Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Linux 1. Fish Tar Please provide the command to create a tar archive named fish.tar.gz that contains all files from the fish directory. Be sure

image text in transcribed
image text in transcribed
Linux 1. Fish Tar Please provide the command to create a tar archive named fish.tar.gz that contains all files from the "fish directory. Be sure the resulting file is compressed. 2. Connections Exhausted You are responsible for a server program that has been written to handle 5000 parallel open connections and requests. Unfortunately, at around 1000 connections, it stops accepting new connections. No CPU or RAM limits have been hit, and the server continues to be underutilized, but the program still stops around 1000 connections. Describe the methods and procedures you would use to troubleshoot. Include commands and theories as to what may be the root cause. 3. Bash my Keyboard Bash, KSH, and CSH are all examples of what? How does one change their preference for one vs another? 4. System Examination Provide examples of 4 commands and arguments that can be used to examine utilized system resources on a linux machine. Explain what each one does. 5. OpenSSH Authentication Describe the process for enabling public key authentication to a user account on linux. Explain the difference between the two keys utilized. 4. Lists of Lists Implement a python3 code snippet that iterates a list of lists. For each inner list encountered, print a header that says "List X where X is the number of the inner list i.e. "List 1... List 5"). After the List X header, print the sum of all items in the inner list. Do this for all inner lists contained in the outer list. 5. Mutually Exclusive Access Write a python3 function called increment_count" that takes one argument names "by. Whatever value is passed in via the "by" argument should be added to a global variable "the_count". Before exiting, a global variable named "last_by" should be updated with with the value that was passed in via the "by" argument. This function should be THREAD SAFE and utilize a global Lock variable defined outside the function to isolate the update of both "the_count" and "last_by" in the same exclusive access block. Extra credit for utilizing python3 context management protocol, which is supported by Locks in this scenario

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Database Programming With Visual C# .NET

Authors: Ying Bai

1st Edition

0470467274, 978-0470467275

More Books

Students also viewed these Databases questions