Which of the following commands will display all files and directories within the /var/log directory or its subdirectories hich are owned by the root user? (Choose two.) Da. find -uid root-print /var/log O b. find -user root -print /var/log c. find /var/log -user root Od.find-path /var/log -user root
Q: Which of the following commandsshould be run following the installationof a shared library to update…
A: Please find the answer below :
Q: which of the following commands is used to run a following command as a privileged user ? a) runas…
A: To run a command as a privileged user means that a command that cannot be used by a normal user can…
Q: 4. Which of the following statement/s is/are false? I) When you save th data source, it is saved as…
A: Lets see the solution.
Q: You run snort, using the following command: snort -k none -I /snort/logs -c /etc/snort/snort.conf -r…
A: the answer is given below:-
Q: This is abput Linux Op Sys How can I create a link to the /etc/hosts file in home directory and…
A: Linux systems allow creating two categories of links to files or directories. Hard links (with the…
Q: If a user’s current directory is /home/mary/project1, which command could she use tomove to the etc…
A: This cd /etc command shifts the folder specified after the slash /. The /etc refers to the root…
Q: Which of these wildcards matches all files and directories? a ? b ** c * d **/
A: Wildcard ** /**/a.cpp - includes the file named a.cpp located at any directory level. /shalu/**…
Q: Which file holds the methods to be used and the order in which they will be applied forhost name…
A: The /etc/resolve.conf configuration file has information that will allow a computer to convert the…
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: Note : Expert who has answered your question and the expert picking up this question can be…
Q: What’s the difference between session.save() and session.saveOrUpdate() methods in hibernate
A: SUMMARY: - hence we discussed all the points.
Q: What command would allow you to change from your home directory to the directory for tar located…
A: Required: to find What command would allow you to change from your home directory to the directory…
Q: Linux 7. Use the "uniq -c" command to sort and summarize the total occurrences of sudo access by…
A: Here i write code for linux find the number of sudo access in the given datafile1(assume). i…
Q: 8.Which command would mount the directory utilities from the server named CCloud on the local mount…
A: Question 8. Which command would mount the directory utilities from the server named CCloud on the…
Q: Q4. Install the RHEL system roles package and create a playbook called timesync.yml that: - Runs on…
A: The YAML code and command as follows:
Q: OV direct,#data Which of the following is true for the command?
A: MOV instruction The MOV instruction is the assembly instruction that allows moving data from one…
Q: In which of the following modes, the command "ip address 10.10.10.10 255.0.0.0" can be executed? O…
A: In Interface mode the command ip address 10.10.10.10 255.0.0.0 can be executed. so the correct…
Q: What is an open standard used for querying and modifying entries in a directory? a. SQL b. LDAP c.…
A: a) SQL (Structured Query Language): It is used to access database, manipulate and retrieve the…
Q: To create the file, use the tar command with the -cf switches to create a new archive file. Use -z…
A: In this question we have to perform a lab task in which we need to compress a directory in a root…
Q: Which of the following can be used to change the role that’s currently enabled for a user?a. SET…
A: SET ROLE: The “SET ROLE” statement is used to enable and disable roles for the user current session.…
Q: Which of the following allows a regular user to temporarily run a command as root? doas su euid…
A: Solution: 1.su is correct answer Explanation:su allow a regular user to temporarily run a command as…
Q: In JSLinux ,which of the following UNIX command can be used in absolute mode that grant the…
A: The correct answer is chmod 611 Read.txt i.e., option c. Chmod 611 (chmod a+rwx,u-x,g-rw,o-rw)…
Q: Which command entered without arguments is used to display a list of processes runningin the current…
A: Linux is a multitasking framework and a multi-user system, as we all know. So, by interacting with…
Q: hat would be your current working directory if you started in /bin/mysql, and changed directories…
A: The MySQL "data directory" (a.k.a., "datadir") is the area where the Retain database would be…
Q: Assume my local machine has made a successful sftp connection to a remote machine with IP…
A: Put command is used to put files from local system to remote server. Get command is used to copy…
Q: Q.Which command would mount the directory utilities from the server named CCloud on the local mount…
A: Question. Which command would mount the directory utilities from the server named CCloud on the…
Q: Which of the following is the default permission set for the /root directory? O a. drwxrwxrwx O b.…
A: The default permission for the root directory is as follows:
Q: user user_123 lacks CREATE SESSION privilege; logon denied How you enable the user user_123 to log…
A: ORA-01045 means that the user who tried to connect to the database has no privilege to connect to.…
Q: Imagine that you have configured the enable secret command, followed by the enable password command,…
