Osymp
Osymp
PROJECT REPORT
ON
“TO STUDY DETAILS ABOUT LINUX UTILITIES’’
FOR THE DIPLOMA IN COMPUTER ENGINEERING
SUBMITTED BY
KUNAL DIPAK DANDGE (2211520043)
ADESH SHIVAJI DHABADKAR (2211520046)
SACHIN RAMESHWAR GUNJAL(2211520057)
AND
MAHARASHTRA STATE BOARD OF
TECHNICAL EDUCATION, MUMBAI
A
MICRO-PROJECT REPORT
ON
We would like to express our thanks to the people who have helped us most
throughout our project. We would like to express our sincere thanks to the principal
of CSMSS College of Polytechnic Dr. Ganesh B. Dongre for being always with us
as a motivator. We are thankful to the H.O.D. of Computer Engineering Department
Mrs.R.S.Pophale for her kind support. We are grateful to our Project Guide Ms.S.A.
Samrat for nonstop support and continuous motivation for the project. Her help
made us possible to complete our project with all accurate information. A special
thanks of our goes to our friends who helped us in completing the project, where
they all exchanged their own interesting ideas.We wish to thanks our parents for
their personal support or attention who inspired us to go our own way. Finally, we
would like to thank God who made all things possible for us till the end.
SR.NO ENROLLMENTNO. NAME OF STUDENT
1 2211520043 DANDGE KUNAL DIPAK
2 2211520046 DHABADKAR ADESH SHIVAJI
3 2211520057 GUNJAL SACHIN RAMESHWAR
Ms.S.A. Samrat
(Project
Guide)
INDEX
1 MICRO-PROJECT PROPOSAL 01
3 COURSE OUTCOME 01
4 PROPOSED METHODOLOGY 01
5 ACTION PLAN 02
6 RESOURCE USED 03
7 RATIONALE 04
8 LITERATURE REVIEW 05
11 SKILL DEVELOPMENT 13
12 APPLICATIONS 13
MICRO-PROJECT PROPOSAL
TITLE OF MICRO-PROJECT:- COMPONENTS OF OPERATING
SYSTEM
Benefits:-
Open Source: Linux is distributed under an open-source license, which means it is free to use, modify,
and distribute. This encourages collaboration and innovation in the development community.
Stability: Linux is known for its stability and reliability. It often runs for extended periods
without needing a reboot, making it suitable for server environments and critical systems.
Security: Linux is less susceptible to viruses, malware, and other security threats compared to some other
operating systems. Its robust permission system and frequent security updates contribute to its security.
Customization: Linux offers a high degree of customization, allowing users to tailor their system to their
specific needs. This is particularly valuable for developers and advanced users.
d. Apply scheduling algorithms to calculate turnaround time and average waiting time.
Planned
Planned Name of
Sr. Finish
No. Details of activity Responsible
Start date
date Team Members
Select the topic about
1. 15.08.2024 25.08.2024 ALL
the micro-project.
Collect information
2. about our topic. 26.08.2024 29.08.2024 ALL
To prepare project
5. Report 25.09.2024 30.10.2024 ALL
5.0 RESOURCES REQUIRED:
2. Internet Youtube/Google
3. Textbook/Manual Operating 1
System
Approved by
Mrs.S.A. Samrat
3
Micro-Project Report
TITLE:- TO STUDY DETAILS ABOUT LINUX UTILITIES
1.0 RATIONALE
An Operating System is basically a system program that controls the execution of application
programs and acts as an interface between applications and the computer hardware. It manages the computer
system resources to be used in an efficient manner. This course enables to learn internal functioning of
operating system and will help in identifying appropriate Operating System for given applications/task. This
course is also a prerequisite for the group of courses included in 'Cloud Infrastructure Maintenance' Elective
group.
Benefits:-
Open Source: Linux is distributed under an open-source license, which means it is free to use, modify,
and distribute. This encourages collaboration and innovation in the development community.
Stability: Linux is known for its stability and reliability. It often runs for extended periods
without needing a reboot, making it suitable for server environments and critical systems.
Security: Linux is less susceptible to viruses, malware, and other security threats compared to some other
operating systems. Its robust permission system and frequent security updates contribute to its security.
Customization: Linux offers a high degree of customization, allowing users to tailor their system to their
specific needs. This is particularly valuable for developers and advanced users.
The theory, practical experiences and relevant soft skills associated with this course are to be taught and
implemented, so that the student demonstrates the following industry oriented.
COs associated with the above mentioned competency:
d. Apply scheduling algorithms to calculate turnaround time and average waiting time.
4
LITERATURE REVIEW:
Linux provides a powerful command-line interface compared to other operating systems such as
Windows and MacOS. We can do basic work and advanced work through its terminal.
We can do some basic tasks such as creating a file, deleting a file, moving a file, and more. In
addition, we can also perform advanced tasks such as administrative tasks (including package
installation, user management), networking tasks (ssh connection), security tasks, and many more.
Linux terminal is a user-friendly terminal as it provides various support options. To open the Linux
terminal, press "CTRL + ALT + T" keys together, and execute a command by pressing the 'ENTER' key.
ACTUAL METHODOLOGY FOLLOWED :
Linux utilities are essential command-line tools designed to perform various tasks efficiently and
effectively in a Linux environment. These utilities provide powerful functionality for tasks such as file
management, text processing, system administration, network diagnostics, and more.
A utility of the Linux OS is the Linux Command. All primary and advanced tasks can be done by
executing commands. The commands are performed on the Linux terminal. The terminal is a command
line similar to the command prompt in Windows OS. Commands in Linux are case-sensitive.
Linux utilities are command-line tools that perform a variety of tasks, including:
File management: Tasks like creating, deleting, and moving files
Text processing: Tasks like searching for text patterns in files
System administration: Tasks like package installation and user management
Network diagnostics: Tasks like configuring network interfaces and testing network connectivity
Linux utilities are command-line tools that allow users to perform a variety of tasks on the operating
system. Here’s a brief overview of some commonly used ones:
Each of these utilities has its own options and flags to extend functionality, which you can check using man
<command> to explore them further.
Here's a rundown of some of the most common Linux utilities with examples to demonstrate their usage:
1. ls
Lists files and directories in the current directory.
Example:
ls
ls -l # Lists with detailed information
ls -a # Lists all files, including hidden files
2. cd
Changes the current directory.
Example:
cd /home/user/documents
cd .. # Moves up one directory level
3. pwd
Prints the path of the current working directory.
Example:
pwd
4. cp
Copies files or directories.
Example:
cp file1.txt /backup/ # Copies file1.txt to /backup/
cp -r dir1 /backup/ # Copies directory dir1 to /backup/
5. mv
Moves or renames files and directories.
Example:
mv file1.txt /backup/ # Moves file1.txt to /backup/
mv oldname.txt newname.txt # Renames file
6. rm
Deletes files or directories.
Example:
rm file1.txt # Deletes file1.txt
rm -r dir1 # Deletes directory dir1 and its contents
rm -i file.txt # Prompts for confirmation before deleting
7. cat
Displays the contents of a file.
Example:
cat file1.txt # Shows the content of file1.txt
8. nano / vim
Opens a text editor to edit files in the terminal.
Example:
nano file1.txt # Opens file1.txt in Nano editor
vim file1.txt # Opens file1.txt in Vim editor
9. grep
Searches for patterns within files.
Example:
grep "hello" file1.txt # Searches for "hello" in file1.txt
grep -i "hello" file1.txt # Case-insensitive search
10. find
Searches for files and directories.
Example:
find / -name "file1.txt" # Searches for file1.txt from root
find . -type d # Searches for directories in the current path
11. chmod
Changes the permissions of files or directories.
Example:
chmod 755 file1.txt # Sets rwxr-xr-x permissions on file1.txt
chmod +x script.sh # Adds execute permission to script.sh
12. chown
Changes the owner of files or directories.
Example:
chown user:group file1.txt # Changes owner to user and group
14. df
Shows disk space usage of filesystems.
Example:
df -h # Shows disk usage in human-readable format
15. du
Estimates file and directory space usage.
Example:
du -h file1.txt # Shows the space used by file1.txt
du -sh * # Shows total space usage of each item
16. ps
Lists currently running processes.
Example:
ps aux # Shows all running processes with detailed info
17. kill
Terminates running processes by process ID.
Example:
kill 1234 # Kills the process with PID 1234
kill -9 1234 # Force kills the process
18. tar
Compresses and decompresses files into tarballs.
Example:
tar -cvf archive.tar file1.txt # Creates archive of file1.txt
tar -xvf archive.tar # Extracts files from archive.tar
20. ifconfig / ip
Configures network interfaces and displays network information.
Example:
ifconfig # Shows all network interfaces and info
ip addr # Displays IP addresses
21. ssh
Connects to remote servers securely.
Example:
ssh [email protected] # Connects to server.com as user
22. man
Displays the manual for other commands.
Example:
man ls # Shows the manual page for the ls command
6.0 ACTUAL RESOURCES USED:
APPLICATIONS OF MICROPROJECT
1. Security: Keeps the system and applications safe through authorization
2. Secondary storage management: Manages devices that store data without power, like hard
disk drives and solid-state drives
3. File management: Creates, locates, and shares files
4. Error handling: Detects and resolves errors in the system, such as device failures, power
outages, and program bugs
5. Input/output operations: Manages input and output devices, and determines the output that
results from a user's input
6. Coordination: Coordinates hardware components and allocates software to different users
13