You are in the process of configuring Yum package in your system. Which of the following directives will you configure to store cache and db files? Group of answer choices A. Cachedir B. Persistdir C. Keepcache D. Reposdir
Q: the context of management features included in Windows 10, which of the following statements is true…
A: Please find the answer below :
Q: Explain what each of the following commands are attempting to accomplish. Assume that you have…
A: Since you have asked multiple questions, according to the company's policy we will solve the first…
Q: Write the following commands in linux to execute the challenges outline; 1. Create a folder with…
A: mkdir command is used to create a directory/folder mkdir "Migration Folder"
Q: In the lab you got the contents of Directory with Absolute Path /proc with following command.…
A: The answers aregiven below.
Q: 88. Which of the following is used for undo operations alone ? a. Logical logging b. Physical…
A: Please find the answer to the above question below: Physical logging: database server stores the…
Q: Explain what each of the following commands are attempting to accomplish. Assume that you have…
A: INTRODUCTION: The usermod command is used to modify a user account. Syntax: usermod [options] USER…
Q: What file format are configuration files saved in to allow additions and subtractions of the files…
A: The file format are configuration files saved in to allow additions and subtractions of the files…
Q: What is Linux?2. Describe 5 responsibilities of a system administrator? 3. What is Linux Kernel?
A: Given: 1. What is Linux? 2. Describe 5 responsibilities of a system administrator? 3. What is Linux…
Q: Answer in the single command line. Follow the diagram in question 1 a: Display the list of files in…
A: According to the policy we are allowed to answer only first three subparts of the given question if…
Q: Which of the following is not true * Generation of crash dump file which contains kernel memory is…
A: In step 2, you will get the answer.
Q: You are working as a Storage Admin at XYZ technologies. There is a Storage Array of 40 Disks. Your…
A: In ext2 there is no journaling feature. Ext2, ext3, ext4 are filesystems designed especially for…
Q: Which IOS command can be used to prevent all unencrypted passwords from displaying in plain text…
A: Given Question: Which IOS command can be used to prevent all unencrypted passwords from displaying…
Q: Question 3 25 Marks Compose the required Linux commands for implementing the following file…
A: Answer Linux: It is a command based multi-user operating system which can be accessed by many users…
Q: Familiarize yourself with the commands for creating, copying, deleting, searching for files and…
A: Use the command line to complete the tasks : - Create the subdirectories(A) in the current user's…
Q: Which command do you use to rename files and directories?a. cpb. mvc. rnd. rename
A: "my" command: In Linux operating system, "my" command refers to move. It is used to move one or…
Q: QUESTION 30 Which of the following statements is not true of the Administrator account? a. It is…
A: GIVEN: QUESTION 30 Which of the following statements is not true of the Administrator account?…
Q: UNIX (I use Putty) I answered some of this but I am honestly confused. List of commands to…
A: The answer is given in the below step
Q: what is the command used to delete a directory (folder) called Week1 * O cd Week1 O rm -r Week1 O mv…
A: In Linux there are many commands which are used to perform different options. The examples of the…
Q: You work for a large manufacturing company that is considering Linux as a solution forsome or all…
A: Considerations to choose the distributions and OSS (Open Source Software): Distributions that are…
Q: 3. Which of the following UNIX command is used for create and use archives of files? a. cp b. mv c.…
A: Unix is an operating system which provides various commands to perform operations and few of them…
Q: Which of the following is true of BitLocker Drive Encryption? a. To use BitLocker Drive…
A: BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with…
Q: Can you issue cd command without argument? What is its effect? Group of answer choices No, Shell…
A: The commands in Linux are basically used to carry out operations associated with data. Linux itself…
Q: Within the NTDS folder, which file stores the main Active Directory database? Group of answer…
A: Within the NTDS folder, the “Ntds.dit”file stores the main Active Directory database .Hence, option…
Q: hat would be your current working directory if you started in /bin/mysql, and changed directories…
A: The MySQL "data directory" (a.k.a., "datadir") is the area where the Retain database would be…
Q: Write the command that will locate all files that are larger than 10 megabytes in size, and copy…
A: Required command is mentioned below: $ find /overflow -size +10M -ls
Q: The command ls -l | wc –l will CHOOSE OPTION: print the full list of users print error print number…
A: In UNIX, ls -l | wc –l: print number of files and directories in current directory In the above…
Q: Create a script where you prompt the user for input, and the value provided will be a user. Loop…
A: As per guidelines we can answer only one question for answer of other questions ask separately.
Q: Which of the following commands checks a file system for errors? a. cd b. ping C. cls d. chkdsk
A: Hello Student. Warm welcome from my side. Hope you are doing great. Here's your answer.
Q: In Windows 10, which of the following is updated each time a file is changed to ensure that search…
A: The answer is
Q: Q1 Anwser the qustions in detail |1.1)What MS-DOS command is used to shift to a different working…
A: Answer: The command is "cd" -stands for change directory EXAMPLE: To come to one step back we use…
Q: What command (include the full syntax) would you use to change access control for the group to read,…
A: Since, there are multiple questions posted, we will answer for the first question. If you want any…
Q: Please help answer the following (both parts a and b) I have the file run.sh, it currently has…
A: (a) File access permissions are displayed using the ls -l command. The output from the ls -l command…
Q: Write the command that will create a tar archive of all the files in the directory named…
A: Write the command that will create a tar archive of all the files in the directory…
Q: . What is Linux?
A: There are different types of Operating systems available in the market for the users to use.
Q: WHICH OF THE FOLLOWING TYPES OF MEMORY PARTITIONING HAS PREDEFINED AND VARIOUSLY SIZED PARTITIONS?…
A: In this answer I will be discussing about the different types of Memory Partitioning techniques.
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Command will change working directory from /usr/users/joe to /usr is cd directory. As cd command is…
Q: Write the following commands in linux to execute the challenges outline; Create a folder with the…
A: Using DOS to implement the same
Q: Q1 Answer the questions in detail 1.1)What MS-DoS command is used to remove or delete a directory?…
A: deltree command or rmdir command are used to delete or remove a directory.
Q: Which Windows Server feature, first introduced in Windows Server 2012, provides administrators with…
A: Here We Will See, the Windows Server feature that was first introduced in Windows Server 2012 and…
Q: Please explains in details with example how to : a. create new virtual file system with Linux/Unix…
A: The question has been answered in step2
Q: 1. What is portmapper? Which version of NFS uses portmapper? Why firewall configuration is…
A: According to the Bartleby guideline, we are supposed to answer only one question at a time. Kindly…
Q: Which tool lets you view running tasks and current memory use? How does Msconfig differ from…
A: NOTE :- As per our company guidelines we are supposed to answer only first 3sub-parts. Kindly…
Q: Write a command to change the permission (others can read, owner can write and group members can…
A: To modify the permissions: 1) The command which is utilized to modify the permissions on files is…
Q: In the context of management features included in Windows 10, which of the following statements is…
A: The correct answer is #c. Active Directory in Windows 10 is a service developed for Windows domain…
Q: Write the following commands in linux to execute the challenges outline; Create a folder with the…
A: Commands: mkdir is used to create a directory touch is used to create a file cd is used to traverse…
Q: To view a listing of only the names (no summary) of all the subdirectories and files of a directory,…
A: DIR is used to display information about files and subdirectories. To view a listing of only the…
Q: Execute the following command to observe one bye of the memory content at CS:0100h -d cs:100 100…
A: Answer: Our instruction is answer the first three part from the first part and .I have given…
Q: 1. What MS-DOS command is used to shift to a different working directory? 2. What…
A: . What MS-DOS command is used to shift to a different working directory?…
Q: Which of the following must you perform to share a directory using NFS? (Choose allthat apply.)a.…
A: Network File System It is a distributed file system developed by Sun Microsystems. It allows a user…
Q: 1. At C drive, write a MSDos command to create a directory with your ID [1122] 2. write a MSDos…
A: The commends are given in step 2.
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- In this assignment, you are required to write a bash script, call it mycontainer.sh to do the following tasks:1) Create an LXD container based on ubuntu.2) Install the latest version of mysql on the container created in Step 1. Then, start the database and autostart it during future boots.3) Print the process ID of the running database, then give this process the highest possible priority.4 Inside the container, create a new systemd service to: Re-execute Step 3 to adjust the priority. Send a notification message to your AUIS email address(es). Call this new service ‘email-mysql.service’.5) Adjust systemd to run the ‘email-mysql.service’ automatically once every six hours.6) Lastly, include necessary Bash commands to upload your container to an ssh server with the IP address 192.168.1.1. Assume the username and password are 'auis' and 'pass123', respectively.After updating your list of remote Debian repository files you should run a. dpkg update b. apt-cache fetch c. apt-cache update d. apt-get updateBased on the following facts, which of the following is the most likely reason for a missing file in Git? Commits are pushed to a remote repository. The latest file created was not included in the upload. The remote server blacklisted the file. The file was not added to commit staging with git add New files must be pushed separately to the server. There is a typo in a new file's filename.
