2020 ISS332 Systems Administration EXAM ASSIGNMENT PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

UNIVERSITY OF BOTSWANA

DEPARTMENT OF COMPUTER SCIENCE


ASSIGNMENT - 2019/2020, SEMESTER II

COURSE NO: ISS332

TITLE: SYSTEM ADMINISTRATION

DEADLINE: 17 JULY 2020 @5PM

INSTRUCTIONS:.
 ANSWER ALL QUESTIONS IN ALL THE THREE (3) SECTIONS.
 EACH SECTION IS WORTH 25 MARKS. TOTAL MARKS 75.
 NUMBER OF PAGES IN THIS PAPER IS 4, INCLUDING THE COVER PAGE.
 START YOUR ANSWERS FOR EACH SECTION ON A NEW PAGE IN THE
ANSWER BOOK
SECTION A: 25 Marks

1. The industry and the academics use the terms network administration and
system administration both variably and inconsistently. These terms though, they
exist separately. Differentiate between the two terms. (2 marks)

2. As part of a system administrator’s job, he is responsible of building hardware


configurations and to configure software systems. Each of these tasks has its
own challenges but you cannot view the tasks in isolation. List four constraints
presented by these tasks. (4 marks)

3. System administrators have to understand how data flow from machine to


machine and understand how the machines affect each other. However in some
countries (like Botswana) they are issues when trying to configure the
input/output hardware and software. Consider the different types of keyboards
available in Botswana, list the types of keyboards available, explain and justify
why using these keyboards is a hindrance. You might need to treat each
keyboard type separate when answering this question. (6 marks)

4. Write a script which will be used for monitoring the amount of disk space used by
each user and send a warning to users which exceed a fixed quota. If a user has
exceeded the quota the script should display the name of each ordinary file in the
user’s home directory (disk space allocated directory) and invites the user to
decide interactively whether or not to delete some of the files in order to avail
space. The user might have created sub-directories and therefore the script
should also ask the user if the "Interactive file deletion" should be applied
recursively to sub directories. Run the script and provide evidence of the output
of the script or in the script capture some of the output of your work and provide
that as evidence, both the output of the script and the script should be copied into
the file you will be submitting for marking. (10 marks)

5. Describe why ethics and human values are important? (3 marks)


SECTION B: 25 Marks

1. At the beginning of the University of Botswana semester, there are hundreds of


new students enrolled which require an account. Imagine that you are working
with the UB-IT team and you are required to create accounts for the new
students. You have been provided with a list of users by the university
registration service. Write an adduser script which uses the Linux filesystem
layout that you have planned for your host to install home-directories for the
users and to register them in the password database. The script should use the
file which has been provided by the registration service. Run you script and
capture the output or in the script capture some of the output of your work and
provide that as evidence of your work. You can send the output to a file which
you can later on copy together with the code into the file that you will be
submitting for marking. (10 marks)

2. Explain why sometimes it is better to use a shell or command line interpreter as


opposed to a graphical user interface. (3 marks)

3. Inexperienced users often view having a privileged/administrator/root account as


a form of status. On the other hand experienced users view it differently. Justify
your answers. (4 marks)

4. Explain how patterns of user behavior have a direct and measurable effect on a
computer system? Explain your answers using a scenario. (5 marks)

5. Explain how laptops and mobile devices can compromise security? (3 marks)
SECTION C: 25 Marks

1. How do startup and shutdown procedures differ between Unix-like systems and
Windows-like systems? (6 marks)

2. Imagine the situation in which you install every independent software package in
a directory of its own. Write a script which builds and updates the PATH variable
for users automatically, so that the software will be accessible from the command
shell. (6 marks)

3. If you were to choose between compiling a critical piece of software yourself, or


installing it as a software package from your vendor or operating system
provider, what choice will you make? What criteria did you use to make the
decision? What are the issues surrounding your choice? (6 marks)

4. Discuss how you can determine the identity of another person. Is it enough to
see the person? Think about if a DNA test is sufficient. How can you tell if a
person’s body has not been taken over by aliens, or they have not been
brainwashed by a scientist while doing experiments? Note: You should think
carefully about the problem of authentication. (7 marks)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy