UNIX/Linux Tutorial: A Comprehensive Guide
1. Steps to Start Using UNIX
- Upon turning on the computer, the user is informed of the installed UNIX version.
- The system prompts for a login or username.
- The system prompts for a password.
- The prompt, also known as the command prompt or shell prompt, appears.
- The .profile file is executed.
2. What is a Shell?
Several shell variations exist, including the standard Bourne shell, Korn shell, C shell, and Bash. A shell script is a text file containing commands, executable programs, and control structures.
Read MoreProgramming Languages and Software Development
Programming Languages
At Stage Coding are Elaborated Source Programs
First-Generation Languages
Assemblers with a low level of abstraction.
Second-Generation Languages
No dependence on computer structure. Prime high-level languages. Examples include Fortran, Cobol, Algol, and Basic.
Third-Generation Languages
Seen under two approaches:
- Imperative Programming: Strongly typed languages with redundancy between declaration and use of each data type, facilitating verification during compilation. Examples include:
Cybersecurity Essentials: Understanding Threats and Protection
Cybersecurity Essentials
Encryption Methods
Symmetric Encryption
Symmetric encryption uses the same key for both encoding and decoding. This key is shared between the sender and receiver, allowing the sender to encrypt the message and the receiver to decrypt it.
Asymmetric Encryption
Asymmetric encryption, also known as public-key cryptography, uses two distinct keys: a public key for encryption and a private key for decryption. The sender uses the receiver’s public key to encrypt the message, and the
Read MoreNetwork Fundamentals Practice Quiz: Test Your Knowledge
Network Fundamentals Practice Quiz
Test Your Knowledge
1. UDP Protocols
Which of the following application layer protocols use UDP segments? (Choose two.)
- DNS
- TFTP
2. UTP Cable Advantages
What are the advantages of UTP cable installation? (Choose three.)
- Less expensive than fiber optic
- More flexible and easy to install
- Allows a simple upgrade of WAN hardware
3. Crossover Cable Use
When do you use a crossover cable on a network?
- When connecting a host to another host
4. Token Ring Topology
Which of the following
Read MorePython Tutorial: Loops, Operators, Data Structures, and More
Python Programming Basics
Control Flow: Pass, Continue, and Break
Let’s understand the pass, continue, and break statements in Python:
(i) Pass:
The pass
statement is a placeholder. It does nothing but is useful when a statement is syntactically required, but you don’t want any action to be taken.
Example:
if condition:
pass # Do nothing for now
(ii) Continue:
The continue
statement is used inside loops. It skips the rest of the current iteration and moves to the next one.
Example:
for i in range(5)
Read More
Linux Commands and System Administration Essentials
1. Viewing Directories
Use the following command to view directories:
find -type d
(finds all directories)ls -l
(lists files and directories in long format)
2. Folders Storing System Files
The following folders store system files:
/
(root directory)/dev
(device files)
3. Controlling Processes: Foreground (FG) and Background (BG)
In Linux, you can run multiple tasks simultaneously. To run a program in the background, add an ampersand (&) to the end of the command line.
Example:
# cp -r /usr/src/linux
Read More