Preview

Netw240 Week 2 Lap Report Essay Example

Satisfactory Essays
Open Document
Open Document
627 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw240 Week 2 Lap Report Essay Example
NETW240 Week 2 Lab Report: Linux Commands and Directories

Step 2: File System Navigation

2: Display a long listing of the ⁄etc directory. Enter ls -l ⁄etc. Verify that the output is from the ⁄etc directory and is a long list.

What type of files may you find in this directory? Write your answer below.
Various configuration files for the system

3: Display a long listing of the ⁄bin directory.

Enter ls -l ⁄bin. Verify that the output is from the ⁄bin directory and is a long list.

What type of files may you find in this directory? Write your answer below.
These are the system binary files that the system needs to run for all users

4: Display a long listing of the ⁄sbin directory.

Enter ls -l ⁄sbin. Verify that the output is from the ⁄sbin directory and is a long list.

What type of files may you find in this directory? Write your answer below.
These are binaries like in /bin but they are system administration binaries

5: Display a long listing of the ⁄dev directory.

Enter ls -l ⁄dev. Verify that the output is from the ⁄dev directory and is a long list.

What type of files may you find in this directory? Write your answer below.
These are device driver files or device files needed for the system

What is this directory use for? Write your answer below.
Store information about system peripheral devices like hard drives and floppy drives

6: Display a long listing of the ⁄usr directory.

Enter ls -l ⁄usr. Verify that the output is from the ⁄usr directory and is a long list.

What type of files may you find in this directory? Write your answer below.
These are user applications files

7: Display a long listing of the ⁄home directory.

Enter ls -l ⁄home. Verify that the output is from the ⁄home directory and is a long list.

What type of files

You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Foods has proposed creating an electronic sales database of all their products that can be linked to a website. In return this will allow customers to purchase any of his or her items online and have them shipped to his or her homes. With the creation of this electronic commerce, loyalty points can be added to online purchases as well as physical purchases. The loyalty points can also be redeemed for gift items and specialty foods on the website. Before a customer can purchase products online they must register their name, e-mail address, mailing address and credit card information. After providing the proper information they will be prompted to create a user name and password for future use. When an account is set up for a customer, bonus loyalty points could be given…

    • 944 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A. Current Ratio: The ability for a company to pay short term obligations is measured by this ratio. In 2011 Company G moved from 1.86 to 1.77. Compared to the 1.9 Home Center Retail Benchmarks industry ratio, the numbers are below standards. Current Ratio represents values above 2 quartile industry benchmarks data (1.4 to 2.1). Current Ratio represents a weakness for Company G.…

    • 910 Words
    • 4 Pages
    Good Essays
  • Good Essays

    input the name and price of an item and its weight in pounds and ounces.…

    • 337 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 3151 Words
    • 13 Pages

    What does all of this mean?For Linux users only one thing: that they must make…

    • 3151 Words
    • 13 Pages
    Good Essays
  • Satisfactory Essays

    For the remote access domain, we need a secure VPN so that employees are not exposing sensitive data to anyone outside of our network. To do this everyone must authenticate to the system for authorization.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. One SMTP Server security threat is called a brute force attack. This security threat is identified by the way in which the attacker tries to break security. This is done by trying to guess the password through the mail server or other service working on your system using software that will use all possible combinations for the password until it guesses the correct one. (Hampton, 2011)…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Essay

    • 604 Words
    • 3 Pages

    I believe that the importance of correct programming and setting up of part is very important in today’s CNC manufacturing world as you are producing very precise components that need to be produced first time, every time or this is bad news for the company because of loss profits, scrap material and expensive repair costs. So ensuring correct programming and setting up of CNC machines is critical.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    Vulnerability is a weakness or a fault within the system, such as software package flaws, unlocked doors, or an unprotected system port. Vulnerability leaves things open to an attack or damage. Exposure on the other hand, is a single instance when the system is open to damage. Vulnerabilities (weaknesses) can in turn be the cause of exposure (system open for attack).…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    DeVry University has not yet proposed a budget for this project however they would like to complete the task in the most cost efficient manner.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 7 Essay

    • 301 Words
    • 2 Pages

    Do we really need a major change in the way the IS function is structured...are the necessary changes just minor modifications to accommodate normal growth in computer uses...what are your thoughts / research in this regard.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    “I attribute my success to this - I never gave or took any excuse." (Florence Nightingale) The reasons that I wish to pursue a Masters of Science in Nursing are many. I have been practicing as a nurse since I graduated with a BSN degree in 2010 from East Tennessee State University. For two years I have worked as a Dialysis Unit Nurse and it has been during this time that my passion for the vocation of nursing has truly bloomed. Through this experience I have learned the value of keeping to one’s dreams and persevering. Despite the fact it has taken me some time to obtain my Bachelors degree it has only inspired me to continue on to get my Masters so I can expand my knowledge of the nursing profession and all that it entails. A Masters degree would also help me in my future career goals and aspirations, which is to be able to assist those in the rural areas of our community.…

    • 587 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Nt1310 Unit 1 Essay

    • 3319 Words
    • 14 Pages

    According to Roberts and Foehr (2006) 33% of children under six have a television in their room, while 5% of children in the same age group have a personal computer in their room. Those numbers jump to 68% for television and 31% for computers when children reach the age of 8. As those numbers continue to rise and portable media like digital music players, cell phones, and portable video game players become more ubiquitous it is important to examine the possible effects of having media in a child’s bedroom and children using media alone in their room (Gutnick, et al, 2011).…

    • 3319 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    The Children Act 2006 protects the individual rights of children and states that the interests of children and young people are to be taking into full considerations of a child’s welfare and safeguarding and that safeguarding children is everyone's responsibility and including the child’s health, education and development, safety, and economic circumstances.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays