MCA3030 - LINUX OS

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601



ASSIGNMENT

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
THIRD
SUBJECT CODE & NAME
MCA3030 - LINUX OS
CREDIT
2
BK ID
B1563
MAX. MARKS
30


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.


Q. 1. Draw and explain different layers of Linux Operating System.

Answer:Conceptually, the Linux operating system is similar to an onion. It consists of many layers, one on top of the other. At the very core is the interface with the hardware. The operating system must know how to communicate with the hardware or nothing can get done. This is the most privileged aspect of the operating system.

Because it needs to access the hardware



Q. 2. What are run levels? Explain in detail.

Answer:Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.


Q. 3. Describe the following:
a) File encryption

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily


b) Email encryption

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email



Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
help.mbaassignments@gmail.com
or
call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.