Explain briefly the following commands a. keytool -genkey -alias sdo -keyalg RSA b. keytool -certreq -alias sdo -file sdoCSR.cer c. keytool -import -file sdo.cer -alias sdo –trustcacerts d. keytool -import -alias sdo -file fromsdo.cer
Q: You have modified the /etc/aliases file to include a new e-mail alias. However, when yousend e-mail…
A: Modifying the alias file After the modification to the file, then the command for new alterations…
Q: What will the following wildcard regular expression return: file[a-c]?a. filea-cb. filea, filecc.…
A: Explanation: Wildcard is known to be a character that is used as substitute for any class of a…
Q: Which of the following sequence of commands are used to create Sub directory- Test inside a new…
A: The directory is a computer logical organisations of the files and other directories and…
Q: Which of the following commands will remove a file called myfile.c from the file system? O a.…
A: Answer: The commands that will remove a file called myfile.c from the file system is rm -f myfile.c.
Q: 1. Make a directory under your home directory called documents. Next, make a directory under the…
A: Answer: Write the linux commands to answer the following tasks. 1. Make a directory under your home…
Q: In the below script, what does the –autosize parameter do
A: Solution 4) Following are some of the cmdlets operations that can be used to improve output from WMI…
Q: Which of the following tools can be used to encrypt a folder? Protect-Item PowerShell cmdlet…
A: Tools can be used to encrypt a folder
Q: Write one or more bash commands to perform the following tasks. You may assume that each part of the…
A: echo #!bin/bash >> Question2.sh echo Name ID >> MyDetails.txt wc -w MyDetails.txt
Q: How to show the output of this code ?
A: This program will not run It contains some warnings and errors.
Q: commands to create, copy, move or delete a file?
A: Basic windows commands used in the command prompt: Create : mkdir filename copy : cp filename
Q: What is the use of the below set of commands? $disk = Get-CimInstance -ClassName Win32_LogicalDisk…
A: Lets see the solution.
Q: Q. chmod command is used to ___________ the permissions of files in linux.
A: This fill in the blank question is based on permission command in linux.
Q: What is the best way to acquire a complete list of all the files in your current directory,…
A: Introduction: The command "ls" has a number of arguments that influence the output when copied. The…
Q: Linux Quiz (Accurate answers please!) Write the command to create a directory
A: Given: Write the Linux commands.
Q: pgrep -c kworker
A: The pgrep command: The pgrep command returns the process IDs of a functioning program based on the…
Q: Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod…
A: a) mkdir -p dir1/dir2 -p will create the parent directory as necessary. if dir1 or dir2 doesn't exit…
Q: After typing the command umask 731, what will the permissions on all new created files be
A: Umask, or the user file-creation mode is a Linux command that is used to assign the default file…
Q: Using wildcard metacharacters and options to the ls command, view the followinga. All the files that…
A: a. All the files that end with .cfg under the /etc directory b. ls -l /etc/*.cfg b. All hidden files…
Q: Select all of the following Bash filename patterns that would only match the following filenames…
A:
Q: 10. What is the use of the below set of commands? $disk = Get-CimInstance -ClassName…
A: Given: 10. What is the use of the below set of commands? $disk = Get-CimInstance -ClassName…
Q: Write a bash script that will run the command getData1.sh and getData2.sh to read values from two…
A: How to open/import a text CSV file One can read comma separated CSV file. Start calc Choose File…
Q: The “FWC-EMPLOYEES” folder/directory is available to all FWC employees to place additional data…
A: NTFS permissions are a set of permissions used to secure folders and files.
Q: dable opt
A: Below the Use df (with the human readable option), a pipe, and the grep command to show everything…
Q: 13. Which of the following is default permission set for ordinary files? a) rw-rw-rw- b) rwxrwxrwx…
A: 13. Which of the following is default permission set for ordinary files? a) rw-rw-rw- b) rwxrwxrwx…
Q: What are the returned values of the following commands? >>rc_wait=wait(NULL); >getpid(); >…
A: As per our guidelines we are supposed to answer only three sub part of a question so post the other…
Q: Below is a list of different access right settings. We want to implement shared update of certain…
A: CHOICES: A. Assign Bob ownership to Alice's files, and Alice ownership to Bob's files. If we…
Q: Write a BASH script that will use a for loop that will loop through the tscripts folder and delete…
A: Bash script to for loop through folder and delete the file
Q: Which cat command is used to create empty files? i. cp ii. cat iii. touch iv. create
A: Question. Which cat command is used to create empty files? i. cp ii. cat iii. touch iv. create
Q: Explain briefly the following commands keytool -genkey -alias sdo -keyalg RSA keytool -certreq…
A: These all are the commands of keytool and the words written after them are specifying certain…
Q: From where does the following command get its input? tr 'a-z' 'A-Z' |tee file1 >file2 files a-z and…
A: The answer is given below.
Q: Please write down the Linux command for each question. 17.1 What command should be used to change…
A: 17.1 What command should be used to change the read, write and execute permission of a file?…
Q: write the code to lookup, add and remove phone entries from the phonebook text file . These are the…
A: #!/bin/bash operation=$1name=$2 if [ -z "$operation" ] || [ -z "$name" ]then echo "The…
Q: White the commands to list the files including file permission in Kali Linux
A: To start with file permissions, you have to find the current Linux permission settings. There are…
Q: Which file contains full and incremental back-up information for use with the dump/restore…
A: File containing full and incremental back up information The /etc/dumpdates contains tracking of…
Q: Which of the following UNIX command can be used in symbolic mode to grant the following permissions…
A: r = read w =write x =executer - sign indicates that particular permission has been removed b…
Q: DOS, which of the following keys will bypass the CONFIG.SYS and AUTOEXEC.BAT files? we use F5 why?
A: In DOS, F5 keys will bypass the CONFIG.SYS and AUTOEXEC.BAT files
Q: Now try it for yourself. Make a random text file and enter some readable sentences in there before…
A: Encryption is the process of converting data and information into an unreadable, encoded version.…
Q: oduces an exhaustive list of all the files and their perm
A: Introduction: Below describe the command produces an exhaustive list of all the files and their…
Q: Answer questions according to the table below. a) Go to the “Aklasor1” folder.(3) b)…
A: 1) We are at home, we need to go to Aklasor1 folder. We can used cd (change directory) command to do…
Q: a. Write a command to install the package ABCD by using rpm. b. Write a command…
A: Note: Since we only answer up to 3 sub-parts, we’ll answer the first 3. Please resubmit the question…
Q: 1. Type Get-com and press the tab key a few times – what do you see happening? 2. What is the sign…
A: 2) '|' refers to multitasking or multi- user functionality. Example: mk cat.txt | dog.txt 3) ls, dir…
Q: What happens if the following command is executed to manage the garbage files? find . "(" -name A…
A: Given command is, find . "(" -name A -o -name B")" -exec rm {} \; The find command is used to search…
Q: If you accidentally delete a file and then decide you want it to be restored, what should you do
A: If you accidentally delete a file and then decide you want it to be restored, you should use a file…
Q: Write the command that can be used to perform the following: Back up the contents of the /var…
A: Since there are multiple questions posted, we will answer for first “4” questions. If you want any…
Q: -Create subversion repo -put the text file in -retrieve file -modify it replace it in repo
A: In order to place your project under version control you will need to import your existing files and…
Q: Which of the following operations are idempotent? Give reason to support your answer. i.…
A: The answer to the above-mentioned question is given below with an explanation.
Q: How can I create a script to convert SPACES into TABS between words stored in any file? The file…
A: In this question, we have to write a command line program which we will write it in Bash Script…
Q: a BASH command that concatenates the value of the variable FILENAME with the value of the variable…
A: Bash is a command language interpreter. It is widely available on various operating systems and is a…
Q: Familarize yourself with the commands cat, cut, tail, less, head, join, paste, nl, sed, grep, wc,…
A: A utility of the Linux OS are linux commands. All operations can be done with the help of commands.…
Explain briefly the following commands
a. keytool -genkey -alias sdo -keyalg RSA
b. keytool -certreq -alias sdo -file sdoCSR.cer
c. keytool -import -file sdo.cer -alias sdo –trustcacerts
d. keytool -import -alias sdo -file fromsdo.cer
Step by step
Solved in 2 steps
- Select all of the following Bash filename patterns that would only match the following filenames (i.e., no other files except these four could ever be matched by the chosen pattern(s)): syscore5a.bin syscore5b.bin syscore9b.bin syscore9a.bin O syscore (5,9) {a,b).bin O syscore{519} {a|b}.bin O syscore [59] (a, b}.bin O syscore [519] [alb].bin O syscore [59ab].bin O syscore [59] [ab].bin O syscore [5, 9] [a,b].bin O syscore (5,9}[ab].binInstructions Which attribute is displayed by the attrib command for a file that is backed up and unchanged? • V • S • R • None of these are correct < PrevLab Assignment 2: Playfair Cipher Overview: You are required to use the Playfair cipher to encrypt the message: "Butch." You will do the encryption by hand. The key for encryption is “Govern." You will need to show your work for the encryption process. Your submission should be a typed text file
- Only the Store.java files can be edited between lines 2-4 only.Name of Experiment: Permissions in Ubuntu Change the permissions Permissions can be changed with `chmod` command. Suppose you want to change the permission for a particular file or a folder, the first approach is through `chmod` command. Changing Ownership and Group Change the ownership of a file/directory Example: chown user filename Provide screenshot of you workA tar file named "male.tar" has several files. One of the files in the archive is "lonnie.yml". Writethe command that will extract ONLY the file named "lonnie.yml". The command CANNOT contain/usefilter commands such as "grep", "sed", etc. The tar file is in the directory /red/white/blue/. Yourcurrent directory is /root
- Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb Cjupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O > Run Code Task 6 Given a list named my_list. my_list = [10, 20, 30, 40, 60, 100, 2, 5] Write a python program that takes the position as an input from the user and prints the element of that position from the list. If the user's input position is not in the range, return an exception stating "Index out of range". If the user's input position is not an Ingeter number, return an exception stating "For position, please enter an Integer value". Make sure your program always prints "Program ended" at the end, no matter what happens. Hint: Use finally block Example 1: Input: 1 Output: 20 Program ended =======: Example 2: Input: 10 Output: Index out of range. 8:28 PM * 4) 1/4/2022Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb Cjupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O • Run с Code Task 10 Write a python program that finds the corresponding energy values from a list of frequency values which are taken as input from the user, using the formula, E = h * f, where h is a constant of value: 1050 Exceptions to handle: • Make sure all elements in the lists are numbers Example 1: Input: [2,3] Output: [2100, 3150] ==== Example 2: Input: [2,boss] Output: Wrong input type In [ ]: #to do OneDrive Screenshot saved Task 11 The screenshot was added to your OneDrive. Imagine Salman Khan is going to the sets of a new movie. He decides to cycle everyday on his way to the sets. For that he uses a distan finds the distance based on the present day's date, which is…Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb Cjupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O • Run Code Task 9 Write a python program that will take a string input from the user. Your task is to count the number of vowels and consonants in the string. Using try, if the number of vowels is greater than or equal to the number of consonants, then raise a runtime error. Print 'Number of vowels greater/equal to consonants. Please paraphrase.'. Otherwise, print 'The sentence will work.'. Note: a,e,i,o,u are called vowels and all the other 21 english alphabets are consonants. =====: Example 1: Input: 'his age is 10' Output: Number of vowels greater/equal to consonants. Please paraphrase. Example 2: Input: 'he is 10 years old' Output: The sentence will work. In [ ]: #to do Task…
- what would do to a folder so that only the user who created the file in the folder can delete itDownloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb C jupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O + • Run с Code Task 11 Imagine Salman Khan is going to the sets of a new movie. He decides to cycle everyday on his way to the sets. For that he uses a distance calculator which finds the distance based on the present day's date, which is asked as an input from the user. You should first take the day and then the month as your inputs. The inputs should be stored in variables named day and month .The distance calculator uses the following formula to calculate a number which dictates the number of kilometers he must cycle on his way to work. Distance = lif day<10, 5+(day*2)/month |else, 3+(day/month) Exceptions to handle: -Check for 0 division error exception in the formula -Type…Create a simple login form using Java Swing Create an RMI application with GUI that will allow users to log in and log out. Please store the credentials in a JSON file (username and password). The program will use this file to verify the user and allow them access to the application.