hich of the following are valid statements in the /etc/resolv.conf file? (Choose two.) a. domain comptia.org b. order hosts, bind c. 10.1.15.60
Q: This coursework consists of two tasks. The first task is based on Linux scripting and the second one…
A: Command Description mkdir command Creates a new directory rmdir command Deletes the specified…
Q: What would happen if the user executed the following commands?cp /etc/hosts ~cdtr a A <hosts |…
A: User executing the command A command is a directive to a computer program for performing a…
Q: What does . in a pathname represent? In which type of pathname does it normally specified?
A: Represents current directory and is normally specified relative pathname
Q: You need to use “Ubuntu 64-bit VM” to complete the following tasks. Task A: Familiar with the…
A: 1a. Display your current directory Command: pwd b. Use the echo command to print your name to the…
Q: Linux Scripting Problems a) An executable file owned by root:root has the setuid bit set, it is run…
A: The ask is to explain: - the effect when an executable file, owned by root:root with the setuid bit…
Q: Digit 2,4,1 of HTTP status code represents : O Success, Clienterror, Informational Success,…
A: Answer: Correct option is sucess, clienterror, informational according to 2 4 1 code.
Q: s MS Access? Where d0 we c0mm0nly use this type 0f MS 0ffice Applicati0n?
A: Microsoft Access permits opening the table and looking out through the records held inside it.…
Q: Consider the following access rights of file run.sh -rw-r-r- 1 luk dev 5 May 7 15:08 run.sh 1.…
A: Dear Student, The first digit in the 3digit numeral is to give permission to the file owner, the…
Q: Consider the following interaction with shell $ myapp -bash: myapp: command not found Further, the…
A: Third option of the question is most correct. In unix operating system, whenever we enter a command…
Q: 5. You have decided to track user activity on your Windows Server 2019 FTP server by storing your…
A: According to the information given:- we have to choose the FTP log file to satisfy the mention…
Q: 10. Which of the following is not correct? i) Web cache doesnt has its own disk space ii) Web cache…
A: Question 10. Which of the following is not correct? i) Web cache doesnt has its own disk space ii)…
Q: 10. Which parameter describes the destination directory which would contain the archive? a)…
A: Question 10. Which parameter describes the destination directory which would contain the archive?…
Q: Write a simple PowerShell Script as follow:. Create a scheduled task using PowerShell. Create a…
A: In this question we have to write a PowerShell script program to execute three scripts : 1. To…
Q: In FTP, when we _______, it is copied from the client to the server. a. retrieve a file b. store a…
A: To find the answer for In FTP, when we _______, it is copied from the client to the server.
Q: 367. Which of the following isn’t a part of the file directory? a. Attributes b. Protocol c.…
A: Given: 367. Which of the following isn’t a part of the file directory? a. Attributes b.…
Q: Bash Shell Script Programming Assignment Question 1. Create a shell script file called q1.sh Write a…
A: Answer is given below. Q1) To check if the given 2 strings are equal. #!/bin/bash read s1 #read…
Q: What does the following command do? cat vuln exploit> server
A: The correct answer is d. It concatenates the files vuln and exploit and redirects the output to a…
Q: a) When using an Apache server, the directives and are forbidden in a directory access file. Why…
A: Directives within the configuration file might apply to the whole server, or they will be restricted…
Q: setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_EXCEPTION);} ?> Assume a user has logged in…
A: Shopping cart is an online shopping site where the customer buy an item and add them into cart to…
Q: Linux Quiz (Accurate answers please!) Write the command to create a directory
A: Given: Write the Linux commands.
Q: For each of the following operations on a remote file server, discuss whether they are more likely…
A: Open a file. Read the contents of a file. List the contents of a directory. Display the attributes…
Q: Your web browser is showing an outdated picture on a website that you visit often. Which of the…
A: Lets see the solution.
Q: what is the purpose of the following code? CBI DDRB, 4 LDI R16, OXFF OUT DDRC, R16 again: SBIS PINB,…
A: option (a) is correct.
Q: In Java Script, which of the following is a standard command for writing output to a page?
