Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
ASSIGNMENT
PROGRAM
|
MCA(REVISED FALL 2012)
|
SEMESTER
|
THIRD
|
SUBJECT CODE & NAME
|
MCA3030 - LINUX OS
|
CREDIT
|
2
|
BK ID
|
B1563
|
MAX. MARKS
|
30
|
Note: Answer all questions. Kindly note
that answers for 10 marks questions should be approximately of 400 words. Each
question is followed by evaluation scheme.
1. List any ten commonly used commands along
with their functions in Linux.
Answer: #1: top
I figured it was fitting to put the top command
at the top. Although top is actually responsible for listing currently running
tasks, it is also the first command Linux users turn to when they need to know
what is using their memory (or even how much memory a system has). I often
leave the top tool running on my desktop so I can keep track of what is going
on at all times. Sometimes, I will even open up a terminal (usually aterm),
place the window where I want it, and then hide the border of the window.
Without a border, the terminal can't be
2. Describe about Run levels. Explain different run levels.
Answer: Runlevel is a mode of operation
in one of the computer operating systems that implement Unix System V-style
initialization. Conventionally, seven runlevels exist, numbered from zero to six;
though up to ten, from zero to nine[citation needed], may be used. S is
sometimes used as a synonym for one of the levels. Only one runlevel is
executed on startup; run levels are not executed one after another, i.e. either
the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any
other order.
Q. 3. Describe the following:
a) File encryption
Answer: File Encryption means providing
security for files that reside on media, in a stored state. Those are files
that are resting on our hard drives, usb drives or any other type of digital
media storage. Those are files that are usually not meant to be sent through
network, they are stored locally, being encrypted and temporarily decrypted
while being used and than encrypted again after we finished using them.
Encrypting stored files
b) Email encryption
Answer: Email
encryption is encryption of email messages to protect the content from being
read by other entities than the intended recipients. Email encryption may also
include authentication. Email is prone to disclosure of information. Most
emails are currently transmitted in the clear (not encrypted). By means of some
available tools, persons other than the designated recipients can read the
email contents. Email encryption has been used by journalists and regular users
to protect privacy.Email encryption can rely on public-key
Dear
students get fully solved assignments
Send
your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call
us at : 08263069601
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.