CIS245 2
.docx
keyboard_arrow_up
School
ECPI University, Virginia Beach *
*We aren’t endorsed by this school
Course
245
Subject
Computer Science
Date
Apr 25, 2024
Type
docx
Pages
1
Uploaded by MateMoonMoose29 on coursehero.com
Maya Robinson 04/12/2024 CIS245 2.7 Install and Upgrade ts Passed . PS C:\Windows\system32>
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Get-OSVersion
- Write a PowerShell function called Get-OSVersion that
returns the numeric version of the operating system
The function should take an input parameter called
ComputerName which is the name of the computer
system from which to get the OS Version
• The function should gather the required information
from the Win32 ComputerSystem class in WMI
• The function should output a string stating the OS
version on the computer inspected
arrow_forward
Course Title : Operating SystemQuestion :
How you will create new user using terminal in Ubuntu? Add screenshots of all steps for new user creation including terminal and Login page in Answer sheet. Every student has to create new user as of his/her arid number for example (18-arid-2929).
Note: screenshots are mandatory.
arrow_forward
Project 8-1:
HANDS-ON PROJECTS
Research Antivirus Software
For Windows machines, the built-in Windows Defender is considered to be a fairly decent solution for home users, but it does have inherent weaknesses. Several good antivirus solutions are available on the market today, some of which is OS agnostic (meaning they work for multiple operating systems)and some of which are customized to a specific OS. Many also have free versions. In this project, you research options for two different operating systems:
From the following list, select two operating systems for which you will research antivirus
options: Windows, Linux, OS X, Android, Chrome OS, or UNIX.
Research and select three antivirus solutions for your chosen operating systems. Compare
features, cost, reported effectiveness, and feedback from reviewers.
Create a table or spreadsheet comparing the pros and cons of each alternative. Which
would you choose and why?
arrow_forward
Can someone help me with this? ASAP??!! Background:
The Linux operating system consists of the Kernel some other minor components and then a large number of Device Drivers. Device drivers are the key to how various hardware devices interface with the computer.
Task:
Develop a device driver that can be loaded and run in Linux. Then add some functionality to the device driver such as the user/application passing in a string to the device driver and the device driver returns an encrypted version of the string or passes in the excrypted string and returns the original string. Include a document on how to build, load and interact with the device driver along with screen shots of output.
Requirements: It must be written in C. It must be a valid an loadable device driver with at least some user/application functionality. That includes an open, release, read, write, and at least one ioctl command. It must also be able to be unloaded, and indicate that it has unloaded from the system. Make…
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonSubj: PWS0 - PowerShell
Chapter 3
16. Can you elaborate what each of the below commands does?
PS C:\> Push-Location PS C:\> Set-Location HKCU:\Software\test PS HKCU:\Software\test> Set-ItemProperty . newproperty "mynewvalue" PS HKCU:\Software\test> Pop-Location PS C:\>
arrow_forward
2. Part b - Download / install PyCharm Community Edition
PyCharm is an IDE (integrated development environment), which is a
convenient program for creating and running the Python programs you will
make in this course.
N
1
2
3
4
●
Go to https://www.jetbrains.com/pycharm/download/ and download the
Community edition for your computer (Mac or Windows).
When the download has completed, locate the file on your computer to and run it
to install PyCharm.
Exercise 2: Installation and download problems
Precise on the below table all problems and how you fix them
Problem ?
Solution ?
arrow_forward
Powershell Commands
Create two groups for two teams in your company (server development) and (software testing). There are 3 members in each team need to create. They are (Jaspreet, Lina and Hanh) for the server development team, and (Nina, David and Rahul) for the software testing team. Each member has to have some role description. Lina temporarily left so her account must be disabled. Rahul left the company to a new job. Lina came back to work so her account must be enabled again. The company decided to change the name of the server development to (software development).
