Linux Unit 5

In: Computers and Technology

Submitted By hitman21
Words 492
Pages 2
First, let us analyze what file sharing in a centralized storage area on a server means. It means that basically when you store a file it will be stored in a predetermined place on a server instead of on the system. Now let us analyze what file replication is. File replication would be the server backing up by replicating to another server. Both of these are extremely helpful services provided by servers. How are these beneficial services increasing the ease of administration? Well, all of the different users will be storing their work to the server. That means they can login and access their files from any workstation on the local network. So I have come up with some examples showing different scenarios where this would be helpful. Example 1: As a student, if all of your files were being stored on a server you could login from any computer and access your files allowing for great mobility. Example 2: This one isn’t about a local network but I felt it was a great example anyway. When your access your e-mails they are stored on a server. Allowing you to login from anywhere and access the mail. Also, you can send yourself attachments so that you can access them at any time from any place. Example 3: Say you work in a lab and you want to do an experiment. You could search the server to find helpful information from other people’s work that is being shared. All of these examples benefit from replication as well. These servers replicating which would be backing up to the other servers would help make sure that your work would not be lost. Even if the server that your files were stored on went down you could easily access them anyway on the servers that were up. Basically, network file system is what I have described above regarding the ability to access files by using a different computer or device that is connected to the network. Here are the five major reasons that…...

Similar Documents

5 Benefits to Linux

...5 Important Features of Linux As with any product (e.g. Diet Coke vs. Diet Pepsi), many arguments boil down to personal preference. And even if one OS proves to be slightly better at handling multi-processing, it’s possible that the other is more user-friendly, which saves employees time (and, eventually, the company money). Regardless, here are a few compelling reasons why you may want to consider a Linux operating system the next time you’re in the market to buy (or quench your thirst): 1. TCO – Total Cost of Ownership. Many experts agree: if you consider all variables (antivirus and spyware programs, licensing, etc.), a Linux platform gets you more for your buck. (Oh, and did I mention it’s FREE?!) 2. A More Dynamic Desktop. Per Wallen (2008), "If you don’t like the way the Linux desktop looks or behaves, change it. If you don’t like the desktop included with your distribution, add another. And what if, on rare occasion, the desktop locks up? Well, Windows might require a hard restart. Linux? Hit Ctrl + Alt + Backspace to force a logout of X Windows.” (#2: Desktop). 3. Security. Linux is open-source, whereas Windows is not. 4. Evolution. For many users, Windows Vista was a step backwards. And it can be argued that Microsoft is still trying to play catch up. Meanwhile Linux makes healthy rates of advancements with each 6 month release. 5. Compatibility. While Linux “plays well with others”, Windows does not have that same flexibility.......

Words: 267 - Pages: 2

Unit 5

...UNIT 5 INDIVIDUAL PROJECT BUSN105 – Introduction to Business by La’Ketica T. Moore AIU Online April 22, 2013 Abstract In this unit I was asked to describe an organization basic legal, social, and economic environment. I am asked to describe the management structure and its operational and financial issues. Research and identify the impact of potential change factors including the role of technology. UNIT 5 IP Introduction The organization that will be discussed in this paper is healthcare this organization is important to this writer because it is her chosen field of employment. It is important to learn about healthcare because of all the recent changes to the law on a state, local, and federal level. This writer feels in order to learn about the healthcare regulations you need to learn about your rights as either a provider or as a patient. Basic Legal Environment The healthcare industry has come up on several changes over the past years that lead to lawsuits. Some of the legal issues that the healthcare has to deal with would be HIPPA which is the Health Insurance Portability and Accountability Act which protects the privacy of individually identifiable health information. OSHA assures the safe and healthful working of men and women by setting and enforcing standards and providing training, outreach, education and assistance. Patient documentation and communication which sparked the malpractice lawsuits over a decade ago, in keeping the patient......

Words: 841 - Pages: 4

Unit 5

...Unit 5 Assignment: The Rational Consumer Name: - Course Number: - Section Number: - Unit Number: - 5 Date: - Newspaper vending machines are designed so that once you have paid for one paper; you have access to all the papers in the machine and could take multiple papers at a time. However, other vending machines dispense only one item (the item you bought). You do not have access to all the goods (sodas, candy, snacks, etc.) at one time. 1. Using the concept of marginal utility, explain why these vending machines differ? When the newspaper is purchased the marginal utility is zero as u get the same satisfaction from any newspaper purchased and you have access to many newspapers but only need one.. Sodas are only dispensed one at a time and each time one is dispensed the marginal utility lowers. Marginal utility diminishes as consumer satisfaction declines as the amount of the good or service consumed rises. So as more cokes are dispensed their marginal utility will start to decrease. Amy is shopping at a dollar store. She is currently buying 5 bracelets that cost $1 each and 4 sodas that cost $1 each. The table below indicates the marginal utility she obtains when she purchases this combination. Quantity Price per Unit MU per unit Bracelets 5 $1 30 Sodas 4 $1 40 2. A consumer maximizes utility when the last dollar spent on any good generates the same satisfaction as the last dollar spent on every other good. Is this consumer......

