Chapter 7 (1-10)
1.Who, w, user, finger
2. $ ls -ltr /bin
$ ls -ltr /bin | less
3 $cp to do done and $ mv to do done
CP will copy to do to the done file and mv would move to done to the done file.
4. $ grep tcp /etc/services | head -20
5. $ grep "Ace Elec
CHAPTER 9 NOTES
~webserver is never ever a part of LAN
CONTROLLING ACCESS TO FOLDERS & FILES
Managing shared resources is
Follow these guidelines to keep our
wildlife healthy and our environment
Do not feed the wildlife.
Discard all trash in provided
Never leave food unattended.
Questions? Call Green Valley County Park at 714-4704178.
October 30, 2014
The World of Cybercrime
An intentional breach to digital security often involves a deliberate act that is against the
law.A Cybercrime refers to online or Internet-based illegal acts suc
Mr G. CST 170 10/6/2016
When browsing the Internet, users may encounter a filter. Filters are programs that
remove or block certain items from being displayed. Four widely used Internet filters are antispam programs, web filters, phishing filt
October 6th 2016
The widespread use of technology has led to some important user health concerns. Some
of the more common physical health risks are repetitive strain injuries, computer vision
syndrome, and muscular pain. The
Virtual reality (VR) is the use of computers and devices to simulate a real
or imagined environment that appears as a (3-D) space. VR involves the display
of 3-D images that users explore and manipulate interactively. Using special VR