0% found this document useful (0 votes)
3 views

Assignment E Template

The document outlines a series of assignments for a Linux Administration course, specifically focusing on using the Terminal to perform various tasks. Students are required to create directories, download and manipulate files, and use Linux commands like cmp, comm, diff, and sdiff to analyze file similarities and differences. Additionally, the assignments involve changing file permissions, using hashing for file integrity checks, and understanding umask settings and special modes in Linux permissions.

Uploaded by

tommysamosuk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Assignment E Template

The document outlines a series of assignments for a Linux Administration course, specifically focusing on using the Terminal to perform various tasks. Students are required to create directories, download and manipulate files, and use Linux commands like cmp, comm, diff, and sdiff to analyze file similarities and differences. Additionally, the assignments involve changing file permissions, using hashing for file integrity checks, and understanding umask settings and special modes in Linux permissions.

Uploaded by

tommysamosuk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

Use this template to complete your deliverables

2024

Replace with
Student Name
ITEC 3328 - Linux Administration
Assignment E
You may use Mint or
Kali to complete the
following
deliverables.

Use the next slides


to submit

If you skip a
question, please put
“SKIPPED”

All questions assume


you are using the
Terminal (command
line).
You may use Mint or
Kali to complete the
following
deliverables.

Use the next slides


to submit

If you skip a
question, please put
“SKIPPED”

All questions assume


you are using the
Terminal (command
line).
1a.
Create the following
two directories.
/home/[username]/sourc
e-directory/ and

/home/[username]/desti
nation-directory/

Take screen capture


of your work and
submit to the right.
1b.
Download the
zipped folder
named

“constitution files”
from D2L to Linux
system

Take screen capture


of your work and
submit to the right.
1c.
Extract the four files
from the zipped
folder and put them
in the

/home/[username
]/source-directory
directory.

Take screen capture


of your work and
submit to the right.
2.
Use the Linux “cmp”
command to
determine if any of
the files in the
home/[username]/so
urce-directory are the
same identical files

Take screen capture


of your work and
submit to the right.
3.
Use the Linux “comm”
command to determine
the
similarities/differences
between the 4 files in
/home/[username]/sourc
e-directory
A. Are any of the files the same?
B. How do the 4 files differ?

Take a screen capture of


your work and submit to
the right.
3. (Continued)

Use the Linux “comm”


command to determine
the
similarities/differences

A. Are any of the files


the same?

Explain

Submit text answer to


the right.
3. (Continued)

Use the Linux “comm”


command to determine
the similarities/differences

B. Do any of the files


differ?

Explain

Submit text answer to the


right.
4.
Use the Linux “diff”
command to determine
the
similarities/differences
between the 4 files in
/home/[username]/sour
ce-directory
A. Are any of the files the same?
B. How do the 4 files differ?

Take screen capture of your


work and submit to the right.
4. (Continued)

Use the Linux “diff”


command to determine
the
similarities/differences

A. Are any of the files


the same?

Explain

Submit text answer to


the right.
4. (Continued)
Use the Linux “diff”
command to determine the
similarities/differences

B. How do the 4 files differ?

Explain

Submit text answer to the


right.
5.
Use the Linux “sdiff”
command to determine
the
similarities/differences
between the 4 files in
/home/[username]/sour
ce-directory

Take screen capture of your


work and submit to the right.
5. (Continued)

Use the Linux “sdiff”


command

A. Are any of the files


the same?

Explain

Submit text answer to


the right.
5. (Continued)

Use the Linux sdiff


command

B. How do the 4 files


differ?

Explain

Submit text answer to the


right.
6.
Copy two of the files from

/home/[username]/sourc
e-directory to
/home/[username]/destin
ation-directory

Take screen capture of


your work and submit to
the right.
6. (Continued)

Move the other two


from

/home/[username]/sour
ce-directory to
/home/[username]/dest
ination-directory

Take screen capture of


your work and submit
to the right.
6. (Continued)

a. Use hashing to
compare one of the
files copied to
determine if it has
been changed. Show
your results.

Take screen capture of


your work and submit
to the right.
6. (Continued)

b. Use hashing to
determine if a move
file is altered

(You may have to


perform an additional
move).

Take screen capture


of your work and
submit to the right.
7.
Change the permissions on
the two remaining files
in
/home/[username]/source-
directory

a. Use chmod and octal


notation to change files 1
and 2 to full permissions
for user, group, and others.

Take screen capture of


your work and submit to
the right.
7. (Continued)

Change the permissions


on the two remaining files
in
/home/[username]/source-
directory

b. Use chmod and


symbolic notation to
change files 3 and 4 to full
permissions for user,
group, and others.

Take screen capture of


your work and submit to
the right.
8.
Identify the value of
the umask currently
set on your PC

a. What is the current


umask setting on your
PC?.

Take screen capture of


your work and submit
to the right.
8. (Continued)

Identify the value of


the umask currently
set on your PC

b. Why does the


umask setting have 4
values rather than the
anticipated 3 for user,
group, and other?

Submit text answer to


the right.
8. (Continued)

Identify the value of


the umask currently
set on your PC

c. What is the purpose


of a umask and why
would an administrator
change the umask
value?

Submit text answer to


the right.
9.
Special modes in Linux
permissions

a. What is the current


umask setting on your
PC?.

Submit text answer to


the right.
9. (Continued)

Special modes in
Linux permissions

b. What is SetUID?

Submit text answer to


the right.
9. (Continued)

Special modes in
Linux permissions

c. What is SetGID?

Submit text answer to


the right.
9. (Continued)

Special modes in Linux


permissions

d. Demonstrate
setting and using the
sticky bit.

Take screen capture of


your work and submit
to the right.
Comments
Provide any
comments on this
week's
assignments.

This portion may


be used to support
future work and is
not required.

You might also like