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 21
15. What does the below command perform?Get-DscResource -Module @{ModuleName='xHyper-V';RequiredVersion='3.0.0.0'}
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 16
3. In the below PowerShell AD script why is “>>” used instead of “>”?
Get-ADForest >> \\dc1\shared\AD_Doc.txt
Get-ADDomain >> \\dc1\shared\AD_Doc.txt
Get-ADDefaultDomainPasswordPolicy >> \\dc1\shared\AD_Doc.txt
Get-ADDomainController -Identity dc1 >>\\dc1\shared\AD_Doc.txt
4. What is the use of the below script?
Enter-PSSession -ComputerName dc3 -Credential nwtraders\administrator
Import-Module activedirectory
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 17
6. What does the below PS script achieve?
$featureLogPath = "c:\poshlog\featurelog.txt"
start-job -Name addFeature -ScriptBlock
{
Add-WindowsFeature -Name "ad-domain-services" -IncludeAllSubFeature -IncludeManagementTools
Add-WindowsFeature -Name "dns" -IncludeAllSubFeature -IncludeManagementTools Add-WindowsFeature -Name "gpmc" -IncludeAllSubFeature
-IncludeManagementTools
}
Wait-Job -Name addFeature
Get-WindowsFeature | Where installed >> $featureLogPath
arrow_forward
Lab4: Network Security with Cryptography - Implementation
Objective: This lab will be able to implement cryptography
Task1: In Lab2, you identified the top tools that can provide
1. Confidentiality
2. Integrity
3. Authentication
Implement any 1 of it (one on Windows and another on Linux) and encrypt a file.
Provide 5 different tools that can serve this purpose
Tool Name
Operating
Name of the
Are you using
symmetric or
Name of the
Algorithm you
plain text file
Asymmetric
you used for
used for
Encryption
encryption?
encryption
What is the
key you used
arrow_forward
Transcribed Image Text
Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user. Which of the following is a valid user name that he can create for the second user? a) Miguel? b) Mig c) Miguel d) Miguel2 e) All the above will work!
arrow_forward
C shell. A child process executes shell commands. Shell script. The user's executables may be in (/bin/). Shell doesn't take command line arguments or pipes.
arrow_forward
Name of Experiment: Terminal - A Command Line Interface
Goal: Interaction with Linux through Command Line Interface.
**Execute the below commands step by step and take a snapshot of the executed**.
ls - list the contents in the directory
Usage: ls <directory>
cd - change directory
Usage: cd <directory>
pwd - Present working directory
Usage: pwd
mkdir - Make a directory
Usage: mkdir <directory>
5) rmdir - Remove a directory
Usage: rmdir <directory>
6) rm - is a command utility used to remove files and directories
Usage: rm [OPTIONS] FILE
7) mv - is a command used to move files and directories.
Usage: mv [OPTIONS] SOURCE DESTINATION
- The source can be one or more files but the destination should be a
single file or directory
- If you define a single file as SOURCE, and the destination target is
existing directory, then file is moved to the specific directory.
- If you specify a…
arrow_forward
Create a COVID-19 support service application using Python namedCovidSupportSystem that will provide the user with the below options:• Statistics,• Prevention,• Symptoms,• Treatment and Report case
1.1 Under Statistics state how many cases there are in South Africa, China and USA, then askthe user if they would like to see the cases for a different country, if yes, askthem to pick a number between 0 and 9, then pull a country from a list to show
arrow_forward
Bonus Q: The Linux components that can produce log messages include:
all of these
system daemons
services
the kernel
arrow_forward
explain the purpose of each command that are used on Linux.
