Try the Linux commands listed below. Post your thoughts about how to use these commands. Discuss options that you might use with them, compare and contrast them and/or ask questions about commands you are not sure about.
mount and umount
more and less
head and tail
grep
kill / xkill / pkill / killall
su and sudo
man and whatis
ping and traceroute
In: Computer Science
1. Generate a nmap command with the following options:
- Polite Scan
- Store the results in a grep-able format (use the name: targets)
- The 25 top ports
- Do not ping the scanned targets
- Target network: 192.168.10.0/24
2. The tool which allows you to script up nmap scans such as vulnerability scans, network discovery, exploitation, etc. is called the ____ ____ ____ (NSE).
In: Computer Science
Describe briefly how Hydra digests food and removes waste from itself.
In: Biology
Second Price sealed bid-auction: Assume n players are bidding in an auction in order to obtain an indivisible object. Denote by vi the value player i attaches to the object; if she obtains the object at the price p her payoff is vi −p. Assume that the players’ valuations of the object are all different and all positive; number the players 1 through n in such a way that v1 > v2 > · · · > vn > 0. Each player i submits a (sealed) bid bi . If player i’s bid is higher than every other bid, she obtains the object at a price equal to the second-highest bid, say bj , and hence receives the payoff vibj . If some other bid is higher than player i’s bid, player i does not obtain the object, and receives the payoff of zero. If player i is in a tie for the highest bid, her payoff depends on the way in which ties are broken. A simple (though arbitrary) assumption is that the winner is the player among those submitting the highest bid whose number is smallest (i.e. whose valuation of the object is highest). (If the highest bid is submitted by players 2, 5, and 7, for example, the winner is player 2.) Under this assumption, player i’s payoff when she bids bi and is in a tie for the highest bid is vi − bi if her number is lower than that of any other player submitting the bid bi , and 0 otherwise. Date: 1st April, 2019. 1 (a) Formulate this situation as a strategic (normal-from) game. (b) Find a pure strategy Nash equilibrium in which player 1 obtains the object. (c) Find a pure strategy Nash equilibrium in which player n obtains the object. (d) Show that bidding own valuation is a weakly dominant strategy for each player. (e) Find ALL pure strategy Nash equilibria of this game when n = 2.
In: Economics
A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. What is CDP protocol? Why would the network administrator issue this command if the ping failed between the two routers?
You have been hired at AABC Inc. to help with an important network project. The network administrator has given you the internal IP address of 192.168.10.0/24 that need to have access to the corporate server at the IP address 209.165.200.254 across a router R1 that running dynamic NAT. Please provide your answers to the following sub-questions:
1. How many hosts can this internal IP addresses provide?
2. Please identify what is NAT?
3. How many types of NAT to your knowledge?
4. What are the advantages and disadvantages of NAT?
5. What will be the actions that are involved when an internal host with IP address 192.168.10.10 attempts to send a packet to and external server at the IP address 209.165.200.254 across a router R1 that running dynamic NAT. (10 marks
In: Computer Science
The drawing shows an ideal gas confined to a cylinder by a massless piston that is attached to an ideal spring. Outside the cylinder is a vacuum. The cross-sectional area of the piston is A = 2.50 × 10-3 m2. The initial pressure, volume, and temperature of the gas are, respectively, P0, V0 = 6.00 × 10-4 m3 and T0 = 273 K, and the spring is initially stretched by an amount x0 = 0.090 m with respect to its unstrained length. The gas is heated, so that its final pressure, volume, and temperature are Pf, Vf and Tf and the spring is stretched by an amount xf = 0.12 m with respect to its unstrained length. What is the final temperature of the gas?
In: Physics
The drawing shows an ideal gas confined to a cylinder by a massless piston that is attached to an ideal spring. Outside the cylinder is a vacuum. The cross-sectional area of the piston is A = 2.50 × 10-3 m2. The initial pressure, volume, and temperature of the gas are, respectively, P0, V0 = 6.00 × 10-4 m3 and T0 = 273 K, and the spring is initially stretched by an amount x0 = 0.092 m with respect to its unstrained length. The gas is heated, so that its final pressure, volume, and temperature are Pf, Vf and Tf and the spring is stretched by an amount xf = 0.14 m with respect to its unstrained length. What is the final temperature of the gas?
In: Physics
A gambler plays a dice game where a pair of fair dice are rolled one time and the sum is recorded. The gambler will continue to place $2 bets that the sum is 6, 7, 8, or 9 until she has won 7 of these bets. That is, each time the dice are rolled, she wins $2 if the sum is 6, 7, 8, or 9 and she loses $2 each time the sum is not 6, 7, 8, or 9 and she keeps playing like this until she's won 7 times.
a. What's the probability she places a total of 12 bets?
b. What's her expected winnings when she stops?
In: Statistics and Probability
You are about to play a series of 9 chess games online against an opponent called EliteChampion. The first to win 5 games wins the series. (Ignore the possibility of a draw.) You know that EliteChampion is most likely your friend, Jenna. There’s a 20% chance EliteChampion is your Mom, and that’s the only other possibility. You beat your Mom 70% of the time, but you only beat Jenna 40% of the time. Given that you won the first game, what is the probability you will win the series? Give an exact answer and also give a numerical approximation, correct to four decimal places.
In: Statistics and Probability
You are given a block of IP address 200.128.1.0/24. Create a
network with four subnets
each having equal number of addresses. Connect two nodes in each
subnet and configure the
arrangement so that any node is able to communicate with the
remaining nodes (within the
subnet as well as in other subnets). Identify and analyze the
configuration requirements. Verify
the communication setup and reach ability with Ping diagnostic
command.
Your report should include the following:
i. Network diagram (screenshots),
ii. Explain what devices are used for the setup of the network,
explanation of IP addresses
used for the setup, routing tables, connected routes, static
routes, default routes and any
other configuration required
iii. Confirm the configuration is achieved according to the plan
(commands, screenshots)
iv. and finally Verify that the two computers can communicate with
each other using
reachability tests (screenshots),
In: Computer Science