Professional Documents
Culture Documents
BCSL063 Assignment
BCSL063 Assignment
5
Note: Answer all the questions in the assignment having 40 marks in total. 10 marks are for
0
viva voce. You may use illustrations and diagrams to enhance the explanations. Please go
909
through the guidelines regarding assignments given in the Programme Guide for the
format of presentation. Make suitable assumption if necessary.
Q1. (8)
922
(a) Write a shell program to swap the values of "x" and "y", given at the command prompt.
(b) Configure a DNS Server as a root name server in Windows 2000 Server. Explain with step by
step procedure.
Q2. (8)
-99
(a) Write a shell script to delete the files of "mpeg" or "mp3" from a user's home directory, as a
system administrator.
(b) As a Windows 2000 Administrator, enable and configure IPsec policy on local computer. Also,
enable it for entire domain. Explain with step by step procedure.
DF
Q3. (8)
(a) Write a shell script to delete all files from a folder which are having numeric digit in the file
name.
RP
(b) As a Windows 2000 Administrator, enable and configure IPsec policy on local computer. Also,
enable it for entire domain. Explain with step by step procedure.
Q4. (8)
(a) In Unix/Linux system, access your account available at a remote machine. Download a file from
HE
the remote location, modify that file and upload back to the remote machine.
(b) Configure a TCP/IP setting in UNIX/LINUX, Dynamic allocation of IP address need to be used.
Also configure the DHCP settings. Explain with step by step procedure.
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
BCSL-063
5
SOLVED ASSIGNMENT 2023-24
0
909
922
Q.1 - (a) Write a shell program to swap the values of "x" and "y", given at the
-99
command prompt.
ANS.- Here's a simple shell script in Bash to swap the values of "x" and "y" given as command-
line arguments:
DF
RP
HE
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
0 5
Save this script to a file (e.g., swap.sh), make it executable with chmod +x swap.sh, and then
909
run it with two values you want to swap like this:
922
-99
(b) Configure a DNS Server as a root name server in Windows 2000 Server.
Explain with step by step procedure
DF
ANS.- Configuring a DNS Server as a root name server in Windows 2000 Server involves several steps.
Please note that Windows 2000 Server is quite outdated and no longer supported by Microsoft. For
modern scenarios, you should use a more recent Windows Server version. However, if you still need to
RP
configure DNS on Windows 2000 Server for educational purposes, here's a high-level step-by-step
procedure:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
In the DNS Management Console, right-click the server name and select "New
Zone".
Choose "Primary zone" and select "Store the zone in Active Directory".
Name the zone as "." (a single dot) which represents the root zone.
0 5
Allow updates as desired.
909
4. Create NS Record:
Inside the root zone, create a new "New Host (A or AAAA)" record.
922
Enter the IP address of your DNS server.
Create another record, this time choose "Name Server (NS)" and leave the name
-99
blank.
Add the name of your DNS server as the server hosting this NS record.
5. Configure Forwarders:
DF
Enter the IP addresses of other DNS servers (typically your ISP's DNS servers) to
which queries can be forwarded if not resolved locally.
HE
Use tools like "nslookup" or "dig" to verify that your DNS server responds to
queries for various domains.
OT
Remember that DNS configurations can be complex, and the steps above might vary slightly
based on your exact environment and requirements. Additionally, Windows 2000 Server is
highly outdated, and for modern usage, you should consider using a more recent version of
Windows Server.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
Q.2 - (a) Write a shell script to delete the files of "mpeg" or "mp3" from a user's
home directory, as a system administrator.
ANS.- Shell script to delete "mpeg" or "mp3" files:
Here's a shell script that you can use to delete files with the extensions "mpeg" or "mp3" from a
user's home directory. Please exercise caution when using scripts that involve file deletion, as
5
you can accidentally delete important files.
0
909
922
-99
Save this script to a file (e.g., delete_media_files.sh), give it execute permissions (chmod +x
delete_media_files.sh), and then run it with superuser privileges (sudo
DF
./delete_media_files.sh). It will search for and delete files with the extensions "mpeg" or
"mp3" within the user's home directory.
RP
Remember that running scripts with administrative privileges should be done carefully to avoid
unintended consequences.
HE
(b) As a Windows 2000 Administrator, enable and configure IPsec policy on local
OT
computer. Also, enable it for entire domain. Explain with step by step
procedure.
ANS.- Enabling and Configuring IPsec Policy on Windows 2000:
Enabling and configuring IPsec policies on Windows 2000 involves several steps. Please note
that Windows 2000 is quite old and may not be supported anymore. Additionally, configuring
IPsec policies can be complex and may require careful planning to avoid disrupting network
communication. Here's a general outline of the steps:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
In the Local Security Settings window, expand Security Policies and click on IP
Security Policies on Local Computer.
0 5
In the right pane, click Action and then Create IP Security Policy.
909
Follow the wizard to create a new policy. You'll need to specify conditions,
authentication methods, encryption methods, etc.
922
Right-click on the newly created policy and select Assign.