• dir -a
• dir -A
• dir -F
• dir -l
• dir -h
• dir -r
• dir -S
• find
• chmod
• du
arrow_forward
QUESTION 8
emulator: noname.exe
file math debug view external virtual devices virtual drive help
step back
ID
single step
Load
reload
run
step delay ms: 100
registers
0722:0000
0722:0000
L
07220: 9A 154 ül
07221: 23 035 #
07222: 76 118 v
07223: 34 052 4|
07224: 12 018 ±
07225: B8 184 ©
07226: 00 000 NI
CALL 01234h:07623h
MOV AX, 04CO0h
INT 021h
NOP
NOP
NOP
AX 00 00
BX 00 00
01 2A
DX 00 00
CS
0722
IP
0000
debug stack
flags
screen
source
reset
aux
vars
A712
Based on the above screenshot, answer the following questions:
(1) How many bytes of the machine code of the CALL 1234H:7623H instruction?
(2) After the CALL 1234H:7623H instruction is executed, what are the new values of IP & CS?
(3) After the CALL 1234H:7623H instruction is executed, what data are saved onto stack?
arrow_forward
Linux:
2. Write the command(s) needed to display the user and group information of user sJames.3. Write the command(s) needed to display a list of currently logged-in users
arrow_forward
Lab8-4.cpp [Read Only] - Microsoft Visual Studio
File
Edit
View
Project
Build
Debug
Team
Tools
Test
Analyze
Window
Help
> Attach... -
Lab8-4.cpp i
+ X Lab8-1.cpp* ô
Lab8-6.cpp 6
Lab8-6.cpp @
A Miscellaneous Files
(Global Sc
B//Lab8-4.cpp - displays a pattern of numbers
[//Created/revised by on
1
4
#include
//end for
6.
7
| } //end of main function
} //end for
cin >> maxRows;
8
10
cout << "How many rows? ";
cout << col;
cout << endl;
int main()
int maxRows = 0;
11
12
13
14
15
16
return 0;
17
using namespace std;
18
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 14
3. The show output is produced with the below script. What changes can we make to further filter and obtain only the Win32 classes?
Get-CimClass -ClassName *computerSystem*
CimClassName CimClassMethods CimClassProperties ------------ --------------- ------------------ Win32_ComputerSystemEvent {} {SECURITY_DESCRIPTOR, TI... CIM_ComputerSystem {} {Caption, Description, I... CIM_UnitaryComputerSystem {SetPowerState} {Caption, Description, I... Win32_ComputerSystem {SetPowerState, R... {Caption, Description, I... CIM_ComputerSystemPackage {} {Antecedent, Dependent} Win32_ComputerSystemProcessor {} {GroupComponent, PartCom... CIM_ComputerSystemResource {} {GroupComponent, PartCom... CIM_ComputerSystemMappedIO {} {GroupComponent, PartCom... CIM_ComputerSystemDMA {} {GroupComponent, PartCom... CIM_ComputerSystemIRQ {} {GroupComponent, PartCom... Win32_ComputerSystemProduct {} {Caption, Description, I...
arrow_forward
Fill in the blank question- Only answer without explanation
Q. ____________ to disable graphical interface on Linux System.
arrow_forward
Computer Science
Create Linux User Account: From the command line (terminal )using a Linux
Cient. create a user account and set a password
Create Linux Group: For the user account created in question 3. from the
command line(terminal) add the user
account to a group named mga users
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 14
6. What does the select object -expandpropery parameter do?
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed Wilson
Chapter 14 Assignemnt Questions
1. What is the Get-CimClass cmdlet used for?
2. What difference will it make to the output by moving the asterisk(*) to the beginning, end, or both in the below script?
Get-CimClass -ClassName *computer
Get-CimClass -ClassName computer*
Get-CimClass -ClassName *computer*
arrow_forward
Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 21
14. What is the parameter used to view the progress of the Start-DscConfiguration cmdlet?
15. What does the below command perform?Get-DscResource -Module @{ModuleName='xHyper-V';RequiredVersion='3.0.0.0'}
arrow_forward
1) On the command line, you can redirect stdout and stderr, but not stdin.
True
False
2) System calls are a way for an application to make a request to the underlying operating system.
True
False
3) If you call open("foo.txt", O_WRONLY) and foo.txt doesn't exist, it'll be created.
True
False
4) On the command line, you can redirect stdout and stderr to the same file.