- cmd command Answer in the single command line. Follow the diagram in question 1 a: Display the list of files in the reptiles directory using a relative path. b: Display the list of files in the shape directory sorted by its name in reverse order using an absolute path. c: Display the contents of mydir directory which includes subdirectories as well. d: Display the contents of the windows directory without scrolling down immediately. e: Display the contents of the system32 directory column-wise. quation 1 is in the pictureFile slack is the space between the end of a file and the end of the disk cluster it is stored in. Hide a secret message into a file that contains slack space. For the assignment purpose, use a secret text containing 12345nn . Explain each step with the help of screenshots from the tool you used.Question 4. Version Control: You are trying to maintain some source code which is controlled using a git repository. You make some changes locally, but when you try to push to the server git will not let you as someone has modified the branch you are pushing to. Put the steps below in the correct order to merge the local changes into the remote repository. a. Manually edit the local files to fix the conflict and save the files b. Pull down changes from the remote repository c. Commit the local changes with a suitable commit message d. Add the changed local files e. Push the changes to the remote repository
- QUESTION 19 You want to search for a particular file, main.conf, using the find utility. This file most likely is located somewhere in the /etc/ directory tree. Which of the following commands is the best one to use in this situation? O find /etc/-maxdepth -name main.conf find -r /etc -name main.conf O find / -name main.conf O find main.conf/etc find /etc -name main.conf QUESTION 20Your company needs to store 10 million records in DynamoDB.Which of the following partition key patterns would theoretically provide the most consistently fast reads and writes? A.Invoice123, Invoice125, Invoice129,Invoice139... B.hehro5p8, euwt3hpk, b8mlnnbm, s2g3xrk7, 0rpm5895... C.A0000010,A0000011,A0000012,A0000013,A0000014... D.000000001,000000002,,000000003,,000000004,000000005...For the virtual machine, do the following: locate and download virtual box/VMware player/Parallels VMM from the appropriate website. pay attention to the MD5 and SHA1 hash values. download the software before installing the software, Hash the file and see if the value you get matches the value provided by the download website. Install the software only if the hashes match. locate and download Unbuntu/Kali Linux (most recent version) view the MD5 and SHA1 values hash the downloaded file to compare the hash values install the file only of the hashes match after installation, take a screen shot of the computer name in Ubuntu/Kali and the date. Submit the screen shot as proof of installation google MD5 and SHA1 hash creation (should be free and part of your O.S.
- One of the trickiest things when managing files via the CLI is that `cp` and `mv` do different things depending on whether their source and destination arguments are files or directories, and whether or not the source and destination already exist. Fill in the table below to better understand the effects. You can create dummy files and folders to help you. CMD SOURCE DEST EFFECTmv nonexistant any any mv existing file existing file mv existing file nonexistant any mv existing file existing dirmv existing dir nonexistant anymv existing dir existing filemv existing dir existing dir cp nonexistant any any cp existing file existing file cp existing file nonexistant any cp existing file existing dircp existing dir nonexistant anycp existing dir existing filecp existing dir existing…Dion is developing an application that will allow users to create their own passwords. He then needs to store that information in a database to be used when the user attempts to log in again. Which of the following provides the strongest option for Dion to accomplish this task? a. SHA-512 b. SHA-256 c. MD5 d. MD4Write the commands required for the following tasks. Try out each command on yoursystem to ensure that it is correct:a. Make a hierarchical directory structure under /root that consists of one directorycontaining three subdirectories.b. Copy two files into each of the subdirectories.c. Create one more directory with three subdirectories beneath it and move files fromthe subdirectories containing them to the counterparts you just created.d. Hard-link three of the files. Examine their inodes.e. Symbolically link two of the files and examine their link count and inode information.f. Make symbolic links from your home directory to two directories in this structureand examine the results.g. Delete the symbolic links in your home directory and the directory structure youcreated under /root.