Unix

In: Computers and Technology

Submitted By kalyaniashok
Words 453
Pages 2
Make certain you are in your home directory. Use a relative path to make your new documents directory the current working directory. Next, use a relative path to make the spreadsheets directory your current working directory. Now use a command with dots in it to make the documents directory your current working directory.
11. With your home directory as your current directory, use the command to remove read, write, and execute permissions from group and others for the spreadsheets directory. Next, verify that your change has taken place.
12. Use the cat command to create a two-line file in your home directory called datainfo.
On the first line, enter 144, and on the second line, enter 288. After the file is created, copy it from your home directory to the spreadsheets directory you created.
13. Determine the default permissions on the datainfo file you created. Next, set the permissions on the datainfo file so that the owner, group, and others can read and execute the file. (Otherwise, leave the default settings as is.)
14. Append the current month’s calendar to the datainfo file that is in your home directory. Next, copy your changed datainfo file over the older datainfo file in the spreadsheets directory, but use the copy option that prompts you before you overwrite the file in the spreadsheets directory. Check the contents of the datainfo file in the spreadsheets directory to make certain your copy was successful.
15. Make the spreadsheets directory your working directory. Make copies of the datainfo file in the spreadsheets directory, so that one copy is named myinfo and one is named datadata. Next, use a wildcard character to list all files that start with “data.”
Use a wildcard character to list all files that end with “info.” Use a wildcard character combination to list all files that have “ata” as the second, third, and fourth…...

Similar Documents

Unix/Linux

...UNIX, Linux, and Windows Server Critique POS/420 Name Professor Date University of Phoenix Abstract The following sections in this paper focus on analyzing operating systems for Riordan Manufacturing Inc. that specializes in plastic molding and design. Team B concentrated on five main areas of UNIX, Linux, and Windows Server. The five areas include Security, Administration, Networking, Performance, and Programmability. The team explains the existing systems, followed by comparing advantages and disadvantages of each operating system. The comparisons provide insight for Riordan’s IT specialist and administration considering which system to implement. Interesting topics that relate to security weaknesses, and advantages that UNIX® and Linux® compare against the operating giant, Microsoft Windows Server®. Security At the present time, Riordan Manufacturing’s network configurations consist of a heterogeneous UNIX and Windows environment. UNIX has been around for more than 40 years and is known for its’ robust power and scalability. According to the Open Group, “Security, which is often seen as a weakness for UNIX-based systems, is ensured using dedicated communication lines and secure communications protocols, along with strict authentication procedures” (para. 42). This means UNIX, just like Windows, requires configurations to make it a more secure system. Setting up file permissions, user access controls, as well as shutting down network services not currently......

Words: 2760 - Pages: 12

Unix

...| UNIX Performance Monitoring | My Research Paper | Student: Dwayne Blanchard Instructor: Professor Cliff KrahenbillAdvanced UNIX AdministrationMarch 3, 2012 | | | | | | The topic of my research paper will be on UNIX performance monitoring. The reason for choosing this topic is for personal understanding on how much UNIX performance monitoring differs from the monitoring of Windows based computers. This research paper is not to compare the two systems but to gain an understanding of how UNIX monitors performance. I don’t have any personal experience with working with UNIX systems, but as always eager to gain insight of different operating systems. The first thing I would like to discover is some of the common performance problems encountered caused by software, hardware and the combination of the two, the different terminologies associated with the processes via hardware or software, and finally what different utilities are used for monitoring these problems. We all know that UNIX has been around since the early 1970’s and the developments of performance tools have been around for a long time to enable system administrators in tuning systems for optimal performance. Operating systems performance problems normally involves process management, memory management, and scheduling. The object of performance on UNIX based systems is to determine the amount of time the operating system spends during......

Words: 1293 - Pages: 6

Unix

...The UNIX OS What is UNIX? UNIX is a Main Frame operating system developed by AT&T employees at Bell Labs (1969 – 1971). UNIX originally was named “Unics” (Uniplexed Information & Computing Service). It was renamed “Unix” when it could support multiple users. In 1972 UNIX was rewritten in the C programming language. C was developed for the UNIX OS to write programming for the UNIX OS. C is a low level programming language but not as low level as assembly. So C makes writing programs easier than Assembly and also makes them hardware independent. The entire UNIX OS was rewritten in the C programming language. So this made UNIX portable. You don’t have to rewrite the operating system whenever you wanted to port it to a new type of hardware. In 1975 AT&T, because of a court order centering around an anti-trust case, was forbidden from entering the computer software business. Thus, unable to sell the UNIX OS, they gave it away. If you wrote to them and asked for a copy of UNIX-they would give you a free license and send you all the source code. This made it attractive for government agencies, universities and corporations. They could get this free, and very powerful operating system, to run on their main frames. 1975 was the point when computers were beginning to take off and there are a lot of people at universities learning about computers for the first time, getting access to main frame computers for the first time and they’re using UNIX. So UNIX becomes......

