Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Short Answer: -What are binary files? What simple quality distinguishes binary f

ID: 3736860 • Letter: S

Question

Short Answer:

-What are binary files? What simple quality distinguishes binary files from text files? What Unix/Linux command(s) can be used to identify a file as binary as opposed to text.

-In no more than 3 sentences, describe the purpose of the kernel. What kernel is our AWS server using?

-What is encryption and what is it's purpose? Demonstrate encrypting a string using sha512.

-The -r option for the remove command rmmeans to perform the action recursively. What is recursion?

-What is the purpose of the grep command? Give an example of using grep that would show every occurrence of the word “and” in the Gettysburg Address.

-Which would be more suitable for a script that converts each occurrence of the word "and" into the word "or" in the Gettysburg address, sed or tr? Give an example showing how this task would be performed using your preferred method.

-What would be the octal pattern to set the following permissions on a file: -rwxr-x--- 1 ec2-user ec2-user 0 Mar 2 23:05 permissions

-Using the date command, get the current epoch date. Then subtract one billion from it and use the date command again to show the resulting date. Write down the steps you took and the value you received.

-Network functionality in UNIX must be installed separately from the actual operating system. True or false

-To list hidden/suppressed files in a home directory, use the ls -h command. true or flase

-You can use the cat command to combine two files and redirect the output to other files. True or false

-Logic refers to a command's format and wording, as well as the options and arguments you can use to extend and modify its functions. True or false

-To determine which shell you are using in the UNIX operating system, type echo $SHELL. True or false

-The tilda (~) is used to represent the home directory when copying files. True or false

-The touch command differs from the other file processing commands because it is used with relational database processing. True or false

-The paste command normally sends its output to the screen and to capture it you would use a redirection symbol. True or false

-The cat command with the -a option updates the modification time in the catted file's datetime stamp. True or false

-Shell scripts contain ONLY commands they execute. True or false

-A common field that each of several linked files share is often referred to as a key. True or false

-When you run the wc command WITHOUT any options, you will see the count for characters and lines ONLY. True or false

-The uniq command compares ONLY consecutive lines and requires sorted input. True or false

-A pipe operator connects the output of the first command with the input of the second command. True or false

-A(n) ____ is used to create a new file or to overwrite an existing file by attaching it to a command that produces output. True or false

Explanation / Answer

Hi, As per the chegg policy, I have answered 4 Parts of the program.

Please repost others in separate post.


Q. What is encryption and what is it's purpose? Demonstrate encrypting a string using sha512.
Encryption is the method by which plaintext or any other type of data is converted from a readable form to an encoded version that can only be decoded by another entity if they have access to a decryption key. Encryption is one of the most important methods for providing data security, especially for end-to-end protection of data transmitted across networks.

Encryption is widely used on the internet to protect user information being sent between a browser and a server, including passwords, payment information and other personal information that should be considered private. Organizations and individuals also commonly use encryption to protect sensitive data stored on computers, servers and mobile devices like phones or tablets.

The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the internet or any other computer network. A number of organizations and standards bodies either recommend or require sensitive data to be encrypted in order to prevent unauthorized third parties or threat actors from accessing the data.

Sha-512

Message: abc

Encrypted message: ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f

Q. The -r option for the remove command rmmeans to perform the action recursively. What is recursion?
ANs: remove directories and their contents recursively.

Q. What is the purpose of the grep command? Give an example of using grep that would show every occurrence of the word “and” in the Gettysburg Address.
Ans: grep is a command to seach a pattern in a file or set of files (depending on the option
given by the user). By default it prints the lines containing the pattern or the text.

The relevant command for showing the occurence of "and" in Gettysburg address(say its a file
Gettysburg.txt):

grep "and" Gettysburg.txt

Q.home / study / engineering / computer science / computer science questions and answers / which would be more suitable for a script that converts each occurrence of the word "and" into ...
Question: Which would be more suitable for a script that converts each occurrence of the word "and" into th...
Which would be more suitable for a script that converts each occurrence of the word "and" into the word "or" in the Gettysburg address, sed or tr? Give an example showing how this task would be performed using your preferred method.
Ans: both sed and tr are good utils for the job
But I would prefer sed more

sed 's/and/or/g' filename

tr solution

tr 'and' 'or' < filename

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote