1.1 If we apply the cross-product operation to these two instances of STUDENTS & BOOKS, what would be the resulting relation? (15)
STUDENTS
Student_ID Student_Name Qualification
401 Andile HCIT
402 Carol DIT
403 Amber BSc
404 Bright HCIT
BOOKS
Book_ID Title Copy-right
101 Database fundamentals 2017
102 C++ how to program 2018
103 Simply Visual Basic 2019
104 OOP for beginners 2020
1.2 SELECT and RETURN all students with qualification HCIT from relations STUDENTS X BOOKS. (10)
1.3 Write a relational algebra expression using the symbolic notation for the given question in (1.2)
above. (5)
Configure a system to allow files to be shared amongst Linux computers. Create three shares: one called Cheese that is read-only and restricted to the 192.168.1.0/24 network, one called Pickle with read-write access, that permits root privileges and can only be accessed from 192.168.1.1 and one called Crackers that is accessible to 192.168.1.1/24 to 192.168.1.10/24 as read-write and everyone else as read-only. Ensure that all of these files are shared across an array of 2 disks for reliability. Where additional data may be needed to complete this task, generate this using your own judgment.
I want a script in ubuntu
In that script, I need to configure and set up share and set up privileges
Configure a system to allow files to be shared amongst Linux computers. Create three shares: one called Cheese that is read only and restricted to the 192.168.1.0/24 network, one called Pickle with read write access, that permits root privileges and can only be accessed from 192.168.1.1 and one called Crackers that is accessible to 192.168.1.1/24 to 192.168.1.10/24 as read write and everyone else as read only. Ensure that all of these files are shared across an array of 2 disks for reliability. Where additional data may be needed to complete this task, generate this using your own judgement.
I wanted you to create a script using Ubuntu
Write briefly about each of the following terms. What are the latest trends in the Market? Search on Internet and come up with the current commonly used anti-malwares and antiviruses (5 marks)
Vulnerability
Threat
Risk
Attack
Backdoor
Hoaxes
Password Crack
Brute force
Dictionary attack
Spoofing
Man-in the Middle
Spam
Virus
Worm
Trojan
Zombie
Which Routing Protocol commonly used by Internet Service Provider and why? 5 marks
Why OSPF is faster than RIP? 5 marks
Viva (Delivery Milestone) Configure a system to allow files to be shared amongst Linux computers. Create three shares: one called Cheese that is read only and restricted to the 192.168.1.0/24 network, one called Pickle with read write access, that permits root privileges and can only be accessed from 192.168.1.1 and one called Crackers that is accessible to 192.168.1.1/24 to 192.168.1.10/24 as read write and everyone else as read only. Ensure that all of these files are shared across an array of 2 disks for reliability. Where additional data may be needed to complete this task, generate this using judgement.
1.Prepare an example of resource sharing algorithm (preferably Max-Min).
2. How APIs are used to provide ML capability for cloud services?
3.Think about some AI examples for Manufacturing industry and search for any cloud support.
Consider the following relations from a Richfield database. Write relational algebra expression for each statement using symbolic notations.
Books (bid, title, publisher, year)
Students (sid, sname, major, age)
Authors (aid, aname, aaddress)
Borrows (bid, sid, date)
2.2.1 List the title & year of each book. (2)
2.2.2 Find all information about students whose major is Java. (2)
2.2.3 List all students with the books they can borrow. (2)
2.2.4 Obtain all the books published by McGraw-Hill before 2019. (2)
2.2.5 Rename aname in the relation Authors to name.