Do not forget to show visual evidence (screenshots) of the main actions you took to answer the questions.Before every command, display the time

Do not forget to show visual evidence (screenshots) of the main actions you took to answer the questions.

Before every command, display the time using the “date” command and make sure it shows on your screen capture. Save them in a document file named “Question2_YourName.docx” and submit the file under this question.

You may perform the tasks in this question on any Linux system.   

1. Use the dmesg utility to tell me how much total memory you have installed on your Linux machine, and how much is currently available.   

2. In a Linux OS, what types of files are located in the /proc directory?   

3. Use the cat utility to display the content of /proc/meminfo. What is the total configured swap disk size, and how much is free currently? What does the “Dirty” field represent?   

4. What two attribute values from the output from q. 3 should a system administrator be monitoring constantly in order to avoid being surprised by a system crash?   

5. Use the privilege command “dmidecole –type 17” to display information about your RAM module. Who is the manufacturer of your RAM module?   

6. Use the “free” command to display your physical memory and your virtual memory capacities.

7. Use the privilege command “vmstat –slabs” to display your virtual memory and paging statistics. 

8. When the swap memory is used by the system, what is the implication on the system performance, as compared to when there is no need to use it? Do not forget to show visual evidence of the main actions you took to answer the questions.

Upload 

Choose a File

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Write a 3 to 4page review of Gail Industries security and infrastructure policies and practices and formulate recommendations for improvements.

Write a 3- to 4-page review of Gail Industries’ security and infrastructure policies and practices, and formulate recommendations for improvements. Include the following:Details and background of the organization’s existing policies, practices, and infrastructure used to protect intellectual and physical assets—including such areas as firewalls, passwords, encryption, physical security, and security

Outsourced (2006) – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

Employment rights Industrial action UK

You have to talk about right to strike in the UK and pick cases to support your view / argument We need comment on the current UK law relating to industrial action, with particular reference to the called ‘right to strike’. What law does UK has for industrial action i.e

The Baby-Friendly Hospital Initiative (BFHI) is a global initiative of the World Health Organization (WHO) and the United Nations Children’s Fund (UNICEF), (PH, 2019).

Sandra Lewis Re: Topic 5 DQ 2 The Baby-Friendly Hospital Initiative (BFHI) is a global initiative of the World Health Organization (WHO) and the United Nations Children’s Fund (UNICEF), (PH, 2019). Their aim is to improve health outcomes for mothers and babies through breastfeeding and immediate skin-to-skin bonding. Through successful

For this Critical Thinking assignment, you will apply counting techniques

  For this Critical Thinking assignment, you will apply counting techniques to real-world scenarios. A random password generator is a computer program, hardware device, or online tool used to generate passwords using a set of parameters like length, letters, numbers, symbols, and strength (Nicholas, 2016). Suppose that you want to

In addition to reading the Announcements, prepare for this discussion

In addition to reading the Announcements, prepare for this discussion by reading the Required Resources, the Week Six Instructor Guidance, and complete the Comprehensive Evaluation Report for Manuel. Initial Post: You have had a chance to see how a Comprehensive Evaluation Report can be a powerful tool to help guide

Based on the supplemental reading, come up with an example

Based on the supplemental reading, come up with an example or use-case that would illustrate the 6 ways of using data/analytics as outlined in the reading.  This can be an actual example of a company/product in which you are a loyal customer; Or this could be a hypothetical example of

Watch the documentary PS Dance. (This hour-long documentary is linked

Watch the documentary PS Dance. (This hour-long documentary is linked above, and again here. You can also find it in the Kanopy database through the MTSU James Walker Library). Visit the National Dance Education Organization website, and look at the sections on professional development, online education, and advocacy. Write a minimum

Lysistrata question: The battle between men and women is timeless.

Lysistrata question: The battle between men and women is timeless. Consider how the battle of the sexes has changed from when Aristophanes wrote the play and now. What is your impression of Lysistrata? Is she a likeable character? Why/why not? Do you believe that her plan makes her a hero?

 Instructions Write the conclusion, Section V, as well as Section IV,

 Instructions Write the conclusion, Section V, as well as Section IV, Parts D and E of your final project. Combine these with your revised work from all previous milestones and submit your comprehensive case study analysis. Your final submission should be a comprehensive, refined artifact containing all of the critical

Develop a computer/Internet security Policy : You have been hired as

Develop a computer/Internet security Policy : You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas: Computer and email acceptable use policy Internet acceptable use policy NOTE:

I need you to describe these two personality test reports

I need you to describe these two personality test reports and make two reports (each one report must contain 500 words)  report must containe for them separately. 1 st personality test =  report with 500 words and 2nd personality test = report with 500 words .  I hope you understand