Class I was asked to teach at a High School I was consulting at reconfiguring there whole it infrastructure. The class was a test case. This is lecture 3 of 3 created...
Linux overview for technical writers having no or very less Linux experience. Focus on basic commands, vnc server and taking screenshots for Linux application.
This document provides instructions on installing Linux, including collecting hardware information beforehand, preparing disk partitions, booting from CD-ROM, continuing the installation process by preparing filesystems and installing packages, and basic parts of an installation kit like README files, boot disk images, and the installation CD-ROM. It also covers uninstalling or removing software packages using either the graphical Synaptic tool or command line apt-get commands. Basic Linux commands like mkdir, cd, pwd, rmdir, chown, chmod, ls, and cp are described.
This document provides instructions on basic commands in Linux and Windows operating systems. It begins with licensing information and an introduction stating the objectives are to learn basic commands that will be used in exercises. Sections are included on requirements and setup, system operations in Windows and Linux, and exercises for both platforms. The Windows section describes how to open a command prompt and provides details on common commands and networking tools like ipconfig, ping and tracert. The Linux section similarly discusses how to open a console window and provides command and tool details. A table compares basic command equivalences between Linux and Windows.
The document provides instructions on installing Linux including collecting hardware information beforehand, preparing disk partitions, installing from a CD-ROM, installing additional packages, and basic Linux commands. It also discusses uninstalling software using the synaptic graphical tool or apt-get command line tool and describes common Linux commands like mkdir, cd, ls, cp and their usage.
This document provides an overview of various networking tools in Linux, including commands for network configuration (ifconfig, route), connectivity testing (ping, traceroute), name resolution (host, nslookup), port and protocol inspection (netstat, tcpdump), and secure remote access (SSH, PuTTY). It also covers tools for firewall management (ufw), network mapping (Nmap), raw socket programming (netcat), link status (ethtool), and more. Examples are given for common tasks like viewing routing tables, capturing packets, remotely controlling systems, and accessing services over Telnet versus SSH. A references section at the end provides additional learning resources.
This document provides an overview of common Linux networking commands such as ifconfig, route, traceroute, nslookup, arp, dig, and netstat that are used to configure network interfaces, display routing tables, trace network routes, lookup domain names, manage address resolution, query DNS servers, and view network statistics. It also discusses how to use ifconfig to assign IP addresses to interfaces, route to view routing tables, arp to manage the address resolution cache, and dig for more powerful DNS lookups than nslookup.
This document provides an overview of Linux including:
- Different pronunciations of Linux and the origins of each pronunciation.
- A definition of Linux as a generic term for Unix-like operating systems with graphical user interfaces.
- Why Linux is significant as a powerful, free, and customizable operating system that runs on multiple hardware platforms.
- An introduction to key Linux concepts like multi-user systems, multiprocessing, multitasking and open source software.
- Examples of common Linux commands for file handling, text processing, and system administration.
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-355a-full-course-latest/
Go to a job posting site (CareerBuilder, Dice, ComputerJobs, etc.) or use search engines to find Java developer or Java programmer positions. Copy and paste the job posting into the Discussion area. Briefly explore all the topics that you will learn in this class this session. What are the skills you will learn in this course that are also requirements for the positions you see posted by you and your classmates?
Ee 352 lab 1 (tutorial) - schwappach - 15 oct 09Loren Schwappach
油
This document provides instructions for an individual lab tutorial on digital design using Aldec's Active-HDL software. The tutorial covers:
1) Creating a new workspace and design.
2) Using the Verilog source code wizard to generate a new source file for a 10-bit counter module.
3) Examining the top-level diagram, schematic, and state diagram generated for the counter design.
4) Simulating the design and debugging any issues.
The document summarizes a presentation given by Theo Jungeblut on the topic of clean code. It discusses why clean code is important for maintainability. It also provides an overview of tools like Resharper, FxCop, StyleCop, GhostDoc and Code Contracts that can help write clean code. Principles of clean code like KISS, DRY, SoC and patterns like dependency injection are explained. The presentation emphasizes that maintainability is key to preventing code from bringing a development organization to its knees.
Clean Code at Silicon Valley Code Camp 2011 (02/17/2012)Theo Jungeblut
油
This document provides an overview of clean code principles and practices. It discusses topics like why clean code matters, definitions of clean code, tools that help enable clean code like Resharper and FxCop, principles of clean code development such as KISS, DRY, SoC and SRP, and coding conventions. The presentation aims to demonstrate how writing clean code can improve code maintainability and efficiency. It also provides references to influential books on clean code by authors like Robert Martin.
Basic student guide for learning CLIPS Expert System Language an Artificial Intelligent field,
This document used to teach Bachelor Student in the LAB of Computer Sciences in UQU.
This document provides an introduction to a course on machine learning. It discusses the large amounts of data now available due to factors like the internet and big data. It also introduces programming and machine learning concepts like data types, variables, conditionals, loops, functions, and classes. Python is presented as a useful programming language for machine learning, with examples of code shown. Setting up an environment with Anaconda and Jupyter Notebook is also covered to allow hands-on coding practice.
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-247-full-course-latest/
The Object-Oriented Paradigm supports abstractions through Classes. Classes are software-programming abstractions; they encapsulate a set of related attributes (data members) and behaviors (methods) while, at the same time, they hide essential details from their users.
This document provides an introduction to the Python programming language over 30 slides. It covers key Python concepts like variables, data types, conditionals, loops, functions, imports, strings, lists, tuples, sets, dictionaries, classes and input/output. Examples are given for each concept to demonstrate how it works in Python. The document concludes by encouraging the reader to continue learning Python through online documentation and resources.
This document provides an introduction to the Python programming language over 30 minutes. It covers basic Python concepts like variables, data types, conditionals, loops, functions, imports, strings, lists, tuples, sets, dictionaries, and classes. Code examples are provided to demonstrate how to use these features. The document encourages learners to continue learning Python through online documentation and resources.
For More :
https://www.facebook.com/Computer-Programming-Assignments-826290177441561/
-
https://www.facebook.com/A-Tech-and-Software-Development-1683037138630673/
This paper validates the use of topic models to automatically detect software evolution by applying topic modeling techniques to an open source project called JHotDraw. The study found that 92% of detected topic changes agreed with documentation of code changes between versions. The paper concludes that topic models show promise for uses in software comprehension and quality assurance tools, but more validation is needed with other systems. Future work is needed to improve recall of topic models and implement topic modeling into software dashboards.
This document provides an introduction to programming with C# and the .NET Framework. It discusses what computer programming is, defines the key phases of programming like problem definition, algorithm design, coding, testing and debugging. It then covers the basics of a "Hello World" C# program including code structure, formatting and execution. The document also introduces the .NET Framework, Visual Studio IDE and MSDN library as essential tools and resources for C# programming.
This document discusses challenges in deploying machine learning models into production and potential solutions. It covers:
1. Issues with reproducibility due to dependencies and environment configurations when models are trained and deployed.
2. Problems with serializing models and transferring them between different versions of libraries and software stacks.
3. How containers can help address these issues by encapsulating the full runtime environment and dependencies of a model.
4. Managing both models and Docker containers is still required when using this approach.
The document provides information about the CSE202 Object Oriented Programming course. It details the course structure including topics covered, textbooks, outcomes, assessment criteria, and scheduling of tests and assignments. It also answers some common questions about C++ and compares procedural and object-oriented programming approaches. Key concepts taught in OOP like classes, objects, encapsulation, inheritance, and polymorphism are explained. Popular applications built using C++ are also listed.
Torch: a scientific computing framework for machine-learning practitionersHoffman Lab
油
This document summarizes a group meeting discussion about the Torch machine learning framework. Torch is an open-source deep learning library built on the Lua programming language. It provides powerful tools for creating and training neural networks, with simple and flexible APIs. The document discusses how Torch offers faster performance and more intuitive coding compared to other frameworks like Python Theano, with examples of how easily various neural network architectures can be defined and trained in Torch.
Clean Code - Design Patterns and Best Practices for Bay.NET SF User Group (01...Theo Jungeblut
油
Over the lifetime of a product, maintaining the product is actually one - if not the most - expensive area(s) of the overall product costs. Writing clean code can significantly lower these costs. However, writing clean code also makes you more efficient during the initial development time and results in more stable code. You will be presented design patterns and best practices which will make you write better and more easily maintainable code, seeing code in a holistic way. You will learn how to apply them by using an existing implementation as the starting point of the presentation. Finally, patterns & practices benefits are explained.
The document provides steps for setting up a basic OpenGL program, including creating a project in an IDE, adding code to initialize OpenGL and create a window, compiling and running the code, and setting up library and header file locations for OpenGL on a Windows system. It is a tutorial on getting started with basic 3D graphics programming using OpenGL.
This document provides an introduction to computer programming using C# and the .NET Framework. It discusses what computer programming is, the phases of programming, and an example of a simple "Hello World" C# program. It also covers what is needed to program including knowledge of a language (C#), development environment (.NET Framework and Visual Studio), and documentation (MSDN Library). The document explains what the .NET Framework is, how it provides a runtime environment and class libraries, and how Visual Studio is an integrated development environment for writing, compiling, running and debugging programs. It concludes with a demonstration of creating, building and running a simple C# program in Visual Studio.
1. The document discusses getting started with programming in Java, including compiling and running a simple "Hello World" Java program. It explains that a Java program is written as source code in a .java file, then compiled using the javac compiler into a .class file, which is run by the Java Virtual Machine (java).
2. It provides the code for a simple "Hello World" Java program consisting of a main method that prints the text, and explains some key aspects like class and file names.
3. It describes using the terminal to navigate directories and run the javac compiler and java programs, as well as downloading the Java Development Kit for the compiler and JVM.
This document provides an overview of different information sources for researching computer security and ethical hacking. It discusses magazines, zines, blogs, forums, mailing lists, newsgroups, books, and peer-to-peer networks. The document encourages students to critically evaluate information from different sources and not take anything at face value. It also warns students about security risks of the internet and cautions against posting personal information online or downloading files from unknown sources.
The document outlines the current version and benefits of ITIL, a framework for IT service management. It describes ITIL's focus on improving communication between IT and business to increase productivity, drive efficiency, and gain competitive advantages. The framework is organized into five core publications that cover strategies for service management, design, transition, operation, and continual improvement.
The document discusses ITIL (Information Technology Infrastructure Library), which is a framework for IT service management. It provides best practices for integrating IT services with business needs, improving efficiency and quality, and lowering costs. The framework includes five core publications that cover service strategy, design, transition, operation, and continual service improvement. The goal is to help organizations deliver valuable IT services and demonstrate business value.
Ee 352 lab 1 (tutorial) - schwappach - 15 oct 09Loren Schwappach
油
This document provides instructions for an individual lab tutorial on digital design using Aldec's Active-HDL software. The tutorial covers:
1) Creating a new workspace and design.
2) Using the Verilog source code wizard to generate a new source file for a 10-bit counter module.
3) Examining the top-level diagram, schematic, and state diagram generated for the counter design.
4) Simulating the design and debugging any issues.
The document summarizes a presentation given by Theo Jungeblut on the topic of clean code. It discusses why clean code is important for maintainability. It also provides an overview of tools like Resharper, FxCop, StyleCop, GhostDoc and Code Contracts that can help write clean code. Principles of clean code like KISS, DRY, SoC and patterns like dependency injection are explained. The presentation emphasizes that maintainability is key to preventing code from bringing a development organization to its knees.
Clean Code at Silicon Valley Code Camp 2011 (02/17/2012)Theo Jungeblut
油
This document provides an overview of clean code principles and practices. It discusses topics like why clean code matters, definitions of clean code, tools that help enable clean code like Resharper and FxCop, principles of clean code development such as KISS, DRY, SoC and SRP, and coding conventions. The presentation aims to demonstrate how writing clean code can improve code maintainability and efficiency. It also provides references to influential books on clean code by authors like Robert Martin.
Basic student guide for learning CLIPS Expert System Language an Artificial Intelligent field,
This document used to teach Bachelor Student in the LAB of Computer Sciences in UQU.
This document provides an introduction to a course on machine learning. It discusses the large amounts of data now available due to factors like the internet and big data. It also introduces programming and machine learning concepts like data types, variables, conditionals, loops, functions, and classes. Python is presented as a useful programming language for machine learning, with examples of code shown. Setting up an environment with Anaconda and Jupyter Notebook is also covered to allow hands-on coding practice.
Just Click on Below Link To Download This Course:
https://www.devrycoursehelp.com/product/devry-cis-247-full-course-latest/
The Object-Oriented Paradigm supports abstractions through Classes. Classes are software-programming abstractions; they encapsulate a set of related attributes (data members) and behaviors (methods) while, at the same time, they hide essential details from their users.
This document provides an introduction to the Python programming language over 30 slides. It covers key Python concepts like variables, data types, conditionals, loops, functions, imports, strings, lists, tuples, sets, dictionaries, classes and input/output. Examples are given for each concept to demonstrate how it works in Python. The document concludes by encouraging the reader to continue learning Python through online documentation and resources.
This document provides an introduction to the Python programming language over 30 minutes. It covers basic Python concepts like variables, data types, conditionals, loops, functions, imports, strings, lists, tuples, sets, dictionaries, and classes. Code examples are provided to demonstrate how to use these features. The document encourages learners to continue learning Python through online documentation and resources.
For More :
https://www.facebook.com/Computer-Programming-Assignments-826290177441561/
-
https://www.facebook.com/A-Tech-and-Software-Development-1683037138630673/
This paper validates the use of topic models to automatically detect software evolution by applying topic modeling techniques to an open source project called JHotDraw. The study found that 92% of detected topic changes agreed with documentation of code changes between versions. The paper concludes that topic models show promise for uses in software comprehension and quality assurance tools, but more validation is needed with other systems. Future work is needed to improve recall of topic models and implement topic modeling into software dashboards.
This document provides an introduction to programming with C# and the .NET Framework. It discusses what computer programming is, defines the key phases of programming like problem definition, algorithm design, coding, testing and debugging. It then covers the basics of a "Hello World" C# program including code structure, formatting and execution. The document also introduces the .NET Framework, Visual Studio IDE and MSDN library as essential tools and resources for C# programming.
This document discusses challenges in deploying machine learning models into production and potential solutions. It covers:
1. Issues with reproducibility due to dependencies and environment configurations when models are trained and deployed.
2. Problems with serializing models and transferring them between different versions of libraries and software stacks.
3. How containers can help address these issues by encapsulating the full runtime environment and dependencies of a model.
4. Managing both models and Docker containers is still required when using this approach.
The document provides information about the CSE202 Object Oriented Programming course. It details the course structure including topics covered, textbooks, outcomes, assessment criteria, and scheduling of tests and assignments. It also answers some common questions about C++ and compares procedural and object-oriented programming approaches. Key concepts taught in OOP like classes, objects, encapsulation, inheritance, and polymorphism are explained. Popular applications built using C++ are also listed.
Torch: a scientific computing framework for machine-learning practitionersHoffman Lab
油
This document summarizes a group meeting discussion about the Torch machine learning framework. Torch is an open-source deep learning library built on the Lua programming language. It provides powerful tools for creating and training neural networks, with simple and flexible APIs. The document discusses how Torch offers faster performance and more intuitive coding compared to other frameworks like Python Theano, with examples of how easily various neural network architectures can be defined and trained in Torch.
Clean Code - Design Patterns and Best Practices for Bay.NET SF User Group (01...Theo Jungeblut
油
Over the lifetime of a product, maintaining the product is actually one - if not the most - expensive area(s) of the overall product costs. Writing clean code can significantly lower these costs. However, writing clean code also makes you more efficient during the initial development time and results in more stable code. You will be presented design patterns and best practices which will make you write better and more easily maintainable code, seeing code in a holistic way. You will learn how to apply them by using an existing implementation as the starting point of the presentation. Finally, patterns & practices benefits are explained.
The document provides steps for setting up a basic OpenGL program, including creating a project in an IDE, adding code to initialize OpenGL and create a window, compiling and running the code, and setting up library and header file locations for OpenGL on a Windows system. It is a tutorial on getting started with basic 3D graphics programming using OpenGL.
This document provides an introduction to computer programming using C# and the .NET Framework. It discusses what computer programming is, the phases of programming, and an example of a simple "Hello World" C# program. It also covers what is needed to program including knowledge of a language (C#), development environment (.NET Framework and Visual Studio), and documentation (MSDN Library). The document explains what the .NET Framework is, how it provides a runtime environment and class libraries, and how Visual Studio is an integrated development environment for writing, compiling, running and debugging programs. It concludes with a demonstration of creating, building and running a simple C# program in Visual Studio.
1. The document discusses getting started with programming in Java, including compiling and running a simple "Hello World" Java program. It explains that a Java program is written as source code in a .java file, then compiled using the javac compiler into a .class file, which is run by the Java Virtual Machine (java).
2. It provides the code for a simple "Hello World" Java program consisting of a main method that prints the text, and explains some key aspects like class and file names.
3. It describes using the terminal to navigate directories and run the javac compiler and java programs, as well as downloading the Java Development Kit for the compiler and JVM.
This document provides an overview of different information sources for researching computer security and ethical hacking. It discusses magazines, zines, blogs, forums, mailing lists, newsgroups, books, and peer-to-peer networks. The document encourages students to critically evaluate information from different sources and not take anything at face value. It also warns students about security risks of the internet and cautions against posting personal information online or downloading files from unknown sources.
The document outlines the current version and benefits of ITIL, a framework for IT service management. It describes ITIL's focus on improving communication between IT and business to increase productivity, drive efficiency, and gain competitive advantages. The framework is organized into five core publications that cover strategies for service management, design, transition, operation, and continual improvement.
The document discusses ITIL (Information Technology Infrastructure Library), which is a framework for IT service management. It provides best practices for integrating IT services with business needs, improving efficiency and quality, and lowering costs. The framework includes five core publications that cover service strategy, design, transition, operation, and continual service improvement. The goal is to help organizations deliver valuable IT services and demonstrate business value.
The document describes the 7-step continual service improvement (CSI) process. The CSI process is a cyclical approach to improving IT services through better design, introduction, and operation. It involves identifying a vision and strategy, defining metrics, gathering and analyzing data, implementing improvements, and continually evaluating progress. The goal is to continually assess and enhance services to create value for customers.
The document discusses service operation and provides guidance on achieving efficiency and effectiveness in service delivery and support. It covers topics like incident management, request fulfillment, problem management, access management, and event management. The purpose of service operation is to coordinate and carry out activities required to deliver and manage services at agreed levels for users and customers.
The document discusses the Service Transition book which covers developing and improving capabilities for transitioning new and changed services into production environments through processes like transition planning, change management, service asset and configuration management, release and deployment management, service validation and testing, and knowledge management. The purpose of Service Transition is to ensure new, modified, or retired services meet business expectations by increasing success rates of changes and releases and having more accurate estimates of service levels and costs.
