Question

Where is application and service configuration information stored on Unix and Linux systems? In Windows? Compare...

Where is application and service configuration information stored on Unix and Linux systems? In Windows? Compare and contrast the two in terms of security, accessibility, and automation.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Configuration attributes are held in configuration files, at the level of the node and of the queue manager.

Client configuration options are held separately, in the client configuration file.

A configuration file (or stanza file) contains one or more stanzas, which are groups of lines in the .ini file that together have a common function or define part of a system, such as log functions, channel functions, and installable services.

Because the IBM WebSphere MQ configuration file is used to locate the data associated with queue managers, a nonexistent or incorrect configuration file can cause some or all MQSC commands to fail. Also, applications cannot connect to a queue manager that is not defined in the IBM WebSphere MQ configuration file.

Any changes you make to a configuration file usually do not take effect until the next time the queue manager is started.

On Windows and Linux (x86 and x86-64 platforms) systems, you can edit configuration information from the IBM WebSphere MQ Explorer.

comparison between unix and linux

criteria unix linux
security

unix takes more time to deal with bugs and threats as compared to linux.

UNIX operating systems comes with its own firewall product

linux is more responsive and fast in dealing with threats and security issues.

Linux comes with open source netfilter/iptables based firewall tool to protect your server and desktop from the crackers and hackers

accessibility Unix operating systems were developed for specific purpose designed mainly for mainframes, servers and workstations and it is not freely available. It is user friendly open source software freely available on the internet.Everyone including home users to developers and computer enthusiasts can use it.
automation In text mode interface,Originally the Bourne Shell. Now it's compatible with many others including BASH, Korn & C. In text mode interface, BASH (Bourne Again SHell) is the Linux default shell. It can support multiple command interpreters.
Add a comment
Know the answer?
Add Answer to:
Where is application and service configuration information stored on Unix and Linux systems? In Windows? Compare...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Scenario: Security and Memory Management Some have argued that Unix/Linux systems reuse a small number of...

    Scenario: Security and Memory Management Some have argued that Unix/Linux systems reuse a small number of security features in many contexts across the system, while windows systems provide a much larger number of more specifically targeted security features used in the appropriate contexts. This may be seen as a trade-off between simplicity verses lack of flexibility in the Unix/Linux approach against a better targeted but more complex and harder to correctly configure approach in Windows. question: Discuss the highlighted trade-off...

  • Compare Windows and Linux memory systems used by the OSes.

    Compare Windows and Linux memory systems used by the OSes.

  • 1. This symbol represents the top of the UNIX/Linux file system: 2. This directory is where...

    1. This symbol represents the top of the UNIX/Linux file system: 2. This directory is where the configuration files are stored: 3. This directory is where each user on the system has their directory stored: 4. This directory is the home directory for the system administrator: 5. This directory is where the binaries/executable that are needed to start the system and perform other essential system tasks are stored:

  • Explain how Unix and Windows manage memory and processors. Compare between the approaches of the two...

    Explain how Unix and Windows manage memory and processors. Compare between the approaches of the two operating systems .

  • I need help answering this from a developer point of view Linux Windows Mobile Devices Development...

    I need help answering this from a developer point of view Linux Windows Mobile Devices Development Mac Requirements Server Side <Evaluate Mac for its characteristics, advantages, and weaknesses for hosting a web- based software application> Client side Determine the software development considerations (cost, time, expertise) that are necessary for supporting multiple types of clients as they pertain to Mac. <Evaluate Linux <Evaluate <Evaluate Mobile for its Windows for its Devices for their characteristics, characteristics, characteristics, advantages, and advantages, and advantages,...

  • answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT...

    answer the following questions: 1)ACK scans and NULL scans work only on UNIX and LINUX systems.(SELECT ONE): a)true b)false 2)Cross-site scripting attacks attempt to bypass the browsers security checks to gain elevated access privileges to sensitive data belonging to another site(SELECT ONE): a)true b)false. 3)Denial of service attacks target the confidentiality and integrity of a system or network.(SELECT ONE): a)true b)false 4)the wireless access point provides a connection to the network or service(SELECT ONE): a)true b)false 5)blocking ICMP packets may...

  • Comparr and contrast the management information systems (MIS) in place in 2 distinctly different organizations. Compare...

    Comparr and contrast the management information systems (MIS) in place in 2 distinctly different organizations. Compare each organizations use of information systems to help manage internal operations and make decisions. Assess how these two organizations use information technology for competitive advantage. Appraise the individual and organization consequences of the information technology, and recognize potential security breaches and computer crimes.

  • Using the task management tools in Microsoft Windows and Linux, you can explore the factors that...

    Using the task management tools in Microsoft Windows and Linux, you can explore the factors that affect your personal computer’s (PC’s) performance and troubleshoot problems, such as stopping a hung application. In the Windows operating system, you use Windows Task Manager to obtain information about the programs and processes running on your PC and common performance measurements, such as central processing unit (CPU) and memory usage, for these processes. Similarly, in Linux, you use the pscommand to display a variety...

  • 19. UNIX/Linux normally include two editors: vi and (choose the single best answer). 20. You can...

    19. UNIX/Linux normally include two editors: vi and (choose the single best answer). 20. You can use thecommand to create empty a create b. make c touch d mu 21. Which command can be used to leave vi temporarily to access the command line? 22 If you execute the contents of filel are sorted and the results are stored in file2. a sort file1 -ofile2 b. sort file1 >file2 c sort filel -d file2 d sort filel filez field or...

  • Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as...

    Networking fundamentals ICLOUU10P 1. A(n) is a set of peer computers that share resources such as files and hardware. 2. A(n). is a logical grouping of users and equipment as defined by the network administrator. 3. Microsoft server editions have interfaces similar to the current was new for Windows Server 2008 and Windows 7 and is designed to improve network performance by storing information downloaded from the Internet or a web server onto a local area network client. 5. An...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT