Saturday, May 18, 2019
Computer user freedom Essay
1) Users have the freedom to run, copy, distribute, study, change and  purify the softwargon. The freedoms to run the program as you wish, for any purpose. The freedoms to study how the program works and change it so it does your  computing as you wish. Access to the source code is a precondition for this. The freedom to redistribute copies so you  corporation help your neighbor. https//www.gnu.org/philosophy/free-sw.html4) A nonprofit with a worldwide mission to promote computer substance abuser freedom and to defend the rights of all free software users. Linux is an open-source operating  establishment modeled on UNIX. GNU developed many of the tools, including the C compilers that are part of the Linux operating system. Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet. http//www.sobell.com/CMDREF1/answers/01.answers.even.cmdref.i.pdf Chap.2 pg.501) Installing  felt hat/RH   EL is the process of copying operating system  registers from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration  file aways so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of  fedora/RHEL, and dual-boot installations. Chap.3 Pg.861) A live system gives you a chance to preview Fedora without installing it. It does not write to hard disks. 4) Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8) When the system enters runlevel 5.http//www.sobell.com/RH4/answers/03.install.main.ans.even.RH4.pdf Chap.11 Pg.4981) When a system is in single-user mode, you can  put down in only at the console. Not all of the file systems are mounted, and many daemons are not  lead. With the system in multiuser mode you can log in at any terminal or workstation that is set up for log   in, most or all of the file systems are mounted, and all of the daemons that your system is set up to run arerunning. 3) The letters stand for  rest user. You can give yourself privileges of any user whose password you know (or any user when you are running as root). You can also execute a command (other than a shell) as the specified user. To log in as Alex, you would first log in as root, and then give the command su alex, or su  alex to establish the same environment that Alex has when he logs in.7) Use Uppercase and lowercase characters, along with numbers and  finicky characters, and your password should be at least 8 characters long.http//www.sobell.com/RHLINUX1/answers/Chapter_17.ans.pdf  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.