A: We use the enable password command to set a local password to control access to various privilege…
Q: Complete the following command so that it displays the output indicated below. Solution PS C:>…
A: There is no single command to get this output. You need to try various commands. Here are following…
Q: You are managing an FTP server installed in Ubuntu Server. The server has created a very large log…
A: Correct option: 3 sudo grep “charlie” /var/log/vsftpd.log
Q: configured as follows: IT (config)#enable secret cisco IT(config)#line con 0…
A: in below we take changes and correct command
Q: Which of the following displays a list of all system privileges available in Oracle 12c?a.…
A: SYSTEM_PRIVILEGE_MAP: This command will display a list of all the system privileges available in…
Q: command would mount the directory utilities from the server named CCloud on the local mount point…
A: command would mount the directory utilities from the server named CCloud on the local mount point…
Q: Which one of the following commands can be used to secure the privilege exec mode by using the…
A: Which of the following commands can be used to secure the privilege exec mode by using the plaintext…
Q: hich of the following are valid statements in the /etc/resolv.conf file? (Choose two.) a.…
A: resolv. conf is sometimes placed within the directory /etc of the filing system. The file is either…
Q: HOSTS file entries are limited to how many characters? a. 32 b. 255 c. 926 d. Unlimited
A: Given that: HOSTS file entries are limited to how many characters? a. 32 b. 255 c. 926…
Q: Given the following output from the ls command, how many files are linked with file1?drwxr-xr-x…
A: Permissions: In Linux operating system, the permissions are represented with the help of notions…
Q: use to change to the /usr directory using a relative pathname?
A: Absolute pathname gives path of the directories from the root to the required file or directory.…
Q: With a relative pathname, which command might you use to convert to the /usr directory?
A: A simple filename is a type of relative pathname that has no explicit directory component. Of…
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Answer is in step 2.
Q: [root@localhost ~]# mkdir .first [root@localhost ~]# cd .first [root@localhost .test]# mkdir .second…
A: 1) ls is linux command to see what are the files in a given directory 2) -R option will recursively…
Q: You are required to write a Spring Boot + SpringMVC based application that handles a sample request…
A: Building: You will build an application that has a static home page and that will also accept HTTP…
Q: 5. Code that catch the connection error if vb.net failed to connect in mysql database…
A: Code that catch error in Vb.net when there connection fail to connect in mysql database
Q: The command chmod 317 file1 would produce which of the following lines in thels command?a.…
A: Answer is given below,
Q: Which of the following will work when trying to hack a login screen? O Try a list of commonly used…
A: Hacking: It is the process of attacking the computer and software to steal the information of the…
Q: What does the du /var command do?a. shows the users connected to the /var directoryb. shows the size…
A: In Linux/Unix operating system, to get the disk usage information du command is used. It is also…
Q: Which of the following command allows you to change directory to one level above your parent…
A: Question. Which of the following command allows you to change directory to one level above your…
Q: Which of the following is the most common form of registry entry? REG_SZ REG_DWORD…
A: Answer:- REG_DWORD
Q: Which command is used to changes your current working directory Dd1 to dir1(Use Relative path)?
A: Given:
Question 35, which option is correct?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- cmd command Answer in the single command line. Follow the diagram in question 1 a: Display the list of files in the reptiles directory using a relative path. b: Display the list of files in the shape directory sorted by its name in reverse order using an absolute path. c: Display the contents of mydir directory which includes subdirectories as well. d: Display the contents of the windows directory without scrolling down immediately. e: Display the contents of the system32 directory column-wise. quation 1 is in the pictureAt the command prompt, type find /root –name "sample" and press Enter. What files are listed? Why? the command prompt, type find /root –type l and press Enter. What files are listed? Why? At the command prompt, type rmdir undermysamples to delete and press Enter. Did the command work? Why? Next, type ls –F at the command prompt and press Enter. Were both directories deleted successfully?j) Find the number of lines in the password file, on the server. /etc/passwd k) Create a directory called PROJECT1 and copy all the hidden files from your home directory into the PROJECT1 directory. IMPORTANT: Do NOT use the -r switch on the cp command when copying the hidden files. It is NOT required and will cause other directory structures to be copied and then they can not be removed! l) Show the directory listing for the PROJECT1 directory in reverse alphabetical order. m) Remove the PROJECT1 directory and all files in that directory. n) Print the calendar for June 2000 and November 2005. You must show the calendar entries side-by-side.
