1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vesna_86 [32]
3 years ago
10

You are the network administrator for Slimjim, a peripheral device company. The network uses Linux, and you need information on

some commands to perform your job. Open the manual pages and find all the commands that have the word "copy" in their name or description. What command did you use to accomplish this task? Are there any commands in this list that only a root user can execute? How are they indicated? Select any two of them and compare their info and manual pages. Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos).
Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
6 0

Step 1 of 4

What command did you use to accomplish this task?

First of all, let us ask ourselves what manual pages or man pages are. Manual pages in Unix/Linux are sometimes referred to as an online form of software documentation. They are a set of pages that try to explain and expound every command available on your system. Further, these pages explain to you the specifics of what each command does and how to run them. And in this case, we can use two commands to search for all the commands that have the word "copy" in their name or description. The commands are “man –k copy” or “apropos copy”

Step 2 of 4

Are there any commands in this list that only a root user can execute? How are they indicated?

Yes. There are several commands in this list that only a root user can execute. If you would want to find out what these commands are, the best way to do that is to look at those manual pages that are indicated by the manual page section number. If it has a number 8, then a root user can execute this command

Let’s compare the cp command and the cpio command

If you do an apropos or a man page on the commands above, you will spot a few differences. The cp command is used to copy files and directories from source to target location while the cpio command copies files to and from archives. The available options are –a –b –d –f –i –l –L –p and several others. On the other hand, the available options for cpio are –0 –a –A –b –B –C –c –d –E and more.

Access and read the manual pages on three other commands that interest you either by using the command name or searching for them by related keyword (try using apropos)

affcopy command

NAME

      affcopy - reorder and recompress AFF files

SYNOPSIS

      affcopy [options] file1 file

      affcopy [options] file1 file2 file3 ... dir

      affcopy [options] file1 file2 file3 ... dir1 dir2...

OPTIONS

General options:

             -d     Print debugging information as well.

             -h     Help, print this message.

             -L     Recompress pages (preen) with LZMA (smaller but slower).

             -m     Just copy the missing segments.

bcopy command

NAME

      bcopy - copy byte sequence

SYNOPSIS

      #include <strings.h>

      void bcopy(const void *src, void *dest, size_t n);

DESCRIPTION

      The bcopy() function copies n bytes from src to dest.  The result is correct, even when both areas overlap.

RETURN VALUE

      None.

cifssd command

NAME

      cifsdd - convert and copy a file over SMB

SYNOPSIS

      cifsdd [OPERAND]...

      cifsdd OPTION

DESCRIPTION

      This tool is part of the samba(7) suite.

      Copy a file, converting and formatting according to the operands.

      bs=BYTES

          read and write up to BYTES bytes at a time (default: 4096)

      ibs=BYTES

          read up to BYTES bytes at a time (default: 4096)

      obs=BYTES

          write BYTES bytes at a time (default: 4096)

You might be interested in
_____ are the younger edge of gen y who have never lived without the internet or easy access to cell phones.
Sophie [7]

Generation Y are the people age 14-37, which means they are born 1977 - 2000.<span /><span>Tweens are the younger edge of gen Y who have never lived without the internet or easy access to cell phones.</span>
<span /><span>
</span>
8 0
3 years ago
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data.
nydimaria [60]

Answer: Transaction processing system

Explanation:

A transaction processing system basically records all the data in the system. It is the set of data that basically monitor all the transaction process in the system. It basically perform various transaction oriented applications in the system.

It also allow time delay in the system when the item is supposed to being sold to the actually selling of the item. There are basically various types of transaction processing system arr payroll, account payable and the inventory control.

4 0
3 years ago
Does anybody know a better app I can use instead of Brainly
melomori [17]

Answer:

Education subreddits on reddit

Explanation:

6 0
3 years ago
Read 2 more answers
Create a float variable named circumference.
Likurg_2 [28]

Answer:

Float circumference; // Create a float variable

Explanation:

The float datatype is used for storing the decimal point values .The syntax  to declaring  any float variable is given below.

float variable-name;

float  circumference; // create a float variable

circumference=89.9007;; // store the value in circumference

Following are program in c++

#include <iostream> // header file

using namespace std; //namespace

int main() // main function

{

   float circumference; // creating variable float

   circumference=89.9007; // storing value

   cout<<circumference;  // display value circumference

   return 0;

}

Output:

89.9007

5 0
3 years ago
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are the
guapka [62]

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

3 0
3 years ago
Other questions:
  • What is a data mining??
    5·1 answer
  • Here's a thought: Why does your Brainly ranking keep going down?
    6·2 answers
  • Which of the following SQL statements will display all customers who have not recently placed an order? a. SELECT customer# FROM
    15·1 answer
  • Please answer this a due tomorrow!!!
    5·1 answer
  • Write a program in C++ or C that includes two different enumeration types and has a significant number of operations using the e
    15·1 answer
  • Select the correct answer.
    10·2 answers
  • You are system administrator with hundreds of host workstations to manage and maintain. You need to enable hosts on your network
    14·1 answer
  • What happens when a user clicks Accept on a meeting request?
    9·2 answers
  • PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MY QUESTION WHICH IS DUE TODAY PLZ ANSWER ALL OFIT!!!!
    10·1 answer
  • Jak sie pisze oł na klawiaturze komputerowej
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!