Select all of the following statements that are correct. The answers are in the
ID: 3663385 • Letter: S
Question
Select all of the following statements that are correct. The answers are in the text for this question and/or in the introduction to this lab.
Question 1 options:
A protocol is a set of rules to enable communication between two or more computers. Many different protocols exist, and in some cases, many different protocols exist to access the same service offered by a remote computer.
Linux IS Unix (tm).
THe introduction to this lab as well as many searchable reputable sources claim Linux is a popular platform for research into operating systems, developer tools, user interfaces, and Internet services.
With few exceptions, Linux does not conform to technical standards defined for Unix operating systems.
Oracle Corporation's Solaris and Apple's OS X are Unix(tm). (Search ref: Single Unix Specification)
SSH is a protocol for exchanging encrypted information between a client computer and a server computer. SSH is secure because generally speaking, only the intended recipient of information will be able to correctly decode the information.
Linux is available in many different configurations called distributions. Various distributions organize files slightly differently and contain different default programs for tasks such as web browsing, email, command line interfaces, software development, etc.
Select all of the following statements that true:
Question 2 options:
Executing "cd ~" without the quotes produces a different result than executing cd with no option/argument.
The pwd command outputs ("prints") the current working directory.
Commands entered separately - each on its own line - work the same way as commands separated by semi-colons, ';' characters.
The a option is passed to the ls command to tell ls to output information about all files in the current directory including files that are hidden by default. The l option is passed to the ls command to tell ls to output extra information (a "long" listing) about files in the current directory.
Executing the cd command with no option/argument does nothing.
The commands, cd; pwd; ls -la, are executed from left to right. The pwd command does not run until the cd command has finished running. The ls -la command does not run until the pwd command has finished running.
Select all of the following statements that are true:
Question 4 options:
The -l argument to the wc command tells wc to output only the number of lines in a text file.
The man -k command and the apropos command do the same thing. In other words, apropos produces the same result as the man command used with its -k option. The man command followed by a keyword displays the full contents of the man page about that topic (if such topic exists), but when used with its -k option it only shows the name, section number and first line of the page. Thus, for example,
man -k editor
returns the same result as
apropos editor
There is a program named exit in the default $PATH provided with your account on Thor.
The $PATH shell variable stores the sequence of file system paths a shell will search when trying to find a program. Perform an Internet search or use man.
The wc program reads a file provided as an argument and outputs the number of lines, words, and bytes (sometimes called characters) in the file. Perform an Internet search or use man wc to find out.
Select all of the following statements that are true.
Question 7 options:
Most "commands" executed from a Unix shell are actually ordinary Unix programs.
Unix command line programs usually accept inputs and produce outputs. The '<' character redirects the contents of a file to the input of a program. Perform an Internet search or use man or read your textbook to answer this question.
The '>' character redirects the output of a program to a file, and '>>' redirects the output of a program to append to a file.
The '|' character is called a "pipe" and it is used to redirect the output of a program into the input of another program. Using pipes, many programs can be strung together to accomplish complex tasks.
The cat program concatenates all of its inputs to its output. cat file1 file2 file3 > stuff will replace the contents of file1, file2, and file3 with the contents of the file named stuff.
Copy and paste the following command and execute it in a remote shell to thor:
cat /usr/share/dict/words | grep -e 'aa.*' | sort -u | wc -l
The output of is 399. The cat program reads and outputs the contents of the file /usr/share/dict/words. The grep program searches its input text and outputs only lines from the input that match a specified pattern. (Use man grep to find out). The sort -u command uses the output of grep for input. The wc program uses the output from sort as input and outputs the number of characters in its input. Lookup the -l option to wc with man wc.
McIlroy, then head of the Bell Labs CSRC (Computing Sciences Research Center), and inventor of the Unix pipe, summarized the Unix philosophy as follows: "This is the Unix philosophy: Write programs that do one thing and do it well. Write programs to work together. Write programs to handle text streams, because that is a universal interface." In a related article published in the January 1971 issue of BYTE magazine, Leaurant Connerie warned hobbyists not to follow any specific computer science philosophy or risk letting the magic smoke escape.
A protocol is a set of rules to enable communication between two or more computers. Many different protocols exist, and in some cases, many different protocols exist to access the same service offered by a remote computer.
Linux IS Unix (tm).
THe introduction to this lab as well as many searchable reputable sources claim Linux is a popular platform for research into operating systems, developer tools, user interfaces, and Internet services.
With few exceptions, Linux does not conform to technical standards defined for Unix operating systems.
Oracle Corporation's Solaris and Apple's OS X are Unix(tm). (Search ref: Single Unix Specification)
SSH is a protocol for exchanging encrypted information between a client computer and a server computer. SSH is secure because generally speaking, only the intended recipient of information will be able to correctly decode the information.
Linux is available in many different configurations called distributions. Various distributions organize files slightly differently and contain different default programs for tasks such as web browsing, email, command line interfaces, software development, etc.
Explanation / Answer
This question has multiple subparts. I have answered the first 2 question with 13 sub-parts. Please post one more question for the same.
1
a) true protocol defintion is the same
b) yes linux and unix is same.
c) true
d) tru
d) true
e) true they are based on unix.
f) true this is as per standard.
g) true this is correct.
2)
a) it is false. they produce the same result and will take you to home directory.
b) false
c) true
d) true
e) false. it will take you to home directory.
f) true
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.