The document provides definitions and explanations of key terms related to IT service management based on ITIL best practices. It defines concepts like service level agreements, operational level agreements, underpinning contracts, service catalogs, service level requirements, service level targets, capabilities, configuration items, key performance indicators, critical success factors, availability, and maintainability. The definitions are concise explanations of each term in the context of ITIL.
The document focuses on service management strategy and discusses several key topics related to designing, developing, and implementing an effective service management strategy, including demand management, service portfolio management, and financial management for IT services.
Peleg Holzmann has over 20 years of experience in IT and IT service management. He holds a Master's degree in Information Systems Security from DePaul University and has certifications in ITIL, PRINCE2, COBIT, and other frameworks. He founded PelegIT Ltd. to help organizations implement best practices for IT service management.
The document outlines a typical information security audit procedure conducted by ______ Security Solutions. The 7-step procedure includes: 1) ascertaining applicable laws and standards, 2) preparing a project plan, 3) gathering information and identifying assets, 4) performing a risk analysis, 5) reporting findings and recommendations, 6) preparing an implementation plan, and 7) ensuring continual service improvement. ______ takes a customized, layered approach to security utilizing both quantitative and qualitative risk analysis methods.
Class I was asked to teach at a High School I was consulting at reconfiguring there whole it infrastructure. The class was a test case. This is lecture 1 of 3 created...
1. Information Systems Security & HardwareSecurity & Computer Hardware Course for TeensLesson 2Basic Commands in Windows and Linux
2. Brief History Windows 1985Linux 1991Based on Unix 1960sWindows and Linux get along very well.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)2
3. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)3
4. 1985 Windows 1.0Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)4
5. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)5
6. 1990 Windows 3.0Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)6
7. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)7
8. 1992 Windows 3.11/NTCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)8
9. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)9
10. 1995 Windows 95Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)10
11. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)11
12. 1998 Windows 98Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)12
13. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)13
14. 2000 Windows 2000Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)14
15. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)15
16. 2000 Windows MECourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)16
17. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)17
18. 2001Windows XPCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)18
19. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)19
20. 2007 VistaCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)20
21. Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)21Linux Rocks!
22. 2009 Windows 7 - Vista (Fixed) Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)22
23. Linux was invented byCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)23Linus Torvalds
24. Linux Baby Pictures (how cute)Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)24
25. TuxCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)25
26. Windows, Mac and LinuxCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)26Linux!
27. Commandsdo thisok do that.Command line commandsWe are going to look under the hood of Windows and Linux OSs Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)27
28. Windows and Linux command linesCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)28LinuxWindows
29. In Class Exercise 1 - WindowsWindows Key + RCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)29+
30. In Class Exercise 1 - WindowsRun Dialog BoxType in cmdCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)30
31. In Class Exercise 1 - WindowsCommand prompt opensCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)31
32. DateDisplay or set the date of the systemCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)32
33. TimeDisplay or set the time of the systemCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)33
34. VerDisplay the MS-DOS version that is being usedCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)34
35. CLsClear the screenCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)35
36. DirDisplay the list of subdirectories and files of a directoryCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)36
37. cd\Go to rootCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)37
38. Cd continuedGo to sub directoriesCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)38
39. Cd continuedShow contents of sub-directoriesCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)39
40. mdMake a directory with the nameexampleCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)40
41. Exercise 1Go to the directory you just madeCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)41
42. Exercise 1.1Make a directory called tools within the example directoryCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)42
43. RDRemove a directory toolsCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)43
44. RD (continued)Remove a directory toolsCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)44
45. TreeShow directory as a hierarchical tree format.Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)45
57. Exercise 1Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)57
58. PingCourse Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)58
59. PlayDo Linux commands work in Windows?Do Windows commands work in Linux?Can you find some other commands?Course Design by. Peleg (based on the origianl Hacker High School and Youth Technology Corp)59