2’ Take a scleenshot tn sh nw the Status of NetwolkManagerJervice servi(e.
The stems for me systamm stems NetworkManagensewke ‘5 dwsp‘ayed. The status shmﬂd be Acuve
23 JUN 2015
Unit 1 Assignment
1) Free software is software that respects users' freedom and community. Roughly, it means
that the users have the freedom to run, copy, distribute, study, change and improve the
06 Jul 2015
Unit 2 assignment
1. You can use the $ w, who, or finger command to determine who is logged in on a terminal
a. done is overwritten to to_do
b. to_do would no longer exist
4. To locate the utilities you
2. sudo yum update-to install all updates currently available. Yum update yum to update the latest
3. You would build a package because with the source code you can modify the shell, in binary you
19 August 2015
1. SCP is a secure copy which is transferred from the one network to another network. STFP is a type of
network through which a file is transferred.
2. Log in remotely to a terminal using ssh
Unit 3 Homework Assignment
07 Jul 2015
1. The shell waits for the command to finish executing. You can send the command to the background by
3. A PID number is an identification number assigned to a command running in the bac
Chapter 22 p.815 1-6
1 Three reasons to use NFS: Sharing, Remote storage, Reduced workload for the administrator.
2 - # mount plum:/home /plum.home , # mount 192.168.1.1:/home /plum.home ,
# umount /home
3 You can use the s
1 None, FTP only makes necessary changes for compatibility.
2 - This file will be corrupted, resulting in a program that will not executable.
3 When you would download a public file.
4 You would enter the following command
1 A DNS server or servers that are setup to preform recursive queries or an SQL server
2 Address (A) record points to a domain.
3 A MX record defines the mail servers that will receive mails for a given domain.
4 $ hostname
This assignment will explore the Windows Server 2008 Server Core
as well as virtual server. First I will explain some advantages and
disadvantages of the windows server 2008 server core and virtual server.
The environment windows server core has an ideal
Console.Write("Press any key to close")
BY CHARLES DUPLANTIER
This was created to go over some of the most important aspects of data
communications. These aspects will be defined in order to establish a
better understand the thoughts and practices.
AddUser AddGroup Frupertles Delete Retresn
user Mm user le P niary Group Full Name Login sneu Home Direttory
map so a vlao ulao Ihlnlbash
Roger 50: Roger Roger Darnd Ihlnlhas
File Edit View Search Terminal Help
Retype new 5MB password: E:
Added user Max.
[root@ oca. host ~ _# systemctl enable smb.service
smb. service is not a native service, redirecting to fsbinfchkconfig.
Execut_'_ng fsbinfchkconfig smb on
. . .r r _ a X D :
.rp . .
' Map“. page. p39“: of ) Roast. ) as. Task 2 - Conflgurlng securlty features
_ Search utter: Step 1: Create a Group
a 0 Action:
1) In the User Manager, click Add Group
Group Name Group tDv Group Mempers ,
When dealing with the installation of Linux the top five factors that have to be
considered are the installation, desktop environment, security, proposed use, and finally
hardware. Each of these factors on their own is important but when grouped together
The role of DNS is a basically a database that attaches one thing to another. For
example a website like google maybe be google.com but the address is attached to a
specific IP address that actually links it to the website. In essence it is the short hand
The use of filing sharing on a local network is something that has drastically
changed how major operations work. This is due to the fact that the information that we
seek out over a company can be accessed by anyone within the company at any given
An IP address is a set group of numbers used to identity elements on a network. It is very
comparable to a cell phone in that a cell phone also has unique numbers to call that specific
phone. A network elements have the same phone number and this is the I
/Declare variables on the next 3 lines
Declare integer testScore=0
Declare String category=
Declare String interview=
/Make Module calls and pass necessary variables on the next 4 lines
Call employCat(testscore, cate
In order to find out where the FMSO are located I would run dsa.msc through the run
command line. After this I would right click the domain object in the left pane and click on
operations master. I would vide the PDC master role and click on the infrastru
Answer the following questions about the animation:
Where is the Plenum section of the room and why is it important?
The Plenum is located on the top of the room directly under the ceiling.
What is the purpose of Riser cabling?
Chapter 21 p. 789 Exercises 5-6, Advanced exercises 10-11
5 LDAP directory lists items in hierarchical information that groups with relative information. Relational
database organizes information in rows and columns.
6 In L