Words: 576 - Pages: 3

Unix

...Protection Scheme with Unix Adam Macon POS/355 8-10-13 Mr. Groves When considering a protection scheme that will protect up to 5,000 users the best choice would be Unix. Unix is an operating system developed in the 70’s in AT&T Bell Laboratories. The unique thing about Unix is that it is written in C, which gives it the ability to be portable and able to be integrated with other Unix machines. Program written on one Unix machine can be easily adapted to other Unix machines (C is particularly well-integrated with the operating system itself) (David 2013). We will discuss exactly what the protection scheme is with Unix and how 4900 users can be one file. Unix system has the ability to serve many users and these users can be organized in groups. A Unix file can distribute ownership to three different classes of users, which are user, group, and other. User is the directory owner, which is the person who created the file, group is the members of the group, and others are the users who aren’t members of the group and are not the file owner. There are three permissions for User, Group, and Others, which are Read, Write, and Execute. A user with Read permission can look at contents of that particular file, a user with Write permission can change contents in that file, and a user with Execute permission can use that particular file as a Unisex system command. Permissions only an be changed by the chmod command. To be able to achieve having 4,990 users on one file you......

Words: 287 - Pages: 2

Unix

...(ACL) they are on which is a set of rules or guidelines which sets the permission level and access a user will have to network assets. UNIX systems are typically based on the file access control schema, which is designed to assign a User Identification number or User ID, which is unique to the individual user. The same goes for a group of users as well but instead of a single user the users are under the Group ID umbrella, which lists all individual users and designates their permissions within the group. A user can have a different set of access within their single user permission opposed to their group permissions. Files are typically secured within UNIX file permissions and through ACLs. Other types of files such as those with sticky bits, and files that are executable require additional special security measures to be implemented in order for users to access them. Traditional UNIX file permissions are classified by ownership using three classes of users: users, groups and others. The owner of the file can usually has the ability to assign or modify file permissions. The root account can also change a file's ownership. All of the permissions are carried out by command line input by the user who owns the file and they are in charge of giving the group access. Read, write, execute and deny. For example if a UNIX Administrator had 5,000 users and wanted 4,990 to access one file in particular they would need to plan accordingly when they assign......

Words: 630 - Pages: 3

Programming in Unix

...Programming in Unix Introduction to Sociology In today’s society, computers have played a major part of how corporations and individuals conduct business. In a sense, they have made some of the hardest tasks fairly easy by the click of a button or by typing a certain command. Computer programs perform both simple and complex calculations with user seeing the end result. However, computer programs have to be written by computer programmers. To understand how programs work, you must consider how the computer interprets the information entered by the programmer. “A program is a set of instructions that guide the computer in performing its basic and logical arithmetic operations (Afzal, 2008, p. 349).” These programs have to be written in a certain language for the computer to interpret. There are several types of languages used to write programs. Although the programmer types words and numbers to perform these mathematical and logical calculations, the computer sees only 1’s and 0’s. This is called machine language. There is also assembler language. “Instead of a series of zeros and ones, assembler language uses some recognized symbols, called mnemonics (memory aids), to represent instructions (Afzal, 2008, p. 349).” High level language is the language in which the programmer desires to write in such as Pascal, C++, C, and Java to name a few. To translate a high level language to machine language, a compiler or an interpreter must be used. The first......

Words: 1049 - Pages: 5

Unix

...Gary Adair COVER DESIGN Aren Howell LAYOUT TECHNICIANS Brandon Allen Stacey DeRome Tim Osborn Staci Somers 00.72314819 FM 10/24/00 9:55 AM Page iii Contents at a Glance Introduction 1 PART I INTRODUCTION Hour 1 2 3 4 5 6 TO UNIX AND SHELL TOOLS 7 9 23 37 51 69 85 Shell Basics Script Basics Working with Files Working with Directories Manipulating File Attributes Processes PART II SHELL PROGRAMMING Hour 7 8 9 10 11 12 13 14 15 16 17 18 Variables Substitution Quoting Flow Control Loops Parameters Input/Output Functions Text Filters Filtering Text Using Regular Expressions Filtering Text with awk Miscellaneous Tools 103 105 117 129 143 159 175 189 211 223 241 259 285 PART III ADVANCED TOPICS Hour 19 20 21 22 23 24 Dealing with Signals Debugging Problem Solving with Functions Problem Solving with Shell Scripts Scripting for Portability Shell Programming FAQs 303 305 317 333 357 381 393 00.72314819 FM 10/24/00 9:55 AM Page iv PART IV APPENDIXES A B C Command Quick Reference Glossary Quiz Answers Index 405 407 423 433 453 00.72314819 FM 10/24/00 9:55 AM Page v Table of Contents INTRODUCTION 1 PART I INTRODUCTION TO UNIX AND SHELL TOOLS 7 9 HOUR 1 SHELL BASICS What Is a Command? ............................................................................................10 Simple Commands............................................................................

