Task 01 (10 points) The first thing a system administrator does… Task 01 (10 points)The first thing a system administrator does when they get to work in the morning is to open their preferred terminal emulator. What is your preferred terminal emulator?What is the terminal anyway?What is the shell?What is the administrator account on Linux called? Task 02 (10 points)A good system administrator can do all of their day to day tasks entirely within the shell, no mouse needed! Watch as they navigate the system entirely with their keyboard. Explain the Linux file system.What differentiates it from the Windows file system?How do you see what’s in your working directory?What is a working directory, and how do you change it?What is an absolute file path, and how does it differ from a relative path? Task 03 (10 points)Navigating the file system with just the use of a keyboard is no small feat. The system administrator needs to be well versed in the structure of their system, and able to quickly handle important files. Take a look at some of the things that the administrator can do from their command line. What are some helpful tricks that help you determine what files are what?What is a “file” on a Linux machine, and how many types of files are there?How can you view the contents of a file?Finally, give a brief explanation of the important locations in a Linux system. Task 04 (10 points)Being a system administrator is about more than just navigating around a file system. There is real work that has to be done. A system administrator will be in charge of all the day to day tasks necessary to keep the system running. Let’s take a look at some of the things the system administrator can do within a file system. How would you make a directory?How would you move or copy files into that directory?How would you move or copy files out of that directory?How would you remove the files?How would you remove the directories?Task 05 (10 points)System administrators regularly use a lot of mysterious commands, with equally mysterious options. However, there is very little mystery to the system administrator’s book of spells. What exactly is a command?What are some ways you can learn more about a specific command?What are the basic parts of a command, what is each part used for and how are they formatted?Where can you find the commands on a Linux system?Task 06 (10 points)The simple Linux system has a very unique property in that it is made up almost entirely of files. These files are in turn made up of characters. In this sense, everything in Linux is made up of streams of characters, just like rivers are made of streams of water. And, much like water, these streams can be redirected. What are the three standards streams in Linux and what do they do?How do commands interact with these streams?How could you redirect streams?Show a practical example of redirection using each of the three standard streams.Task 07 (10 points)So far on our journey, we have seen a lot of this Linux shell, and we’ve hopefully learned some ways to use it. But now let’s take a moment and consider what the shell sees as we enter keystroke after keystroke, command after command. What exactly is behind the things that we type on the command line? What is a wildcard?What are some practical uses of wildcards on the command line?How exactly is expansion handled by the shell? Show some examples to illustrate these common types of expansion. (note: I know the book covers a lot, but stick to the examples we covered in class. We’ll get to arithmetic in IFT383.)Task 08 (10 points)One of the most fascinating features of the Linux operating system is the fact that it is “multiuser”. This means that multiple users can use a single system at the same time. In order to make this sort of system work, a system was devised in order to protect users from other users. Here we see a system administrator configuring a system so that every user is able to do their work safely. Describe how permissions work in Linux.What does each permission mean for different types of files?Share some common examples of permissions you’ll see in a Linux machine.Show how you would change the permissions for a given file.How can the administrator make changes that they don’t have permission to?Task 09 (10 points)The Linux operating system, in addition to being multiuser, is multitasking. This means that multiple computations can be done at the same time. However, since the CPU is still only able to do one thing at a time, this has to be accomplished by carefully keeping track of the different processes that need to be done and giving them CPU time as needed. The system administrator can explain more about this. How are processes created and managed?How can an administrator keep track of running processes?How can a process be started in the background?How about starting it in the foreground and moving it to the background?How can an administrator end a process?Why might this be needed? What are the risks? Task 10 (10 points)Watching a system administrator move about and make changes within a system is only just the beginning. A very talented system administrator can manipulate the system, configuring it in ways that seem almost mythical. Explain what environment variables are and list some interesting and useful examples.What can you do with variables such as PATH and PS1?What is the purpose of a startup script?What are some startup scripts that you use and how are they configured?Task 11 (10 points) Don’t be fooled by the skill and finesse of the system administrator. No Linux system is perfect, at least not at first. Most systems need to be configured, and often this will involve installing new software to the system. In fact, installing, removing and updating software is one of the most important jobs of a system administrator! Demonstrate how you would install a new piece of software on your system?How could you remove it?How could you update the existing software on your system? Task EC (Up to 20 points)And with that, we come to the end of our journey through Linux. Starting from the humblest of starts and working our way to the grandest of heights, we have certainly come a long way. Now, as freshly minted Linux system administrators, it’s time for you to go out into that great big open source world and show what you’ve learned. Start with a fresh virtual machine and install a server operating system on it (this will usually be explicitly called a server version and will usually come without a graphical interface). Once the operating system is installed, start up the machine and then access it remotely from another Linux machine, virtual or otherwise. Then, do one of the following: Configure the system as an email server. Send me an email using your custom email domain.Configure the system as an Internet accessible file server. Send me the IP address to ftp into.Configure the system as a firewall, connect your other system to the Internet through your firewall, and show that it blocks traffic from Microsoft.Configure the system as a remote backup system. Use it to automatically back up your other Linux system. Engineering & Technology Computer Science IFT 250
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more