A: Answer of this question is option D - document.write
Q: 3. Which of the following UNIX command is used for create and use archives of files? a. cp b. mv c.…
A: Unix is an operating system which provides various commands to perform operations and few of them…
Q: Which parameter describes the destination directory which would contain the archive? a)…
A: Question. Which parameter describes the destination directory which would contain the archive? a)…
Q: Create a server side script using inbuilt modules from Node.js(OS, Path, File system and HTTP).You…
A:
Q: Identify the file extension used to save Windows PowerShell scripts. a. .ps1 b. .bat c.…
A: The solution for the above given question is given below:
Q: QUESTION 5 A directory file before the umask value is applied has the permission of 777 i.e…
A:
Q: You wish to configure the runlevels that a particular upstart daemon is started in. Whatshould you…
A: /etc/init is the directory that contains configuration files used by upstart to start, stop, reload,…
Q: what would the new umask value be? Files: rw-rw---- Directories: rwxrwx--x
A: UMASK in Linux or Unix systems is known as User Mask or it is also called as User file creation…
Q: What will be stored into cx after executing the following commands? x1 DW 13 DUP(?),5,4,8 mov cx,…
A: In Registers -> There are processor register which are divided into general register, control…
Q: A client sends you two files containing two shapes to be used in the design of a logo. Your computer…
A: Actually, given information: A client sends you two files containing two shapes to be used in the…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: As per guidelines I can answer first three sub-parts. I hope you will understand, Thank You.…
Q: Which of the following UNIX command can be used in symbolic mode to grant the following permissions…
A: r = read w =write x =executer - sign indicates that particular permission has been removed b…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: In this question we have to answer some of the following UNIX system based questions. Let's answer…
Q: HOSTS file entries are limited to how many characters? a. 32 b. 255 c. 926 d. Unlimited
A: Given that: HOSTS file entries are limited to how many characters? a. 32 b. 255 c. 926…
Q: 14. Which of the following is default permission set for directories? a) rw-rw-rw- b) rwxrwxrwx…
A: 14. Which of the following is default permission set for directories? a) rw-rw-rw- b) rwxrwxrwx c)…
Q: Assume a TELNET session is using the character mode. How many characters are sent back and forth…
A: According to the information given:- TELNET stands for TErminaL NETwork. TELNET is responsible for…
Q: shell script needed for the following
A: #!/bin/bash # Check for the presence of the two files. if [ ! -f host_list ] || [ ! -f known_hosts…
Q: You are configuring a new server. The server must be configured to function as a file server with…
A: When you run Get-WindowsFeature, you'll see three columns of information: Display Name, Name, and…
Q: When you run SELECT * FROM tblUsers WHERE user_login=‘’ OR ‘a’ = ‘a’; on a web application, you are…
A: a. SQL Injection attack
Q: MD5 hash can be applied to which of the following data streams?
A: MD5 hash can be applied to which of the following data streams? .ppt file .doc…
Q: 1. What MS-DOS command is used to shift to a different working directory? 2. What…
A: . What MS-DOS command is used to shift to a different working directory?…
Q: Which of the following must you perform to share a directory using NFS? (Choose allthat apply.)a.…
A: Network File System It is a distributed file system developed by Sun Microsystems. It allows a user…
Q: Which of the following is the most common form of registry entry? REG_SZ REG_DWORD…
A: Answer:- REG_DWORD
plzz help
a. |
domain comptia.org
|
|
b. |
order hosts, bind
|
|
c. |
10.1.15.60 server10
|
|
d. |
nameserver 10.1.1.4
|
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- FOR UNIX, please give a description of these commands 17 cpio 18 crontab 19 date 20 dbx 21 delta 22 deroff 23 df 24 diff 25 du 26 echo 27 expr 28 fg 29 file 30 find 31 finger 32 fsck 33 ftp 34 get 35 getty 36 grep 37 head 38 hostname 39 init 40 kill 41 learn 42 lex 43 ln 44 lp 45 lpq 46 lpr 47 ls List the files and subdirectories in a directory. 48 mail 49 mailx 50 make 51 man 52 mesg 53 mkdir Makes a directory. 54…Question 1 a) Explain the difference between ls -l > mylisting.txt and ls -l >> mylisting.txt b) Create a shell script that lists all the files in the present working directory in long format name this file listMyFiles.sh. Write a c program that uses the system () function and uses it to run listMyFiles.sh c) Create a daemon in C in the Unix environment, your daemon must create a text file called aitDaemonLog.txt and populate it with 1000 lines of a string each line must be written after 10 seconds, the string must end with the count of the string;1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working directory 3. If the working directory is /home/max with a subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. 4. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users…
