MCA3030 - LINUX OS

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


ASSIGNMENT

PROGRAM
MCA(REVISED FALL 2012)
SEMESTER
THIRD
SUBJECT CODE & NAME
MCA3030 - LINUX OS
CREDIT
2
BK ID
B1563
MAX. MARKS
30


Note: Answer all questions. Kindly note that answers for 10 marks questions should be approximately of 400 words. Each question is followed by evaluation scheme.




1. List any ten commonly used commands along with their functions in Linux.

Answer: #1: top

I figured it was fitting to put the top command at the top. Although top is actually responsible for listing currently running tasks, it is also the first command Linux users turn to when they need to know what is using their memory (or even how much memory a system has). I often leave the top tool running on my desktop so I can keep track of what is going on at all times. Sometimes, I will even open up a terminal (usually aterm), place the window where I want it, and then hide the border of the window. Without a border, the terminal can't be



2. Describe about Run levels. Explain different run levels.

Answer: Runlevel is a mode of operation in one of the computer operating systems that implement Unix System V-style initialization. Conventionally, seven runlevels exist, numbered from zero to six; though up to ten, from zero to nine[citation needed], may be used. S is sometimes used as a synonym for one of the levels. Only one runlevel is executed on startup; run levels are not executed one after another, i.e. either the runlevel 2, 3 or 4 is executed, not more of them sequentially or in any other order.






Q. 3. Describe the following:

a) File encryption

Answer: File Encryption means providing security for files that reside on media, in a stored state. Those are files that are resting on our hard drives, usb drives or any other type of digital media storage. Those are files that are usually not meant to be sent through network, they are stored locally, being encrypted and temporarily decrypted while being used and than encrypted again after we finished using them. Encrypting stored files


b) Email encryption

Answer: Email encryption is encryption of email messages to protect the content from being read by other entities than the intended recipients. Email encryption may also include authentication. Email is prone to disclosure of information. Most emails are currently transmitted in the clear (not encrypted). By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption has been used by journalists and regular users to protect privacy.Email encryption can rely on public-key

Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
  help.mbaassignments@gmail.com
or
call us at : 08263069601


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.