Linux 1. Fish Tar Please provide the command to create a tar archive named fish.tar.gz that contains all files from the "fish directory. Be sure the resulting file is compressed. 2. Connections Exhausted You are responsible for a server program that has been written to handle 5000 parallel open connections and requests. Unfortunately, at around 1000 connections, it stops accepting new connections. No CPU or RAM limits have been hit, and the server continues to be underutilized, but the program still stops around 1000 connections. Describe the methods and procedures you would use to troubleshoot. Include commands and theories as to what may be the root cause. 3. Bash my Keyboard Bash, KSH, and CSH are all examples of what? How does one change their preference for one vs another? 4. System Examination Provide examples of 4 commands and arguments that can be used to examine utilized system resources on a linux machine. Explain what each one does. 5. OpenSSH Authentication Describe the process for enabling public key authentication to a user account on linux. Explain the difference between the two keys utilized. 4. Lists of Lists Implement a python3 code snippet that iterates a list of lists. For each inner list encountered, print a header that says "List X where X is the number of the inner list i.e. "List 1... List 5"). After the List X header, print the sum of all items in the inner list. Do this for all inner lists contained in the outer list. 5. Mutually Exclusive Access Write a python3 function called increment_count" that takes one argument names "by. Whatever value is passed in via the "by" argument should be added to a global variable "the_count". Before exiting, a global variable named "last_by" should be updated with with the value that was passed in via the "by" argument. This function should be THREAD SAFE and utilize a global Lock variable defined outside the function to isolate the update of both "the_count" and "last_by" in the same exclusive access block. Extra credit for utilizing python3 context management protocol, which is supported by Locks in this scenario