- Question #9 Is each of the following an absolute pathname, a relative pathname, or a simple filename? milk_co correspond/business/milk_co /home/max /home/max/literature/promo .. letter.0210 Question #10 Suppose you have a file that is linked to a file owned by another user. How can you ensure that changes to the file are no longer shared? Question #11 If /home/zach/draft and /home/max/letter are links to the same file and the following sequence of events occurs, what will be the date in the opening of the letter? Max gives the command vim letter. Zach gives the command vim draft. Zach changes the date in the opening of the letter to January 31, writes the file, and exits from vim. Max changes the date to February 1, writes the file, and exits from vim. Question #12 What is an inode? What happens to the inode when you move a file within a filesystem? Question #13 The ls –i command displays a filename…• Exercise 1: Please create a script that print “Hello, your name.” • Exercise 2: Please create a directory call user_bin, and add it to PATH. Then mv script of Exercise 1 to user_bin. Then run it from your root directory.• Exercise 3: Add a new command call ‘l’ which will perform exact same as ‘ls -a’. • Exercise 4: Create a function call sortFile, which will sort all filenames of current directory.• Exercise 5: Please make your own page using shell script, print following as your page. <html><head><title>My System Information</title></head><body><h1>My System Information</h1></body></html> Exercise 6: Could you add one variable in the example, name the variable as greeting, which displays “Hello, my name is xxx xxx” in the body using variable greeting.• Exercise 7: Could you add one variable in the example, name the variable as FILE_LIST, which displays the filenames of current working directory1. Write a program to ask customer what are the bucket name and folder name in AWS S3, and which local directory wish to save in AWS S3. Then create bucket and folder with given names and upload all files in the requested local directory to AWS S3.
- Write a shell script that contains a hashpling and comments. It should perform thefollowing tasks:a. Displays a list of currently logged-in usersb. Displays the system’s host namec. Displays the time and dated. Displays the disk usagee. Displays the current working directoryf. Displays the pathname to the BASH shell367. Which of the following isn’t a part of the file directory? a. Attributes b. Protocol c. Location d. OwnershipAt the command prompt, type find /root –name "sample" and press Enter. What files are listed? Why? the command prompt, type find /root –type l and press Enter. What files are listed? Why? At the command prompt, type rmdir undermysamples to delete and press Enter. Did the command work? Why? Next, type ls –F at the command prompt and press Enter. Were both directories deleted successfully?
- Exercise 1: Please create a script that print “Hello, your name.” • Exercise 2: Please create a directory call user_bin, and add it to PATH. Then mv script of Exercise 1 to user_bin. Then run it from your root directory.• Exercise 3: Add a new command call ‘l’ which will perform exact same as ‘ls -a’. • Exercise 4: Create a function call sortFile, which will sort all filenames of current directory. Exercise 6: Could you add one variable in the example, name the variable as greeting, which displays “Hello, my name is xxx xxx” in the body using variable greeting******************SOLVE IN PowerShell, NOTHING ELSE******************** Write a function named ‘Generate-SSN' that generates all possible social security number in the form of ddd-dd-dddd. The output should be saved into a file named ssn.csv. Only the source code is required, do not submit ssn.csv.You are about to move an EFS-encrypted file called SecureData.xml from a folder on an NTFS volume to a folder on a ReFS volume. Which of the following statements are true regarding the permissions and encryption on the file following the move operation? (Choose all that apply.) a. SecureData.xml will retain its original permissions following the move operation b. SecureData.xml will remain encrypted following the move operation c. SecureData.xml will inherit the permissions from the target folder following the move operation d. The SecureData.xml will be not be encrypted following the move operation