True
False
arrow_forward
Please help with the following In Linux give the description of the following commands
who, wwhatis
ln (-s)
file (-f)
arrow_forward
A firm purchases five hundred computers for its new office. A system administrator installs Windows 10 on
all the computers. The administrator wants all the computers in the new office to have a consistent
configuration.
Which of the following features included in Windows 10 would be appropriate to complete this task?
a)
Multiple Activation Key
b) Group Policy
c) Automatic updates
d) Application programmer interface
e) The Consistent Configuration tool
f) None of the above!
arrow_forward
Windows 7 contains two master keys in its registry. They are HKEY_LOCAL_MACHINE and which of the following?
HKEY_USERS
HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_CURRENT_CONFIG
arrow_forward
//Project2.sMysteryFunction1: movl $1, %eax // jmp .L2.L3: imulq %rdi, %rax movl %edx, %esi.L2: leal -1(%rsi), %edx testl %esi, %esi jg .L3 ret
MysteryFunction2: movl $0, %edx movl $0, %ecx jmp .L5.L6: addl $1, %ecx.L5: cmpl $31, %ecx ja .L8 movl $1, %eax sall %cl, %eax testl %edi, %eax je .L6 movl $-2147483648, %eax shrl %cl, %eax orl %eax, %edx jmp .L6.L8: movl %edx, %eax ret
MysteryFunction3: movq (%rdi), %rcx movl $1, %eax jmp .L10.L11: addl $1, %eax.L10: cmpl %esi, %eax jge .L14 movslq %eax, %rdx movq (%rdi,%rdx,8), %rdx cmpq %rcx, %rdx jle .L11 movq %rdx, %rcx jmp .L11.L14: movq %rcx, %rax ret
MysteryFunction4: movl $0, %eax jmp .L16.L17: movl %edi, %edx andl $1, %edx addl %edx, %eax shrq %rdi.L16: testq %rdi, %rdi jne…
arrow_forward
How challenging or simple is it to add new users to or delete existing ones from the operating systems of Windows 10 and Linux, respectively?
arrow_forward
Navigate to your home directory.
Create a directory named Module14.
Navigate to Module14.
Write a program using the language of your choice that we've studied in class (such as a C-program, PERL, or bash shell script).
Using one of the scheduling techniques, schedule the program to run at this point in time plus 2 hours.
Prove that the process has been scheduled.
Prove that the process executed.
Logout.
in fedora 37 explain each code and take screenshots
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Get-OSVersion - Write a PowerShell function called Get-OSVersion that returns the numeric version of the operating system The function should take an input parameter called ComputerName which is the name of the computer system from which to get the OS Version • The function should gather the required information from the Win32 ComputerSystem class in WMI • The function should output a string stating the OS version on the computer inspectedarrow_forwardCourse Title : Operating SystemQuestion : How you will create new user using terminal in Ubuntu? Add screenshots of all steps for new user creation including terminal and Login page in Answer sheet. Every student has to create new user as of his/her arid number for example (18-arid-2929). Note: screenshots are mandatory.arrow_forwardProject 8-1: HANDS-ON PROJECTS Research Antivirus Software For Windows machines, the built-in Windows Defender is considered to be a fairly decent solution for home users, but it does have inherent weaknesses. Several good antivirus solutions are available on the market today, some of which is OS agnostic (meaning they work for multiple operating systems)and some of which are customized to a specific OS. Many also have free versions. In this project, you research options for two different operating systems: From the following list, select two operating systems for which you will research antivirus options: Windows, Linux, OS X, Android, Chrome OS, or UNIX. Research and select three antivirus solutions for your chosen operating systems. Compare features, cost, reported effectiveness, and feedback from reviewers. Create a table or spreadsheet comparing the pros and cons of each alternative. Which would you choose and why?arrow_forward
