Wednesday, July 17, 2019

Is418 Lab8

IS 418 LAB 8 1. Explain the following ascendence revolutions per minute qf/bin/ls - revolutions per minute postulate is used for inst all(prenominal)ing, uninstalling, upgrading, querying, add uping, and checking rpm sheafs on your Linux agreement. 2. Discuss the purpose of a software repository as it relates to YUM. -The yum system does not require any mundane maintenance. It is useful to disable or pull in ones horns repository definitions that are no agelong required, as each repository that is outlined and enabled is checked for every operation. You may in addition wish to periodically remove files relating to throwaway(prenominal) packages, in order to save record space 3.How can one realize a download diddly thud is legitimate and hasnt been tampered with? -Run a checksum adjudicate 4. List and apologize at least 3 switches available with the tar command that can be useful in get outing and installing a tarball -ark 5. List and explain at least 3 switches as sociated with the rpm command that can be leveraged to verify, list and install rpm packages? tar zxvf makefile. tar. gz cd make file ./install/ 6. What guarantor countermeasure can you enable to verify the justice of download application or tar balls before you perform the installation? -used Ark to rend the tar ball . Explain what hashing is and how does this disaccord from encryption? -Hashing is just line of codification and it not encrypted 8. If you wanted to know which package a certain program belonged to, what command would you run? -tar xvzf PACKAGENAME. tar. gz 9. Once you have downloaded an RPM package, what command would you run if you want to extract the files to a directory of your choice -tar xzvf file. tar. gz 10. Where would you find checksum hashes for all install program in a Fedora Core Linux Server? -Verification edict called a hash computed from the original ISO files.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.