Nt1330 Unit 3 Quiz

Great Essays
Please note that, we only discuss couple of options for each command to get the familiarity, and get you going with your learning. At the end of each command, there is a link to the command reference, where we discuss the most relevant and practical usages of the commands. It not practical to discuss all the options available for each command we discuss. We recommend you to refer to the man page of the command on your Linux system.

Listing Files

When a user logs in to a UNIX system, he/she would probably want to see the contents of the home directory. How would you see them on console type environment? You don't have the luxury to click around like in windows.

The "ls" command comes to rescue us.

The "ls" command is used to list the contents of the current directory or any
…show more content…
Command Syntax: wc [Options] [File] [File]...

Options & Usages

Option

Usage

Example

-l, --lines

prints the newline counts

$ wc -l mybigfile.txt

-w, --words

prints the word counts

$ wc -w mybigfile.txt

-c, --bytes

prints the byte counts

$ wc -c mybigfile.txt

-m, --chars

prints the character counts

$ wc -m mybigfile.txt

-L, --max-line-length

prints only the length of the longest line in the file

$ wc -L mybigfile.txt

Please refer to "wc" command reference & practical usages to explore the command.
Splitting Files

The "split" command is used to:

Split large files into a small and manageable small size files. By default, splits large files into 1000 lines per file.

Command Syntax: split [Options] [File]

Options

Option

Usage

Example

-l, --lines

split by number of lines

$ split -l 500 mybigfile.txt

-b, --bytes

split by size

$ split -b 2MB mybigfile.txt (splits into 2MB size files)

-n

split into defined number of files

$ split -n 2 mybigfile.txt

-d

Use numeric suffixes

$ split -d

Related Documents

  • Decent Essays

    Nt1310 Unit 3 Components

    • 152 Words
    • 1 Pages

    The first component that needs to be bought is the Case. The case is what holds all of the components for a computer work. In order to make the case useful it has to have many components like the motherboard. The motherboard is how all the components 0f a computer communicate . The motherboard is screwed into the left side of the case.…

    • 152 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    Jonathan Desmond DCN Lab 5 Kali Kali is a live Linux distribution which can be put onto a USB and loaded directly onto a computer. Kali, having being bundled with a variety of testing tools such as Wireshark and Metasploit Framework, is utilized to assess the security of a target machine. The creator of Kali, Mati Aharoni first thought of the idea during a consultation which banned the use of external hardware as well as the stipulation that client computers could only be used if the data remained untouched. He then thought to use a live Linux distribution to assess the client’s security flaws.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 6 Project

    • 496 Words
    • 2 Pages

    Our schedule begins in the week of October 10th. This is because we did not complete our site visit until October 6th. After our site visit, we were able to get a better grasp on the project and how long it would take us to complete each step of the project. We set aside two weeks at the beginning of the project to sort and analyze the data that was handed over to us from Lockheed Martin. We also began to concurrently work on the model.…

    • 496 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6

    • 858 Words
    • 4 Pages

    Task-5 a) • Metals Metal structure is made up of crystals of metals which are made up of positive metal ions and these ions are surrounded by a sea of delocalized electrons. To separate these substances from this crystal lattice a lot of energy is needed. In between the positive and negative ions is present a strong electrostatic force of attraction. That is the reason why metals have strong melting and boiling points. In order to slide one layer of the metal ions over the other layer very less amount of energy is used.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 2

    • 703 Words
    • 3 Pages

    During the laboratory section two devices were used; these were the DE2-115 board and a computer, containing the software system Quartus II. Each of these devices were very significant for gathering information during the duration of the lab and shall be explained further. The DE2-115 board was the device provided in the lab that displayed the output for viewing by the student. The portions of the DE2-115 board that were used during the duration of the lab were the switches, the LEDs, and the seven segment displays.…

    • 703 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 5

    • 419 Words
    • 2 Pages

    Under the Provision and Use of Work Equipment Regulations 1998 (PUWER) an employer has a responsibility to maintain, in safe working order, all electrical equipment used in their business. All electrical items in school should have a portable appliance testing (PAT) done so everyone knows that they are safe to be used in school. The definition of portable equipment is that portable equipment consists of all equipment that is moveable and that when in use it is connected to an electricity source by means on flexible cable fitted with a plug. For example: • Office equipment like photocopiers, typewriters, personal computers, desk lamp and shredders. • Extension cables, transformers and battery chargers.…

    • 419 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4 Thr

    • 474 Words
    • 2 Pages

    Complete Name: Unit 4 Student Name: Davidson, Amber Nicole ********************************************************************************************************** 1. Name at least four things checked for in a DUR. Student Answer: When a physician is writing an electronic prescription, they must select the drug and enter the SIG information. The EHR system scans the patient's chart for any known alergies.…

    • 474 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4

    • 672 Words
    • 3 Pages

    Response / Analysis 3 Directions: READ the Directions. Answer the question(s) below in 500-750 words. Enter your answer onto this document; once you are done, upload this document to D2L. Do NOT change the font, font size, or margins. Margins are set at 1” right, 1” left, 1” top, and 1” bottom. Font is Calibri and font size is 12.…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 676 Words
    • 3 Pages

    There are several possible types of terrorist attacks using Weapons of Mass Destruction (WMD), using conventional firearms and explosives, or ”other means of attack (including low-tech devices and delivery, attacks on infrastructure, and cyber terrorism)”, (FEMA, 2002, P. 9). Each type of attack or a combination of several will need its own action plan by emergency managers and emergency responders, making the identification of the type of attack and weapon used critical. If an attack occurs, one tool available to a jurisdiction is the Threat and Hazard Identification Risk Assessment (THIRA), which summarizes the “threats and hazards of concern showing how they may affect the community” (DHS, 2013, P.1). The THIRA will outline the possible risks that would be facing emergency responders after a specific disaster and what they might face (FEMA, 2002). For example, the guide describes the threat of radiation after a nuclear/radiological attack, or the threat of contamination after a chemical or biological attack.…

    • 676 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 506 Words
    • 3 Pages

    1. can try to keep your child interested in his food longer by making mealtime as calm and uneventful as possible, without distractions from toys, television, or pets. 2. What are some strategies to use in getting children to try new foods? Let them try different foods on their own, Have kids pick off your plate, Amp up the fun factor, Mix up your child’s favorite dish by adding something new to it, simply have your child take five bites – and, if they don’t like it, have them politely say, “No, thank you.”…

    • 506 Words
    • 3 Pages
    Decent Essays