Words: 112126 - Pages: 449

Unix

... Carrier Objective: Obtaining a challenging career in the field of Information Technology as a Unix/Linux Systems Administrator to utilize the knowledge that I have gained through past years of experience in various industries such as Telecommunications, Banking, Medical, Insurrance and government establishments . Qualification Summary: 5 Years of Unix experience with overall 10+ years of experience in the field of Information technology. Master's Degree in Micro-Electronics & Diploma in Computer Sciences. Specialize in following: Unix Administration on Sun Solaris and Red Hat Linux environment. VERITAS Volume Manager and Cluster Server experience. Websphere Application Server experience Virtualization Technologies VMware ESXi 5 Large 24x7 mission-critical production environment experience. Unix Administration, maintainance providing support in an enterprise enviroment (Resolved, escalated and dispatched technical issues) Experience with EMC/Openfiler SAN,configured and Managed SAN storage for Vmware Vsphere enviroment . Communication skills in handling diversified activities like Customer Support, in various capacities from front-end field engineer to the present capacity working. Well versed with Incident resolution and Change Management process. Performing Datacenter administration ( HP/SUN Servers including C7000,M4000, M5000, T5220, T5240, V440, V480/V490, V880/V890, E4500, E6500) tasks such: Backups, restore, Tape Management, Installation, Upgradation &......

Words: 1089 - Pages: 5

Unix Access

...Unix Access Heather Flores POS355 Sept 8, 2014 Alicia Pearlman Unix Access In the Unix system it is “very simple to set permissions via groups or users at the administrative level” (Finch, 2014). This allows the system administrator the ability to control access to files, folders even whole directories based on the needs of the company and the appropriate tier of access for the user. Given the scenario presented: “a system that supports 5,000 users. Suppose that you want to allow 4,990 of those users to be able to access one file. Suggest another protection scheme that can be used more effectively for this purpose than the scheme provided by UNIX®?” There are a couple of options available to the system administrator. The first option is to allow access to all users and then create a group of the users that do not need access and deny them access to the directory that contains the file. For this, though, the best practice in Windows is always to create permissions at a directory and group level. “When you start putting permissions on individual files and giving permission to individual users things can get dicey in a large environment”. (Finch, 2014) Another option, depending on where those users are located in your environment is that it might be easier to deny access to that file on the network level by making it so they can not even see the directory the file is in. There are a couple of different ways to accomplish that. Denying access at the network level...

Words: 338 - Pages: 2

Unix Commands

...UNIX internet commands have remained mostly the same since the creation of the internet because UNIX is an operating system that can be run on any network server or workstation. From the beginning UNIX was the backbone of the internet.  UNIX is what keeps the internet functioning today.  The commands have remained mostly the same because even though the internet has emerged the commands have remained the same.  UNIX was developed over the past 25 years.  The commands are still the same partly because UNIX has a reputation for scalability and stability.  This helps to keep up with the times of today’s operating system.  I don't believe there was or is a need for change of commands.  The same commands are still accessible as they were over 25 years ago. If we take it a step further looking at today’s atmosphere schools for example don’t receive the same funding as they have in the past. Meaning n educational environment their budgets are limited. With UNIX commands remaining the same there is no need for schools to spend resources they don’t have. I also think that the commands have remained the same because computers were not as advanced before as they are now. Computers now can handle UNIX and others alike along with possible upgrades. Unlike many others UNIX can adapt to technology changes without changing itself. However, the internet hasn’t changed since the beginning of time. Throughout the life span of UNIX new protocols were developed and new applications......

Words: 354 - Pages: 2

Unix

...UNIX operating system and its features UNIX is a certified brand of The Open Group that belongs to a family of computer operating systems. UNIX stands among some initial operating systems which has to be written in a high level programming language that is C. Further Bell labs circulated it in a way that anyone could customize it according to his own wishes. As a result in late 70’s, number of versions of this operating systems were running at several places [Vangie Beal(2015)]. File permissions features of UNIX The most important feature of UNIX Operating system is that it procures a safe and sound method for storing data and information. Each file stored in UNIX has some characteristics and attributes like “owner permissions” in which it specifies that what actions and tasks the owner of the information or file can execute or perform. The second permission is “group permissions” which allows the user who is a part of group can perform different functions on a particular file of the same group but for this one must have to be a part of the group. The third is “other permissions”. It is a permission which determines what type of actions and functions, rest of the users can perform on particular file [Tutorialspoint(2014)]. Security feature of UNIX The security of the systems can be increased by some specific settings which controls the access of different users. This feature includes read, write and execute access options. The read access option allows users to view......