Words: 281 - Pages: 2

Unit 5

...confide to all aspects of the polices and procedures in quick timing. Another negative about having all polices and procedure is that they are constantly being reviewed and updated which makes it difficulty to apply them within each particular case. Polices and procedures are very lengthy and usually written using very tequnical language which makes it difficult for individuals to understand and incorporate them into particular case. Polices and procedures can also have a negative affect on responses to suspected abuse cases as health and social care professionals may fear not compliding with all polices and procedure therefore may or may not act on things when needed. (Sources of the information used: Wikipedia) ----------------------- Unit 10 – caring for Children and young people Molly Harvey Pass...

Words: 2104 - Pages: 9

Linux Chapter 5

...James F Sloan III 4/2/15 IT250 Chapter 5 1. The “who” command helps you determine who is logged in on a specific terminal. 2. Give the command “mesg n” to keep other ordinary users from writing to your terminal. You can take this action when you do not want to be disturbed or are viewing something on your screen that you do not want overwritten. 3. $ cp   to_do done – it will overwrite the   done file with the new file names to_do. $ mv   to_do done-   it will do the same as cp, the to_do file will overwrite the done file.  4. Give the command apropos editor. Most systems have vim, ex, ed, and more. 5. $ grep "Ace Electronics" phone $ sort phone $ uniq phone 6. When you compare binary files with diff, diff displays a message saying the files differ when the files differ or no message when the files are the same. The diff utility compares ASCII files on a line-by-line basis; it is not designed to compare binary files on a byte-by-byte basis. Use cmp to compare binary files in that manner. 7. The answer is system dependent. 8. The utility displays a message saying that the command you are looking for is not in the list of directories that are in your search path. For example, $ which me /usr/bin/which: no me in (/usr/local/bin:/bin:/usr/bin:/usr/X11R6bin:. 9. No. However, some commands that are built into a shell have an executable counterpart that exists as a file (for example, echo). 10. Approximately twenty, not......

Words: 283 - Pages: 2

Unit 5

...Unit 5 Assignment 1: Homework  Short Answer 1-7 on page 158 1. Explain what is meant by the term “conditionally executed.” refers to the ability to execute a statement or sequence of statement 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? Decision 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? 4. Briefly describe how the AND operator works. 5. Briefly describe how the OR operator works. 6. When determining whether a number is inside a range, which logical operator is it best to use? 7. What is a flag and how does it work  Algorithm Workbench Review Questions 1-5, starting on page 158 Algorithm Workbench 1. Design an If-Then statement (or a flowchart with a single alternative decision structure) that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than 100. If x > 100 Then Set y == 20 Set z ==40 End If 2. Design an If-Then statement (or a flowchart with a single alternative decision structure) that assigns 0 to the variable b and assigns 1 to the variable c if the variable a is less than 10. If A...

Words: 251 - Pages: 2

Linux Administration Unit 2 Homework

...do their jobs. 3. Would use the command: su –c ‘chage –d 0 “admins account name”’ 4. su command is used for root access, this allows the user to run a process that needs admin rights. 5. pam.d to enforce authentication 6. This is where you setup your password policies. It contains things such as password min and max length and age limits. 7. Pass_min_day is the length of time that password can exist before it has to be changed. This is important to set to prevent a user from keeping the same password and protecting their user information. 8. The max day setting is used for the max amount of day you can have that password before it has to be changed. This setting is good for allowing the user to think of a new strong password or if they are lazy the last time they can wait to change this password. 9. This will apply to all accounts on this machine, or that use this machine to access the network/server. The next time you change the password on a existing account you will receive these warnings 10. First you would create the accounts for each users, and add each to a group they need to be in to get their jobs done. After this is complete, you would issue the command su –c ‘chage –E (YYYY-MM-DD) “username” this being for the 14days they will need access to the linux machine. ...

Words: 294 - Pages: 2

Linux Networking Unit 1 Assignment

...Unit 1 Assignment Chapter 1 ex 1. What is free software? List three characteristics of free software. Free software is software that is available for anyone to use and modify however they like. 3 characteristics of free software are that, you are free to study, redistribute, and modify it free of cost. Chapter 2 ex 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing the Fedora/RHEL OS is copying the OS files from a CD, DVD, or Flash drive on to the hard drives of the system then setting up the config files so the Linux runs properly on the hardware. Chapter 3 ex 1. What is a live system? What advantages does it have over an installed system? A live session is a Linux session that is running on your computer without you actually installing Linux on your computer. The advantages you have by running a live session is you can preview the system without installing it and your computer will not be changed. 4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? Default layout 8. When does a Fedora/RHEL system start X by default? To start X by default you need to set run level 5 to be the default and it will start when the system boots. Chapter 11 ex 1. How does single-user mode differ from multiuser mode In single user mode, only the console user may be logged in, though the user can edit files and execute multiple programs simultaneousl 3. What......

Words: 426 - Pages: 2

Unit 10 Assignment 1 Linux

...Unit 10 Assignment 1 John Smith 1 – None, FTP only makes necessary changes for compatibility. 2 - This file will be corrupted, resulting in a program that will not executable. 3 – When you would download a public file. 4 – You would enter the following command on the command line n /etc/vsftpd/vsftpd.conf: local_enable=NO 5 – SFTP is secure whereas FTP is not. 6 – The cd command changes the remote working directory; and the lcd command changes the local working directory. 7 – The server has blocked that port. An administrator may have disabled that port. 8 – Running vsftpd in the chroot makes it a lot more unlikely that a malicious user can exploit the system. VSFTPD does not run as root by itself, if ran in just root a user may stil be able to exploit the system where as using chroot is harder for a malicious user to exploit the system. 9 – You could use Free MD5 Checksum or Hashing Software 10 - To configure vsftpd to run through xinetd, set listen=NO in /etc/vsftpd/vsftpd.conf, and create a xinetd configuration file for vsftpd in /etc/xinetd.d. Chapter 26 Exercises 1 -10 1 - DocumentRoot "/usr/local/www" and <Directory "/usr/local/www"> 2 – Change the setting in httpd.conf, Listen 80 to Listen 81 3 - Just add an Alias and Directory directive to Sam’s site Alias /sam 4 - Apache listens on port 80 by default; port 80 is a privileged port. Only root can use privileged ports, so you must start Apache as root. 5 - Sset the interface that apache listens...

Words: 432 - Pages: 2

Linux Unit 1 Homework

...community. Roughly, it means that the users have the freedom to run, copy, distribute, study, change and improve the software. 4) The Free Software Foundation is a nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users. Linux is an open-source operating system modelled on UNIX. Linux is basicly the GNU system. Everyday users have help define this system. Pg. 50 EX 1) Installation of the Fedora/RHEL system involves a. Make sure the BIOS is set to boot from CD/DVD b. Insert the DVD in and reset the computer c. Computer BOOTs from DVD d. Make sure select the boot command line and begin installing Pg. 86 EX 1) A live system usually means an OS booted on a computer from a removable medium. Your OS is portable. I am assuming that you are using USB stick for your live OS. 2. Partitioning headaches for newbies are not there. 3. You can start testing and experiencing any other distro easily if you don't like the current one. 4) Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8) When the system enters runlevel 5 Pg. 498 EX 1. When a system is in single-user Mode you can log in only at the console. With the system in multiuser mode you can log in at any terminal or workstation that is set up for login. 3. The letters su stand for substitute user. With su you can use......

Words: 386 - Pages: 2

Nt1430 Linux Networking Unit 5 Assignment 1 Itt Orange

...Francisco Ramirez Unit 5 assignment 1 Ch. 18 1. Sftp-secure file transfer protocol is a network protocol that provides file access, transfer, and management over a trusted data stream. Scp-secure transfer protocol is a network protocol that transfers data that can withstand or is immune to interception and tampering. 2. Use the “ssh host who” command in the terminal to show who is logged in 3. Scp user@bravo:-r your@home:blank 4. “$ ssh plum xterm” or use this command with “-y” if x11 forwarding is not trusted 5. The problem that enabling compression prevent when using a ssh to run remote x11 applications on a local display would be that this creates a backup feature. Should the computer crash, all of your work will be saved on the hard drive. 6. Check with the remote administrator to see if something has changed. Ch. 20 1. Edit “etc/aliases file to include the entry: root, var/logs/systemmail 2. “Cat~/. Forward”, then max@bravo.com then “/max” 3. Edit “/etc/mail/access” and add the following: “connect 192.168.1.1 relay” 4. “dnl” stand for “delete to new line”, works the same as # in shell script; it instructs the compiler to ignore any line followed by “dnl” 5. Go to content configuration on Spamassassin, then under “required spam assassin score”, change 3 to 5. 6. First, type the mail followed by the e-mail address of the recipient: mail Max@email.com, then type the subject line, then press enter. Type your message,......