Go to the General tab and check the box that says Activate the default response
DF
rule.
5. Enforce Policy:
RP
Follow the wizard to create a rule for enforcing the policy. You can choose the
filter lists, filter actions, etc.
HE
If you want to enable IPsec for the entire domain, you can use Group Policy:
OT
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
Please note that these steps are very general and may not cover all the intricacies of
configuring IPsec on Windows 2000. Additionally, given the age of Windows 2000, you might
encounter compatibility issues or security vulnerabilities. It's recommended to consider
upgrading to a more modern and supported operating system if possible.
0 5
909
Q.3 - (a) Write a shell script to delete all files from a folder which are having
numeric digit in the file name.
ANS.- Sure, here's a shell script that will delete all files from a folder that have a numeric digit
922
in their file name:
-99
DF
RP
HE
Replace "/path/to/your/folder" with the actual path to the folder containing the
OT
files you want to delete. Please be cautious while running this script, as it will
permanently delete the files.
(b) As a Windows 2000 Administrator, enable and configure IPsec policy on local
computer. Also, enable it for entire domain. Explain with step by step procedure
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
ANS.- a general outline of the steps you might need to follow to enable IPsec policy on a Windows
system:
Find and open the "Local Security Policy" or "Local Security Settings" option.
0 5
2. Create an IPsec Policy:
909
In the IPsec Policy Management Console, right-click on "IP Security Policies on
Local Computer" and select "Create IP Security Policy."
922
methods, encryption methods, and more.
After creating the policy, right-click on the policy and select "Assign."
-99
4. Configure IPsec for Domain:
For configuring IPsec for the entire domain, you might need to use Group Policy:
DF
Create or edit a Group Policy Object (GPO) that applies to the desired
RP
Right-click and create a new IP Security Policy, then configure the settings
similarly to the local policy.
Please note that Windows 2000 is not only outdated but also highly insecure due to lack of
OT
updates and security patches. It's strongly recommended to upgrade to a more modern and
supported operating system to ensure the security of your network and data.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
To access your account on a remote machine, download a file, modify it, and upload it back,
you can use secure shell (SSH) for remote access and file transfer. Here's a step-by-step
procedure:
1 Access Remote Machine: Open your terminal and use the following command to access
5
the remote machine using SSH. Replace username with your actual username and
0
remote_machine_ip with the remote machine's IP address.
909
922
2 Navigate to File Location: Navigate to the directory where the file you want to download is
located. Use standard Unix/Linux commands like cd to change directories and ls to list files.
3 Download the File: Use scp (secure copy) command to download the file to your local
-99
machine. Replace remote_file_path with the actual path to the remote file and
local_destination with your desired local directory.
DF
RP
4 Modify the File: Use your preferred text editor to modify the downloaded file. For
example, you can use nano, vim, or gedit.
HE
5 Upload the Modified File: After making changes, use scp to upload the modified file back
to the remote machine.
OT
6 Exit Remote Session: Once you're done, exit the remote session by typing:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
5
(b) Configure a TCP/IP setting in UNIX/LINUX, Dynamic allocation of IP address
0
need to be used.
909
Also configure the DHCP settings. Explain with step by step procedure
ANS.- Configuring Dynamic IP Address Allocation and DHCP:
922
Configuring dynamic IP address allocation using DHCP involves configuring the DHCP server and
client settings. Here's a general procedure:
2. Edit DHCP Server Configuration: Configure the DHCP server by editing its configuration
DF
file. The file location may vary based on your distribution. Typically, it's located at
/etc/dhcp/dhcpd.conf.
RP
3. Configure DHCP Pool: In the configuration file, define a DHCP pool with the range of IP
addresses you want to allocate dynamically. Also, set other options like subnet mask,
gateway, DNS servers, etc.
4. Start DHCP Server: Start the DHCP server service using a command like:
HE
OT
1. Configure Network Interface: Edit the network configuration file for the desired
network interface, which is often located at /etc/network/interfaces.
2. Enable DHCP: Configure the network interface to use DHCP by setting it to "dhcp" or
"auto" mode. An example line in the configuration file might look like:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
3.
Restart Network Service: Restart the network service to apply the changes:
0 5
909
922
4. Renew IP Address (Optional): If needed, you can renew the IP address manually on the
client side using the dhclient command:
-99
DF
Remember that specific steps might vary depending on your Unix/Linux distribution. Always
consult your distribution's documentation for accurate and up-to-date information.
RP
(a) To create a file name hello.dat and write "hello world" as file contents and
HE
the file:
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY
IGNOU ALL SOLVED ASSIGNMENT PDF MASSAGE ON WHATSAPP- 99922-90905
0 5
909
(c) To count no. of lines in a given text file.
ANS.- To count the number of lines in a given text file (replace <filename> with the actual file
922
name):
-99
DF
with actual values or paths according to your requirements. Also, ensure that
you have the necessary permissions to perform these actions in the specified
locations.
SOLVED GUESS PAPER WITH IMP. QUE. ANS PDF/ PROJECTS / HAND WRITTEN HARD COPY