MCA3030 – Linux Operating System





Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

Spring 2013
Masters in Computer Application (MCA) - Semester 3
MCA3030 – Linux Operating System – 2 Credits (Book ID: B1563)
(30 Marks)
Answer All the Questions. Each question carries equal marks. (6 x 5 = 30)

1. Brief about the shells of Linux operating system.
Answer : A Unix shell is a command-line interpreter or shell that provides a traditional user interface for the Unix operating system and for Unix-like systems. Users direct the operation of the computer by entering commands as text for a command line interpreter to execute or by creating text scripts of one or more such commands.

The most influential Unix shells have been the Bourne shell and the C shell. The Bourne shell, sh, was written by Stephen Bourne at AT&T as the original Unix command line interpreter; it introduced the basic features common to all the Unix shells, including piping, here documents, command substitution, variables, control structures


2. Explain briefly about GNOME desktop.
Answer : GNOME desktop components:
GNOME core components include:

·         Control Center: This collection of applications customizes the GNOME environment.
·         gnome-panel : This application provides the tool bar and menu system to launch applications and host panel applets. Panel also interfaces with session manager (gnome-session) when exiting the desktop. Panel also interfaces with session-manager when exiting the desktop and managing "saved" sessions when launching the desktop.
·         nautilus : Manages desktop icons and provides a file manager.
·         gdm : GNOME Display

3. Write note on the following:

a) Encryption
Answer :  In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can.[1]:374 In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able


b) Signatures
Answer : A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, such that the sender cannot deny having sent the message (authentication and non-repudiation) and that the message was not altered in transit (integrity). Digital signatures are commonly used for

4. What is directory? Discuss different directories of Linux File system.
Answer : Linux file system and directory structure
Several major directories are associated with all modern Unix/Linux operating systems. These directories organize user files, drivers, kernels, logs, programs, utilities, and more into different categories. The standardization of the FHS makes it easier for users of other Unix-based operating systems to understand the basics of Linux. Every FHS starts with the root directory, also known by its label, the single forward slash (/). All of the other directories shown in Table are subdirectories of the root directory. Unless they are


5. Explain the various database applications used in Linux.

Answer : Open Source Databases

Even as Linux has garnered support by all of the major commercial database vendors, the freely available open source databases have grown in sophistication and features. Below follows a partial list of some of the more popular of these.
Please Note, in addition to the listings

6. What are the uses of digital signatures? How can it be generated?
Answer : What Is a Digital Signature?

Digital signature is a process that guarantees that the contents of a message have not been altered in transit.

When you, the server, digitally sign a document, you add a one-way hash (encryption) of the message content using your public



Dear students get fully solved assignments
call us at :- 08263069601 
            or
mail us at  help.mbaassignments@gmail.com

No comments:

Post a Comment

Note: only a member of this blog may post a comment.