Most people have an idea of what file sharing is, but they?re not exactly sure why it?s such a big deal. Some of them may even be aware of the fact that file sharing is punishable by law and carries a fine of up to and including $20,000. Since the introduction of Napster in 1999, copyrighted music has been illegally duplicated more than eight trillion
naming of files; 1. Firstly to start organising and naming your files within your documents, you have to open up ‘my documents’ window. You may want to organise your files and name them all correctly because this will make it easier to find documents when you need to. 2. At the top left hand corner of the documents menu, you will see an ‘organise’ button by clicking on this it will show a drop down menu, which will enable you to; copy, paste, change the layout, rename or delete the file.
File Sharing “I 'd like to propose another toast to you, the listener. It doesn 't matter how you got this, you bought it, you downloaded it, and your grandma gave it to you.” (Jones). Chances are anybody who has ever used the internet has downloaded copyrighted material. Many people view downloading copyrighted material from the internet as stealing, but others see it as a distribution of human knowledge and information. File sharing, more formally known today as torrents, should be legal.