- Please write down the Linux command for each question. 17.1 What command should be used to change the read, write and execute permission of a file? 17.2 The command for a user wants to delete recursively all files and subdirectory from current directory is 17.3 What is the command which edits the scheduler for automatic command executions at background? 17.4 This command let a user check the names of the groups that this a/c belongs to. 17.5 What do we expect to see if running “$ echo `expr 2 \*3`? 17.6 Upon booting up the OS, the latest kernel initialization daemon process that the Ubuntu distribution is using today is ____ 17 Like to find files with “.sh” extensions from current local directory to all its subdirectories, what is the command? 17.8 What is the command to find the IP address of a network card? 17.9 What is usually written on the first line in shell scripts? 17.10 Like to backup all files and subdirectories under /var/www, the output file name is today.tar. The…Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.Exercise 1: Please create a script that print “Hello, your name.” • Exercise 2: Please create a directory call user_bin, and add it to PATH. Then mv script of Exercise 1 to user_bin. Then run it from your root directory.• Exercise 3: Add a new command call ‘l’ which will perform exact same as ‘ls -a’. • Exercise 4: Create a function call sortFile, which will sort all filenames of current directory. Exercise 6: Could you add one variable in the example, name the variable as greeting, which displays “Hello, my name is xxx xxx” in the body using variable greeting
- Learn the syntax of the tar command using the man command and the link referred to in To Practice and Explore: Text File Utilities #9. Use tar"to stuff" three files and then "unstuff" them into a new directory. Include the -v option. Turn in the following commands (with no errors) and any output from the commands.1) ll to show the original 3 files2) run the tar command to stuff three files3) ll to show the 'tar archive'4) mkdir newdir to create a new directory to unstuff the 'tar archive'5) mv the 'tar archive' to the new directory newdir6) from newdir, run the tar command to unstuff the three files into the newdir directory7) ll the new directory newdir to show the extracted filesunix Read the description at the end of Part I that shows the relationship between directory content, inode table and file content before doing this question. Change your working directory to your login directory Create the file called share using cat command under your login directory. Enter one or two lines of text in it. Display the content of the share file Display the number of hard links to the share file ONLY using the long option Using echo command, answer how many hard links (hard link count) the share file has. Display the inode number for the share file using appropriate option. Create the subdirectory, linkdir under your login directory Change working directory to Stay in this directory until the rest of this question. Create a hard link called share2 to the share Remember that the share file is the parent directory and NOT in the current working directory. Hence, you need to specify correct relative or absolute pathname for share file in your hard link command.…Answer all questions else downvote question 1. Create a script where you prompt the user for input, and the value provided will be a user. Loop through each file in that user's home directory (ignore the sub directories) and count the number of times a file contains the word ERROR (hint use 'wc' command to help with counting) and output the total number of errors at the end of the script. Once completed, take a screenshot of the source code of the script, and of the script executing, to execute the script you will need to create your own sample input, please include the sample input as part of your execution screenshot. question 2. What would be your current working directory if you changed directories to /log/././././../media/log/ssh/test/../users/ question 3. What would be your current working directory if you changed directories to /opt/test/usr/www/sbin/boot/pdfs/./spool/share/etc/./bin/.././httpd/
- Write the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working directory 3. If the working directory is /home/max with a subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. 4. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users…1.Why is it not advisable to use root as the default login? 2.What three sections are relevant to a file’s access permissions and how are they related to the three permission types. Explain how the access permissions and permission types are changed using the chmod command. 3.Which command can you run on your machine to determine whether the system is a 32-bit or 64-bit machine? Provide a screenshot of the command and the output.