- Can someone help me with this? ASAP??!! Background: The Linux operating system consists of the Kernel some other minor components and then a large number of Device Drivers. Device drivers are the key to how various hardware devices interface with the computer. Task: Develop a device driver that can be loaded and run in Linux. Then add some functionality to the device driver such as the user/application passing in a string to the device driver and the device driver returns an encrypted version of the string or passes in the excrypted string and returns the original string. Include a document on how to build, load and interact with the device driver along with screen shots of output. Requirements: It must be written in C. It must be a valid an loadable device driver with at least some user/application functionality. That includes an open, release, read, write, and at least one ioctl command. It must also be able to be unloaded, and indicate that it has unloaded from the system. Make…arrow_forwardBook reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonSubj: PWS0 - PowerShell Chapter 3 16. Can you elaborate what each of the below commands does? PS C:\> Push-Location PS C:\> Set-Location HKCU:\Software\test PS HKCU:\Software\test> Set-ItemProperty . newproperty "mynewvalue" PS HKCU:\Software\test> Pop-Location PS C:\>arrow_forward2. Part b - Download / install PyCharm Community Edition PyCharm is an IDE (integrated development environment), which is a convenient program for creating and running the Python programs you will make in this course. N 1 2 3 4 ● Go to https://www.jetbrains.com/pycharm/download/ and download the Community edition for your computer (Mac or Windows). When the download has completed, locate the file on your computer to and run it to install PyCharm. Exercise 2: Installation and download problems Precise on the below table all problems and how you fix them Problem ? Solution ?arrow_forward
- Powershell Commands Create two groups for two teams in your company (server development) and (software testing). There are 3 members in each team need to create. They are (Jaspreet, Lina and Hanh) for the server development team, and (Nina, David and Rahul) for the software testing team. Each member has to have some role description. Lina temporarily left so her account must be disabled. Rahul left the company to a new job. Lina came back to work so her account must be enabled again. The company decided to change the name of the server development to (software development).arrow_forwardBook reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 21 15. What does the below command perform?Get-DscResource -Module @{ModuleName='xHyper-V';RequiredVersion='3.0.0.0'}arrow_forwardBook reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 16 3. In the below PowerShell AD script why is “>>” used instead of “>”? Get-ADForest >> \\dc1\shared\AD_Doc.txt Get-ADDomain >> \\dc1\shared\AD_Doc.txt Get-ADDefaultDomainPasswordPolicy >> \\dc1\shared\AD_Doc.txt Get-ADDomainController -Identity dc1 >>\\dc1\shared\AD_Doc.txt 4. What is the use of the below script? Enter-PSSession -ComputerName dc3 -Credential nwtraders\administrator Import-Module activedirectoryarrow_forward
- Book reference: Windows PowerShell Step by Step 3rd Edition - Ed WilsonChapter 17 6. What does the below PS script achieve? $featureLogPath = "c:\poshlog\featurelog.txt" start-job -Name addFeature -ScriptBlock { Add-WindowsFeature -Name "ad-domain-services" -IncludeAllSubFeature -IncludeManagementTools Add-WindowsFeature -Name "dns" -IncludeAllSubFeature -IncludeManagementTools Add-WindowsFeature -Name "gpmc" -IncludeAllSubFeature -IncludeManagementTools } Wait-Job -Name addFeature Get-WindowsFeature | Where installed >> $featureLogPatharrow_forwardLab4: Network Security with Cryptography - Implementation Objective: This lab will be able to implement cryptography Task1: In Lab2, you identified the top tools that can provide 1. Confidentiality 2. Integrity 3. Authentication Implement any 1 of it (one on Windows and another on Linux) and encrypt a file. Provide 5 different tools that can serve this purpose Tool Name Operating Name of the Are you using symmetric or Name of the Algorithm you plain text file Asymmetric you used for used for Encryption encryption? encryption What is the key you usedarrow_forwardTranscribed Image Text Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user. Which of the following is a valid user name that he can create for the second user? a) Miguel? b) Mig c) Miguel d) Miguel2 e) All the above will work!arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning