E115 Chapters 1-4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

add [program]

-Adds the program specified by program to the current environment. -Programs with a GUI component can only be used if X is enabled -The user can view a list of all available programs by typing add without a program name.

cp [-option] [old_location/]file_name new_location

-Creates a copy of the file or directory with the name specified by file_name, and places it in new_location, leaving a copy in old_location. -Multiple files and directories can be copied simultaneously, and each file_name should be separated by a space. -option: -r (recursive) - necessary to copy directories

mkdir [location/]directory_name

-Creates a new directory (folder) with the name specified by directory_name. -If no location is specified, the directory is placed in the user's current directory.

attach [locker_name]

-Creates a shortcut to the course directory specified by locker_name. -Shorter pathname: /ncsu/locker_name.

ls [-options] [location]

-Displays a list of the files and directories located in location. -If no location is specified, the contents of the current directory are shown. -options: -a (all) - displays all files, including hidden -l (long)- displays each file on separate line w/ certain details

quota

-Displays information about the AFS space of current user -Command run by default at the start of each session

more [location/]file_name

-Displays the contents of a file with the extension .txt, .html, or .css in the terminal window -Navigate the document using the spacebar

less [location/]file_name

-Displays the contents of a file with the extension .txt, .html, or .css in the terminal window -Use the ↑ and ↓ arrow keys to navigate -press "q" to return to the main screen

Linux file systems

-EXT3 - journaling extension to EXT2 - reduced time recovering file after crash -XFS - uses B- Trees (fast access)

unzip [location/]file_name.zip

-Extracts files that are located within file_name.zip so that the user can access them -Original .zip file remains in the directory and files are extracted into the same location as the .zip file

Windows file systems

-FAT/FAT32 file system - uses File Allocation Table to index files (simple yet slow) -NTFS (Windows XP) - uses binary trees (complex but fast access)

Apple OS X file systems

-HFS+ (Hierarchal File System) - uses B- Tree to index (fast access) ***different than binary trees in windows***

zip [-option] zipfile_name file_list

-Places the files in file_list in the zip file specified by zipfile_name -option: -r (recursive) - necessary to copy all directories (folders)

Dot-dot-slash "../"

-Relative pathname to the directory above your current working directory (the parent directory) -can be used in conjunction with other shortcuts

Dot-slash "./"

-Relative pathname to your current working directory -instead of typing absolute (long) pathname, use the dot. -useful when working w/ files in current working directory

Accessing AFS thru Windows / Mac / Linux

-Windows - PuTTy -Mac OS X / Linux - Terminal

Command Options

-assign more specific functions or additional actions to command -must be preceded by a dash ( - ) to work

Nodes

-can have Child Nodes under them but don't have to -If they do, they are Parent Nodes If they don't, they are Leaf Nodes

"e115" directory at NCSU

-child node to "eos.ncsu.edu" -parent node to "e" directory, which is a parent node to "e115" directory (contains info related to E115 course)

"users" directory at NCSU

-child node to "unity.ncsu.edu" -parent node to 26 directories for the alphabet (accounts sorted by first letter in Unity ID)

Volume (Scalability) on AFS

-container that keeps a set of related files and directories together on a disk partition, such as a user's home directory -users need to know what volume files are in but not physical location -allows admin to move/add volumes

Andrew File System General

-developed by Carnegie Mellon -distributes, stores, and joins files on networked computers -focuses on security and scalability (growing for more users)

File Manipulation

-interpretation of the bytes in a file, which produces or doesn't produce the desired result -viewing problems linked to wrong program that interprets the bytes in a foreign or unexpected way to the user

mv [old_location/]old_file_name [new_location/][new_file_name]

-moves file to new location -if no new name is specified, file will keep same name -if no new location, file will simply change its name

Pathnames

-specific LOCATION of each directory and file on the file tree -functions as an address

How Pathnames work

-start with the root directory ("/") -continue through each branch of the file tree to the desired location separating each directory name with a slash "/"

Linux File Names

-up to 256 characters long -no special characters. if you have to, precede with back slash "\" (some!file --> some\!file) -no forward slash "/" -no spaces, to separate words use underscore (_), like_this

E 115 Course Locker Absolute Pathname

/afs/eos.ncsu.edu/courses/e/e115

Home Directory Absolute / Relative Pathname

/afs/unity.ncsu.edu/users/m/mahernd2

Security on AFS

1. users authenticated using Kerberos, which uses a combo of time stamps and keys to est. identity and allows authentication. 2. Access Control List, which specifies access privileges users have to a directory (lidrwka)

# of Mb allotted in AFS and how to change quota

350 Mb; http://sysnews.ncsu.edu --> Quota Manager

Match the wireless standard with its range: 802.11n 802.11g 802.11b 802.11a

802.11n-230ft 802.11g-140ft 802.11b-100ft 802.11a-115ft

Match the wireless standard with its frequency: 802.11n 802.11a 802.11g 802.11b

802.11n-5Ghz 802.11a-5Ghz 802.11g-2.4Ghz 802.11b-2.4Ghz

n your own words, explain the difference between the client and server in a P2P relationship.

A client and server relationship is when two different machines act as either the client or server, one requesting information and the other distributing it, respectively. Contrastly, in a P2P relationship, one machine acts as both the client and the server through custom software that determines which role is necessary for a given task.

How to get rid of adware/spyware of Windows (most common OS hardest hit)

Ad-aware

Root directory for ASF at NCSU

"/" directory -contains all other directories and files on network

Chile node of "/" at NCSU

"afs" directory -contains directories for each of the various systems at NCSU (pams.ncsu.edu, eos.ncsu.edu, tx.ncsu.edu, and unity.ncsu.edu)

[access_list] for fs sa "rlidwka,all,none"

(r)ead- view/copy contents of files in directory (l)ook- see contents of directory (i)nsert- create/move files into directory (d)elete- delete files from directory (w)rite- make changes to files in directory loc(k)- set advisory locks in directory (a)dmin- set permissions for directory (all)- gives user all rights to directory (none)- removes user rights from the directory

What does API stand for?

Applications Programming Interface

Match the topography with its weakness: Bus Star Tree Ring

Bus-a line break will cause the network to go down completely Star-if one node fails, there is no interruption of service to the rest of the network Tree-a point of failure on a transmission line ca separate a node from the network and the rest of the network will continue to work Ring-all data travels in only on direction

cd location

Changes the current directory to the location specified by location.

pwd

Displays absolute pathname to user's current directory

How to backup files

External Hard Drive, CD's, School K: Drive, Dropbox, Internet Storage.

If you were to reboot a computer, the memory stored in RAM would still be present upon turning the computer back on. True/False

False

Phishing

Falsely claiming to be a legitimate company to scam the consumer; asks for usernames, passwords, bank and personal info

Match each description with the given piece of hardware. Firewall Router Hub Swithc

Firewall-controls communication authorizations to or from a computer or network Router-controls the movement of data between networks Hub-central node that connects multiple devices, but cannot pinpoint another single device Switch-Central node that connects multiple devices and can distinguish between devices

fs la [location]

LIST ACCESS -Displays the user access list for the directory specified by location -no location shows access list for the current directory

fs mkm BACKUP users.unityid.backup

MOUNT A BACKUP (must be in ~/) -Mounts a backup with the name BACKUP (or whatever directory name the user wants to create) to the current directory -The backup contains the contents of the user's AFS space as it existed at midnight the previous night. ***This command must be executed in the user's home directory.***

Student ID Number

NOT your Unity ID; nine digit number on card.

fs rmm BACKUP

REMOVE A BACKUP (must be in ~/) -Removes a mounted directory named BACKUP. ***This command must be executed in the user's home directory.***

Required/Optional email fields

REQUIRED: -To: enter as many addresses separated by commas -Subject: relevant heading accurately describing message contents OPTIONAL: -Cc: Carbon Copy sends others a copy of the email -Bcc: Blind Carbon Copy sends copy w/o recipients in To: or Cc: fields knowing about it

Tilde-slash "~/"

Relative Pathname to home directory

fs sa [location] [unityid] [access_list]

SET ACCESS -Sets the user access list for the directory specified by location, granting the rights specified by access_list to unityid -[access_list] options: rlidwka,all,none

Create a log file of all commands executed

Script [-option] [location/]file_name.txt -options: -a (append the log file to an existing one) -f (flushed - outputs contents of file as commands are entered) -type "exit" to end log file

What does TLI stand for?

Text Line Interface

Filtering (email)

To move emails out of your inbox automatically into labels

Match the operating system with its user interface. Each answer choice may be used more than once (GUI,CLI,TLI,GUI w/ CLI): Windows 7 DOS DOS running a program Terminal Linux Mac OS X

Windows 7 - GUI DOS - CLI DOS running a program - TLI Terminal - TLI Linux - GUI w/ CLI Mac OS X - GUI w/ CLI

Device drivers are like a ____________ for the kernel . a. manual b. piece of junk c. application d. piece of hardware

a

Does a hard drive have more or less capacity than a floppy disk? a. More b. Less c. About the same d. I love floppy disks!! e. What, pray tell, is a floppy disk?

a

This port was common on computers allowing the user to connect to the network and internet back during the 1980's through 1990's. a. Modem b. Ethernet c. VGA d. DVI

a

What type of relationship maintains that one computer is a server, while the other one is a client? a. Classic View b. Peer-to-Peer c. Inverted View d. Symbiotic View e. None of these

a

Which of the following allows data to travel between devices? a. Data bus b. Address bus c. Control Bus d. System Bus e. Collisions

a

Which of the following is a valid IPv4 address? a. 127.0.0.1 b. 192.168.1256.1 c. 2001:db8:0:1234:0:567:1:1 d. 2001:db8:85a3:0:0:8a2e:370:7334

a

Which of the following is a valid IPv4 address? a. 127.0.0.1 b. 192.168.256.1 c. 2001:db8:0:1234:0:567:1:1 d. 2001:db8:85a3:0:0:8a2e:370:7334

a

Which of the following is an expansion slot for a laptop computer? a. ExpressCard b.PCI c. AGP d. PCI Express

a

In the "Computer Analogy" supplement... what is (in general) a computer's hardware being compared to? CPU = · Hard Drive = · RAM = · Graphics Card = · Removable disks = · Device drivers =

a kitchen CPU = Head Chef · Hard Drive = Fridge or Pantry · RAM = Counter space · Graphics Card = Sous Chef · Removable disks = Tupperware · Device drivers = Recipes or Instruction manuals

Virtual Computing Lab

a method of remotely accessing and using a University machine to access programs needed for a class that are not available on personal computer

File System

a methodology by which data and information are stored on storage devices (hard drives, floppy disc, etc.), making them easily retrieved

Worm

a program that copies of itself, but does not infect other programs

Virus

a program that replicates itself, usually by attaching itself to other files and programs

Network License

agreements between software companies and the network owners for network software

File Extensions

allow the computer's operations system to know what application software should be used to open the file; added by the computer but can be typed by user in file name

Nomad System

allows a active University computing accounts to access the campus network anywhere on campus through wired or wireless; if you loose connection or close computer or idle for more than two hours you have to reconnect.

What should you backup?

applications that you do not have installation disks for such as school assignments, email, address book, music files, pictures, internet bookmarks..

A Star network typically has how many concentrators? a. 0 b. 1 c. 2 d. 3 e. 4

b

What does NAT stand for? a. Natural Address Translator b. Network Address Translation c. Neural Allocator for Transmutation d. Network Addressor Tidbit e. Does not stand for anything

b

What is the individual piece of software that a kernel uses to interface with a particular piece of hardware? a. API b. Device driver c. GUI d. Interface e. None of these

b

What is the individual piece of software that a kernel uses to interface with a particular piece of hardware? a. API b. Device driver c. GUI d. Interface e. None of these

b

What protocol do we use in order to connect to our AFS space through applications such as PuTTY? a. SFTP b. SSH c. Tunneling d. Piping e. None of these

b

Which of the following allows data to know its destination? a. Data bus b. Address bus c. Control Bus d. System Bus e. Collisions

b

Which of the following is actually a type of hard drive configuration rather than hard drive interface? a. SATA b. RAID c. SCSI d. IDE

b

Which of the following is actually a type of hard drive configuration rather than hard drive interface? a. SATA b. RAID c. SCSI d. IDE

b

What feature of SSH makes it nearly impervious to attacks? a. Spelunking b. Tunneling c. Ninjas d. Encryption e. Snipers

b/d

Root of a File Tree

beginning of the file system, all other nodes trace back to it

Password restrictions

between 8 and 127 characters, no Unity ID, one number and letter, not a dictionary word, no 5 consecutive numbers, not your old password.

According to the online textbook, how many types of memory are there within a computer? a. 0 b. 1 c. 2 d. 3 e. 4

c

How many bits are in a Megabyte (using software amount)? a. 2000 b. 1024^2 c. 1024^2 * 8 d. 2000 * 8 e. Too many to count

c

What is the core part of an operating system? a. Interface b. Driver c. Kernel d. Shell e. None of these

c

What is the role of a server in a P2P relationship? a. Client b. Server c. Both d. Neither

c

Which of the following devices generally works between networks rather than within an individual network? a. Hub b. Switch c. Router d. Node

c

What types of service can a kernel provide? Choose all that apply. a. Creation of Files b. Kernels are useless! c. Virtual File System d. Scheduling e. Managing code

c/d

adware

codes included by authors delivers advertising banners displayed while program is running; justification: recover programming development cost and lower user cost BUT...

This port is used exclusively for video with newer monitors. a. Modem b. Ethernet c. VGA d. DVI

d

What does VLAN stand for? a. Viral LAN b. Visual LAN c. Video LAN d. Virtual LAN e. None of these

d

What does WAN stand for? a. Windows Area Network b. Windows Area Navigation c. Wide Area Navigation d. Wide Area Network e. None of these

d

What technology automatically assigns addressing on the network? a. RDP b. VCL c. DNS d. DHCP e. SSH

d

What term is used to identify the process in which certain programs have priority for the processor, in other words, sets up a queue? a. Multi-tasking b. Shell c. Control bus d. Scheduling e. None of these

d

rm [-option] [location/]file_name

deletes file or directory -options: -r (recursive) - must have when deleting directories -f (forced) - deletes w/o asking permission

Trojan Horse program

do not replicate nor copy themselves, but rely on other "manual" methods of distribution

NCSU-guest

does not require log in using Nomad and only internet access

Decimal is a base _____ system. a. 2 b. 0 c. 1 d. 5 e. 10

e

Unity ID

eight lowercase characters - determined be the user's first and middle initials, and the first six characters of the user's last name; file storage, email, academic records and personal information

EOS System Command Prompt

eos% **not part of the command itself**

Standard command format

eos% commandname -options file_LOCATION file_DESTINTION

File Names

files are given names so computer users can easily remember the data within

NCSU

have to log in with Unity ID and password; have access to internet and AFS; always needed for E115

How do you protect from viruses

install virus protection program and keep up to date; NCSU requires antivirus installation on computers connected to server..provides it for free (Trend Micro)

Campus resources

internet, backup, email, help desk, applications in labs/classrooms

Default Password

last four digits of student ID and four digits of birth month and day

man [-option] command

more information about a command -use up/down arrows to navigate -press "q" to return to main screen

Password Recommendations

one special character, one capital and one lowercase letter.

Command Arguments

paths to files

spyware

programming put in someone's computer to secretly gather info about the user and relay it to advertisers or other interested parties; installed with Limewire, iMesh, Morpheous

Unity accounts

provides users with access to the NCSU computing network and its many resources

Device registration

register to avoid logging in to ncsu every time. if device is stolen, have to unregister immediately. re-register periodically

Malicious Use

run virus scans to prevent unwanted .exe files if there is a difference in file icons

Antivirus programs

search for, detect, and attempt to remove these viruses

Commands

short character combinations that the computer is programmed to understand

Relative Pathnames

shortcut pathnames to a directory or file

Effects of adware/spyware

slow computer function, jumpy internet, altered home pages

Freeware

software is written and distributed w/o compensation, everyone has access; usually packages that everyone needs

Buyware

software that can be purchased for the full software price, and, by opening it, you are the owner of the license

Operating System (OS)

software that controls the internal hardware of the computer; auto-updates but sometimes adware disables so manual updates sometimes

Labels (email)

sort and organize similar emails

Login info for Terminal on Mac / Linux

ssh -X [email protected]

Andrew File System

storage and primary file space when using a UNIX system; the home directory on Solaris or Linux station and available as K: drive thru Windows; store web files available thru ww4.ncsu.edu

File

string of bytes

File Tree

system of directories (folders) and files

Where are the majority of I/O ports found on a desktop computer?

the back

Absolute Pathnames

the long form of the pathname to a specific directory or file in the file tree

Most important part of the file system

the method by which files are indexed on the hard drive; allows OS to know at any time where to find a file on the hard drive; different methods for different OS

How viruses are spread

through email attachments, instant messaging links and attachments, comprised web servers, pirated Software, Usenet news groups, Internet Relay Chat channels, floppy disks, file downloads

University emails

[email protected]; gmail; more storage space than previous

Papercut system

used to print on NCSU campus; pay through AllCampus accounts; auto linked to lab machines so can print directly from computer only when connected to NCSU system; can only print .pdf from laptops

Shareware

users have a limited amount of time that they can use the program before being required to purchase the full version of the software; certain features disabled until purchase of full version


Kaugnay na mga set ng pag-aaral

Myer's AP Psychology Chapter 3: Biological Bases of Behavior

View Set

Med Surg Chapter 45 Course Point

View Set

PrepU Abrams' Clinical Drug Therapy (12th ed) Chapter 60 Ears

View Set

Lecture 4, Chapter 5: Risk and Return in Financial Markets

View Set

Meiosis - the form of cell division that creates sex cells

View Set