Words: 452 - Pages: 2

Unix

... Guide to UNIX Using Linux FOURTH EDITION Michael Palmer Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Guide to UNIX Using Linux, Fourth Edition Michael Palmer Acquisitions Editor: Nick Lombardi Publisher, Senior Vice President: Kristen Duerr Senior Editor: Lisa Egan Senior Product Manager: Alyssa Pratt Product Managers: Molly Belmont and Alyssa Pratt Development Editor: Deb Kaufmann Technical Editor: John Bosco Executive Editor: Steve Helba Content Project Manager: Philippa Lehar © 2008 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permissions questions can be emailed to permissionrequest@cengage.com Editorial Assistant: Claire Jeffers Marketing Manager: Gayathri......

Words: 154033 - Pages: 617

Unix

...Unix Final Final1|FINAL1|final1|1) #!/bin/bash echo " FINAL-ONE" #name of final echo " Pick Either One of the below Options: " #tells user what to do echo "1) Addition 2) Quotient 3) Product 4) Difference" # user can pick 1 2 3 4 echo " Othewise, please enter 5 to exit the program" # user can eneter 5 to quit echo " Warnning!: If You Wish to Exit the Program You Must Enter 5" # warns user to enter 5 to quit echo " Any Other Not Option Key Will Produce An Error Message" #tells user if they eneter anything other than 1 2 3 4 5 error will appear echo " " read option #reads in option while [ $option != 5 ] # if option not 5 then goes into loop do echo "Please Enter Two Numbers" #prompts user to enter 2 numbers read num1#reads 1st num read num2#reads 2nd num case $option in Addition|ADDITION|addition|1) #can be entered anyone of those ways echo "The addition of $num1 and $num2 is `expr $num1 + $num2`";; # adds1 and 2 if user picks addition Quotient|QUOTIENT|quotient|2) #can be entered anyone of those ways echo "The Quotient of $num1 and $num2 is `expr $num1 \% $num2`";; #divides num1 and num 2 Product|PRODUCT|product|3) # can be entered anyone of those ways echo "The Product of $num1 and $num2 is `expr $num1 \* $num2`";; # multiplies num 1 and num2 Difference|DIFFERENCE|difference|4) if [ $num2 == 0 ] #num2 cant = zero then echo "Please Note that if you devife......

Words: 2541 - Pages: 11

Unix

...There are several editors used in UNIX at present time, NEdit, Emacs, VI, and Pico to name a few. Editors are mainly used to replace the default editors in UNIX. Some people have found the default editor to be complicated and unfriendly to operate. I have chosen Emacs and Vi to discuss. Emacs was derived from a version of Multics which saw its inception August 15, 1979. The original creator was Richard Stallman, the software is a video-oriented text preparation and editing system it ran on Honeywell’s Multics system it was widely accepted at MIT and had a large user community. This acceptance led to the development of protocols for the ARPANET (Advanced Research Projects Agency Network) which is now known more commonly as the Internet. It was designed for the use of video-oriented software in a device independent fashion. ( Greenberg,1996) Emacs was later rewritten on a C platform by James Goslin in 1982. Which he then sold to Unipress and it was renamed Unipress Emacs. One of the major advantages of using Emacs would be the speed of the software. It has the ability to open large files edit them and save in the time it takes to load some programs in windows. The other editor I spoke of earlier would be Vi. The Vi editor was created in 1976 by Bill Joy at the University of California at Berkeley. Bill Joy later worked at Sun Microsystems as the Chief Scientist. Vi is not a GUI (graphic user interface) mode text editor, although it still remains popular. It holds the......

Words: 368 - Pages: 2

Evolution of Unix

...Evolution of UNIX Evolution of UNIX Bill Stewart December 01, 2011 Marshall University CIS155: UNIX Operating System In the late 1960's computers worked entirely different than the ones that we do our work on every day. They did not talk to each other and programs written for use on one computer did not work on another. Today’s basic cell phone has more processing power and memory capabilities as computers from the 1960's. The few operating systems available at that time performed very limited tasks and were exclusive to the computer it was written on. In other words when one upgraded to a newer computer, the operating system and all data that you wanted transferred from the old computer had to be rewritten on the newer model. In 1965 a joint effort of Bell Labs, MIT and GE began to develop a general computer operating system that was named the MULTICS (Multiplexed Information and Computing Service) mainframe timesharing system. The MULTICS project was being funded by the Department of Defense Advanced Research Projects Agency. The goal of the MULTICS group was to develop a feature-packed information utility that would allow timesharing of mainframe computers by large communities of users. It was also designed to be able to support multilevels of security with the military in mind. When Bell Labs joined the project their goal was to obtain a timesharing system for use by members of the technical staff at Bell Labs. When the planned time had passed......

Words: 1891 - Pages: 8