Words: 270 - Pages: 2

Unit 5

...Unit 5 assignment 1 When performing a cable installation there are a lot of things that you have to put into consideration. You want to draw up a plan first and some things that you would want to include in the plan would be where your telecommunications rooms are located, What is the distance from your leased line to your core router, and what type of cable are you going to be using for your backbone and horizontal lines. The first thing shouldn’t be cost when you are designing a network. You want to think of the safety and how your network will function with different mediums of cable. This things are important because your network to meet the needs of the company. You also want to make sure you have things in place like what type of fire protection your network will have. You want to make sure your racks in your telecommunication rooms are grounded properly. Without these things your network will not be very safe. You want it to be useful but you don’t want to lose everything in a telecommunications room because you failed to plan ahead for accidents that can happen. Well once you have your plan intact and it has been approved you need to think about how you are going to get this cable in the building. What types of tools are you going to need? If you are going to run CAT 5e though out the building you will need several different tools; such as cable pulleys, punch downs, wire cutters, and cable strippers. You will need most of these tools to install your cable into......

Words: 478 - Pages: 2

Unit 5

...PUBLIC SERVICES LEVEL 3 – 2016 UNIT 5 Part 1 – PHYSICAL PREPARATION NAME: Rohan Monsy (11024319) Unit 5 - Assessment and grading criteria | To achieve a pass grade the evidence must show that the learner is able to: | To achieve a merit grade the evidence must show that, in addition to the pass criteria, the learner is able to: | To achieve a distinction grade the evidence must show that, in addition to the pass and merit criteria, the learner is able to: | P1 describe a fitness assessment for each of the major components of fitness | M1 explain the results of the fitness assessment and measure against relevant public service entrance test | D1 evaluate results of the fitness assessment, analyse strengths and recommend improvements | P2 describe the structure and function of the muscular-skeletal,cardiovascular and respiratory systems | | | P3 undertake a fitness activity,record and identify the short-term effects of exerciseon the major human bodysystems | M2explain the short and long term effects of exerciseon the major human bodysystems | | P4 describe the lifestyle factors that can affect health | M3explain the effects ofidentified lifestyle factors onhealth and fitness, whenapplying for public service and long-term employment | D2Evaluate the effects ofidentified lifestyle factors onhealth and fitness, whenapplying for public service and long-term employment | P5 Provide lifestyle improvement strategies that can have a positive effect on health | M4Explain......

Words: 2802 - Pages: 12

Unit 5

...individuals and the nation, using selected examples. | |Discuss how different types of health promotion are used to benefit the health and wellbeing of individuals and the nation, using selected | | |examples. | | M1/D1 Unit 5 |Name & type of Health promotion |Describe what it shows [Effect of alcohol & impact of alcohol] |What message is it trying to promote? |How could this benefit the individual? |How could this benefit the nation? |Is this an effective promotion? | |[E.g. leaflet/poster/video] | | | | |Explain your answer giving some examples of statistics | |Reference | ......

Words: 1717 - Pages: 7

Unit 5

...IT113 Unit 5 Homework Chapter 6 1. What are the 3 basic tools required to install a plug for UTP cable? A. Stripper (the wire kind), wire cutter, cable crimper 2. What type of fiber-optic tester should you purchase to make sure the fiber-optic cable was installed without any fault and that enough light is being transmitted through the fiber, and what are the three key attributes to know before you purchase a tester? A. You want the tester to have the capability for correct fiber connectors, support the correct type of fiber (single vs. multi mode) and test appropriate wavelength. You should purchase an attenuation tester since you are testing for the power of the light transmission. 3. Which of the following supplies enables the reduction of friction on the cables while being pulled? A. Wire pulling lubricant Chapter 9 1. What are the main aspects that must be addressed when designing and installing wall plates? A. Fixed or modular design wall plate, wall plate location, manufacturer system, and wall plate mounting system. 2. Which TIA standards should you refer to for ensuring proper design and installation of wall plates? A. Residential is ANSI/TIA-570-B, Commercial is ANSI/TIA-568-C.1 3. Your commercial office building environment is expected to change over the next few years as some of the network devices that are presently installed with coax connections need to be converted to RJ-45 and some network devices that are currently RJ-45 connections may......

Words: 408 - Pages: 2

Watch movie | Eugene Lipinski | luissuarez9