You are configuring a new server. The server must be configured to function as a file server with support for the Distributed File System (DFS), a print server with support for Internet printing, and a secured intranet web/FTP server for domain users. What Windows PowerShell command can you use to obtain the short names for the roles used by Windows PowerShell?
Q: You need to use “Ubuntu 64-bit VM” to complete the following tasks. Task A: Familiar with the…
A: 1a. Display your current directory Command: pwd b. Use the echo command to print your name to the…
Q: 1. Explain the following unexpected result: $ whereis date date: /bin/date ... $ echo $PATH…
A: Note: We can only answer one question at a time as per the guidelines. Please resubmit the rest of…
Q: Starting from the Linux default permissions for file and directories, what umask wouldyou use to…
A: Note: - As per the guidelines we can only answer a maximum of three subparts. Please resubmit the…
Q: Write a bash script code that take any directory name as an input; then read and display the…
A: Working with Bash at the terminal gives you the ability to: Easily obtain and organize files and…
Q: Linux Scripting Problems a) An executable file owned by root:root has the setuid bit set, it is run…
A: The ask is to explain: - the effect when an executable file, owned by root:root with the setuid bit…
Q: 1.Suppose you want to execute a shell script? Which of the permissions is NOT necessary for it to…
A: A file comes with permission too provide security. It could be read, write and execute . A process…
Q: cali duckburg mcduckcorp Figure 1: DNS name tree for Duckburg
A: The answer is
Q: Write the Linux commands for ANY 10 of the following questions. Execute the commands and copy the…
A: 1."which" is the command used to display the path of a command
Q: ook reference: Windows PowerShell Step by Step 3rd Edition - Ed Wilson Chapter 12 3. What is a…
A: ANSWER:-
Q: Give three different commands to get back to your home directory.
A: Note: As per policy we are entitled to answer 1 question at a time. cd: The cd command ("Change…
Q: How do you execute (run) a shell script? (The following script is used in questions 2 and 3)…
A: To run a bash script type the following command in terminal ./<filename> But to do so we…
Q: sing Unix Write a Bash script that checks for all executable files in your home directory and…
A: Given Using Unix Write a Bash script that checks for all executable files in your home directory…
Q: What is Linux?2. Describe 5 responsibilities of a system administrator? 3. What is Linux Kernel?
A: Given: 1. What is Linux? 2. Describe 5 responsibilities of a system administrator? 3. What is Linux…
Q: Write code that when executed in PowerShell, will satisfy the following requirements: • List all of…
A: PowerShell commands List all of the processes on a remote computer. use invoke command with script…
Q: ar
A: Command line arguments are also known as positional parameters and are mainly used in command prompt…
Q: On your Ubuntu Server Linux virtual machine, perform the same steps that you performed in Project…
A: Hey there, I am writing the required solution of the questin mentioned above. Please do find the…
Q: ******************SOLVE IN PowerShell, NOTHING ELSE******************** Write a function named…
A: Answer : We will be discussing the recursive as well as the iterative approach to solve the problem.…
Q: For UNIX, can you help me out here please. List of commands to read and use: use of wild card…
A: Change the working directory to your login directory:- $ cd directory_name Create a subdirectory…
Q: As the system administrator, you have enabled DFS replication. After a while, users complain that…
A: System administrator you have enabled DFS replication . After while users complain they facing…
Q: What does the following command do? cat vuln exploit> server
A: The correct answer is d. It concatenates the files vuln and exploit and redirects the output to a…
Q: Question 3 25 Marks Compose the required Linux commands for implementing the following file…
A: Answer Linux: It is a command based multi-user operating system which can be accessed by many users…
Q: As the system administrator, you have enabled DFS replication. After a while, users complain that…
A: Distributed File System Replication (DFSR) is used to duplicate data from DFS file locations in a…
Q: Linux - Ubuntu Create a file named .db in /etc/bind/, this file will contain all the resource…
A: If your domain uses nameservers, one can add a subdomain record to the DNS zone file. Subdomains…
Q: You work for a large manufacturing company that is considering Linux as a solution forsome or all…
A: Considerations to choose the distributions and OSS (Open Source Software): Distributions that are…
Q: 3. Which of the following UNIX command is used for create and use archives of files? a. cp b. mv c.…
A: Unix is an operating system which provides various commands to perform operations and few of them…
Q: A. COPE is a more relaxed version of BYOD where employees can choose from a list of company-approved…
A: Answer A. False According to the COPE (corporate-owned personally enabled) business model, a company…
Q: To create the file, use the tar command with the -cf switches to create a new archive file. Use -z…
A: In this question we have to perform a lab task in which we need to compress a directory in a root…
Q: for Linux 1.1 What is the meaning of the following command: “mv file1.txt file2.dat” 1.2 What is…
A: I have mentioned command and their function according to your question in step 2.
Q: Refer to all the commands shown below. Suppose you are working as a Linux administrator; you have…
A: Write the appropriate command used to accomplish this task and save in a text file “myempty.txt” in…
Q: hat would be your current working directory if you started in /bin/mysql, and changed directories…
A: The MySQL "data directory" (a.k.a., "datadir") is the area where the Retain database would be…
Q: You are running Hyper-V on two Windows Server 2019 servers. Each server hosts four virtual machines.…
A: Below i have answered:
Q: what would the new umask value be? Files: rw-rw---- Directories: rwxrwx--x
A: UMASK in Linux or Unix systems is known as User Mask or it is also called as User file creation…
Q: Write a shell script based off of the following directions: 1. Greet the user. 2. Delete the entire…
A: Objective: Here, we need to write certain shell script commands to achieve the listed…
Q: Create a Linux shell script that will search for US phone numbers in files that are in a directory…
A: Answer: -d file - This option determines whether the provided file exists on the system and is it…
Q: Write the Dos command to check whether the internet connection is working between two computers. […
A: A)here we use ping to check connectivity. 1.open a command prompt 2.then in the command prompt,type…
Q: Which file system is designed to verify and autocorrect data faults on a volume without having to…
A: Question. Which file system is designed to verify and autocorrect data faults on the volume without…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: As per guidelines I can answer first three sub-parts. I hope you will understand, Thank You.…
Q: . What is Linux?
A: There are different types of Operating systems available in the market for the users to use.
Q: Answer the following Linux question below. You need to change the rights of a file called lala.txt.…
A: On Unix or Unix-like systems, the chmod (simple terms for change mode) command is applied to…
Q: Assume a TELNET session is using the character mode. How many characters are sent back and forth…
A: According to the information given:- TELNET stands for TErminaL NETwork. TELNET is responsible for…
Q: Change your working directory to your login directory Create the file called share using cat command…
A: Hi there, Please find your solution below, I hope you would find my solution useful and helpful.…
Q: On your Fedora Linux virtual machine, examine your X Windows configuration. Doesyour system have an…
A: Fedora is a Linux dispersion created by the network upheld Fedora Project which is supported…
Q: You are developing a system that stores its data on a UNIX file system. You anticipate that you will…
A: Answer: Adapter design pattern is used as interface for existing componentss. Facade design pattern…
Q: Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. What…
A: as per Bartleby guidelines we are supposed to answer?️ only one question. Kindly repost other…
Q: Which tool lets you view running tasks and current memory use? How does Msconfig differ from…
A: NOTE :- As per our company guidelines we are supposed to answer only first 3sub-parts. Kindly…
Q: Provide an example of two daemon processes found on Linux systems. What type of service does the…
A: "Since you have asked multiple questions I am solving the first 2 for you if you want answers for a…
Q: Linux allows tasks to be scheduled and executed using cron and crontab. Crontab will utilize the job…
A: The answer is as follow
Q: 1. What MS-DOS command is used to shift to a different working directory? 2. What…
A: . What MS-DOS command is used to shift to a different working directory?…
- You are configuring a new server. The server must be configured to function as a file server with support for the Distributed File System (DFS), a print server with support for Internet printing, and a secured intranet web/FTP server for domain users.
What Windows PowerShell command can you use to obtain the short names
for the roles used by Windows PowerShell?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- profile-image Time remaining: 00 : 09 : 41 Computer Science PowerShell Practical Congratulations! You’ve been hired VaultTech as a Windows Server 2012 R2 administrator. Your first assigned project is to create some PowerShell scripts to automate certain administration functions. a. We need a script that will search for AD accounts that have not logged into the Domain within 30 days, and then disable those accounts. b. We need a script that can search for “Critical Errors only” in the Windows Event Viewer, sorted by date, and then output those results to a CSV file on the Servers desktop. c. We need a script that can see if a Process is using more than 90% CPU usage, and then terminate that Process, but write a message to the screen that it was terminated for reaching X% CPU. d. Because of a new phone system installed, all users phone numbers have changed. We need a script that will read the new phone numbers from a CSV file and update Active Directory (this is where HR gets its…What are the major differences between the implementations of the discretionary access control models on Unix and Linux systems and those on Windows systems?What is "File-System Mounting"? Mounting differences between Windows and Unix?
- You are developing a system that stores its data on a UNIX file system. You anticipate that you will port future versions of the system to other operating systems that provide different file systems. Which design pattern is suitable for this problem? A Adapter B Façade C Proxy D Composite E BridgeCommon Unix Printing System (CUPS) is a modular printing system for Unix-like computer operating systems which allows a computer to act as a print server. A computer running CUPS is a host that can accept print jobs from client computers, process them, and send them to the appropriate printer. Identify the packages needed to set up a print server in Linux. Illustrate the printing process in Linux with a neat diagram.It has been brought to the attention of a local administrator working on Windows 10 that they would want to make use of a corporate messaging application in order to communicate with users who are members of an Active Directory domain.When he tried to get into the software, however, he was met with an error message that informed him that he lacked the required permissions.What are some possible solutions to this issue?
- I need help with the C program here. Whatever I've, I wrote it here: In this lab you will write a C program to read a list of files and perform some operations on the list. Imagine that we are creating something just a little bit like the ls command on unix or the dir command on windows. If you are not familiar with these commands, think of it as providing functionality similar to the file explorer on windows or the finder on MacOS. Create a date.h file for the date structure and prototypes. The date struct has members for month, day, and year. All members are ints. Include the prototype for the function to compare two dates. Create a date.c file with a function to compare two dates and return true if they are equal. Create a myfiles.h file for the file structure and prototypes The file struct will have the following members: file name (60 chars plus room for null byte)number of bytesdate createddate last modifiedOur list command will have the following options. Write a function for…Discuss the role of keywords in Windows PowerShell scripting. How can keywords like "Get-Content" and "Set-ItemProperty" be used for advanced automation tasks?Suppose that you are the administrator of a Linux-Server and you are required to install a mail-server on one of the servers running Linux. Pick one mail-server and write down the steps that you take to install that service. LINUX/UNIX operating system.
- A company has implemented a discretionary access control system for important documents and programs on a shared Linux server. Figure 1 shows the current implementation of the DAC system. It only applies to the directory /opt/company (you can ignore all files/directories that are not within this directory). The list of users is shown in the output from the firstls command; the members of each group is shown in the output of the tail command; the permissions are shown in the output of the second ls command. Assume the files are the objects, the subjects are the five users and there are four access rights: own, read, write and execute. Refer to Figure 4.2 and Table 2 in the textbook and complete the following subquestions I. Draw the Access Control Lists that illustrate the implementation on the Linux server; II. Draw the Capability Lists that illustrate the implementation on the Linux server; III. Build the Authorization Table that illustrate the implementation on the Linux server.In UNIX-based operating systems, opening a file using a file handle can be done only in the kernel. Give a possible implementation of an NFS file handle for a user-level NFS server for a UNIX system.This needs to be done in powershell and I feel clueless. Please help. PowerShell Lab Directions: You have been given a zip file containing several subdirectories and within each subdirectory is a PDF and an image file. Your task is to write a script that will move all the PDF files into a directory called PDF and the images into a directory called images. Your script should create the top level folders (images and pdf) and move all the files. Hints: Move-Item can be used to move files/folders Write-Output($variable) can be helpful in debugging Need to Submit: your completed PowerShell script as a .ps1 file a screenshot of your successful program output CSV File: CSV file to go on is posted here fname lname phone email Jennifer Jackson 356-4780-91 Jennifer.Jackson@company.com Brenda Anderson 467-9326-03 Brenda.Anderson@company.com Isaiah Rose 071-7022-71 Isaiah.Rose@company.com Brittany Jordan 241-3146-67 Brittany.Jordan@company.com Shirley Obrien 463-1168-32…