StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Systems Programming - Assignment Example

Cite this document
Summary
Please put your answers into the boxes in this document (it is a Microsoft Word document). You may alter the size of the boxes if you wish, but you will probably not need to. Do not add any text outside the boxes. Your answers must be typed. Only answers submitted in this document will be accepted…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Systems Programming
Read Text Preview

Extract of sample "Systems Programming"

Download file to see previous pages

If you have not completed the work by the due date please hand in whatever you have done. 1. If I am currently in a directory /usr/jbloggs which currently contains just one file called file1 and nothing else. I want to put a copy of the file with the same name in a directory /usr/jbloggs/sub1/sub2 and another copy of the file called file2 in a directory /usr/jbloggs/sub1/sub3/sub4. List the commands you would need to do (in the correct order) to achieve this. 2. Explain what each of the components of the protection string lrwxr-xr-- which is on a file file3 means.

Give command(s) to change the file's protection to lrwx--x--- using the alphabetic form of the protection command and a second to change it from that to lrwxrwxr-- using the numeric form of the command. The first character 'l' denotes a Symbolic link. A symbolic link contains the name of the file to which it is linked. Symbolic links are created with the ownership of the creator and the permissions are of the creator's current umask. Once created, the symbolic link ownership and permissions will not change, because the mode and ownership of the symbolic link is ignored by the system.

Therefore, using CHMOD command, it is possible only to change the permission of the target file but not the link file itself. Therefore, it is not possible to change the permission of the link file as asked in this question.3. Write a fully commented Bourne shell script program that takes exactly two parameters and if both exist as files it appends the first file onto the end of the second. If either parameter is not a valid file the program will output an error message. Note - code with few or no comments will gain very few marks regardless of the quality of the code itself.

Marks will also be given for clarity and ease

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Systems Programming Assignment Example | Topics and Well Written Essays - 1000 words”, n.d.)
Systems Programming Assignment Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/technology/1523837-systems-programming
(Systems Programming Assignment Example | Topics and Well Written Essays - 1000 Words)
Systems Programming Assignment Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/technology/1523837-systems-programming.
“Systems Programming Assignment Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/technology/1523837-systems-programming.
  • Cited: 0 times

CHECK THESE SAMPLES OF Systems Programming

Interest in Computer Forensics

Expect the training to be a pretty even mix of Computer Science (Operating Systems, programming, and Software) along with several semester hours in law (Business and Criminal Law, procedures, ethics, etc.... For example, my employer uses image files to execute software uploads, like building or rebuilding computer systems to deploy the operating system.... According to their website, training is intense but well worth the effort put forth, for CCE certification is “one of the most desired certifications in the digital forensics industry”, ISFCE is recognized by the Veterans' Administration as a legitimate training facility and has been recognized as an experience waiver (one year maximum), when it is combined with the Certified Information systems Security Professional (CISSP) certification (2012)....
4 Pages (1000 words) Essay

Open Source Versus Closed Source Software

Currently, there are a huge number of categories of the open source software that include but not limited to the Application Software, Operating Systems, programming Languages and Server Software.... The open source computer programming languages include: PHP – a scripting language used to develop websites, Perl, Ruby etc.... Like the open source software, the proprietary software has much more categories of the software include: Operating System, Computer programming Languages, software applications, public domain software, private software etc....
5 Pages (1250 words) Essay

Conducting e-Business

The system must be able to handle the different computing systems across all the company's offices and departments.... This essay is focused on the benefits of the e-business conducting.... It is especially emphasized that e-business is essential for today's globalized economy and fast-paced world....
6 Pages (1500 words) Essay

Open and Closed Source Systems

). Currently, there are a huge number of categories of the open source software that include but not limited to the Application Software, Operating Systems, programming Open Source Operating System Open-source software (OSS) is computer software which is available with not only the source but also the right of redistributing the source code along with all the modifications and the works derived.... urrently, there are a huge number of categories of the open source software that include but not limited to the Application Software, Operating Systems, programming Languages and Server Software....
1 Pages (250 words) Essay

Business Systems Programming

This paper seeks to discuss three concepts that need to be understood so as to work with… Through the use of monospaced fonts like Courier New and Lucida Console, we can establish the characters that can fit on a single line and the total lines that will fit to Business Systems Programming Control breaks in COBOL programming are used to produce reports....
1 Pages (250 words) Essay

The History and Contributions of Database Management Systems

The paper “The History and Contributions of Database Management systems” provides the examination of the history of DBMS, which can help to understand the potentials and the weaknesses of these systems.... Database Management systems – DMS – have been related to the development of complex tasks.... hellip; The current paper focuses on the examination of the effects of DBMS on both sides – towards the science and the society as users of DBMS and towards these systems – as valuable parts of projects developed in various scientific, economic and social fields....
6 Pages (1500 words) Research Paper

Distributed Systems Programming

The paper "Distributed Systems Programming" describes that at any instant the server must be able to communicate simultaneously with many clients and to wait for the incoming requests on its specific server port at the same time.... The connection is established as follows: Distributed programming is the process of writing a computer program that runs in a distributed system.... Distributed computing also refers to the use of distributed systems to solve computational problems....
5 Pages (1250 words) Essay

Business Systems Programming

… The paper "Business Systems Programming" is a worthy example of an essay on logic and programming.... The paper "Business Systems Programming" is a worthy example of an essay on logic and programming.... The arithmetic encourages simple forthright programming style....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us