Question

Using the task management tools in Microsoft Windows and Linux, you can explore the factors that...

Using the task management tools in Microsoft Windows and Linux, you can explore the factors that affect your personal computer’s (PC’s) performance and troubleshoot problems, such as stopping a hung application. In the Windows operating system, you use Windows Task Manager to obtain information about the programs and processes running on your PC and common performance measurements, such as central processing unit (CPU) and memory usage, for these processes. Similarly, in Linux, you use the pscommand to display a variety of information about the currently running processes.

This Lab Assignment provides you with an opportunity to practice managing processes on computers running Windows 10 and Linux operating systems. This will give you a better understanding of how to troubleshoot problems related to applications, processes, and performance on your PC.

You will need to access two different Labs to complete this Assignment:

  1. Part 1: Linux Pro by TestOut
  2. Part 2: MSDN Virtual Labs: Windows 10 (Open Access Resource)

Access Linux Pro through the Log In link that is provided in this week’s Learning Resources. In TestOut LabSim, you will first need to enroll yourself in the correct class section. Click “Enroll in Classes” and search by either Instructor name or course number. Be sure to select the correct session.

  • To begin the first part of this Lab Assignment, access the Linux Pro materials in Testout. You are required to complete the following Labs:
    • 9.1.9 View Process Information
    • 9.2.9 Stop a Zombie Process

In many cases, you may wish to review the text and media resources in the section to support your Lab work.

For each of these, you should take a screen shot of your final report showing 100% completion. Paste the screen shots showing completion of each Lab into a single Word document and submit that document. Your Instructor will also be able to review your work in TestOut, but you must submit the reports here to receive credit for this document’s completion in the Walden classroom.

  • To begin the second part of this Lab Assignment, access the MSDN Virtual Labs resource (located in this week’s Learning Resources) in your Internet Explorer web browser.

Click on “Launch Lab.” The Windows 10 Vlab will open up.

Follow the instructions in the Week 1 Windows Lab Worksheet (located in this week’s Learning Resources).

0 0
Add a comment Improve this question Transcribed image text
Answer #1

In Linux in order to view process information, type top command or ps aux command to see all the processes in your system.

Since Zombie process is already a dead process, you the below command to kill it

kill -9 $(ps -A -ostat,ppid | grep -e '[zZ]'| awk '{ print $2 }')

Add a comment
Know the answer?
Add Answer to:
Using the task management tools in Microsoft Windows and Linux, you can explore the factors that...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following...

    Using Kali Linux, the Windows Linux Sub-System, or another Debian based Linux distribution, perform the following tasks based on the Linux Fundamentals lecture. For this lab, take screenshots for all major steps completed to illustrate that each task was successfully completed the same method as would be used for other labs). Tasks: 1. Create a new user named Billy Bob using the command linter face 2. Add Billy Bob to the sudoers group 3. Update and upgrade your Linux distribution...

  • Project 2 Sorting, CPU Time, and Big O Analysis Note: you will be using Microsoft Visual...

    Project 2 Sorting, CPU Time, and Big O Analysis Note: you will be using Microsoft Visual Studios 2019 as the compiler. This is an individual assignment. You will have lab time to work on this assignment as well as homework time. Each person will analyze two sorts. The first sort will be either bubble sort or insertion sort. The second sort will be either quick sort or merge sort. Create two projects, one for each sort in the given choices....

  • TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been...

    TASK Read the Regional gardens case study document before attempting this assignment. Background: You have been employed by Regional Gardens as their first Chief Information Officer (CIO). You have been tasked by the Board to conduct a review of the company’s risks and start to deploy security policies to protect their data and resources. You are concerned that the company has no existing contingency plans in case of a disaster. The Board indicated that some of their basic requirements for...

  • Count Occurrences in Seven Integers Using Java Single Dimension Arrays In this assignment, you will design...

    Count Occurrences in Seven Integers Using Java Single Dimension Arrays In this assignment, you will design and code a Java console application that reads in seven integer values and prints out the number of occurrences of each value. The application uses the Java single dimension array construct to implement its functionality. Your program output should look like the sample output provided in the "Count Occurrences in Seven Integers Using Java Single Dimension Arrays Instructions" course file resource. Full instructions for...

  • Description: In this assignment, you will be launching a denial of service attack on a web...

    Description: In this assignment, you will be launching a denial of service attack on a web server. We will be using hping3, a command-line oriented network security tool inside Kali Linux (an advanced penetration testing Linux distribution). Setting up the victim machine Download the Windows XP virtual machine with WebGoat server installed, using the following link. We will use this machine as the victim machine and launch a DoS attack on the WebGoat server.https://drive.google.com/open?id=0BwCbaZv8DevUejBPWlNHREFVc2s Open the victim machine and launch...

  • can you please help me with this homework. DCOM 101 – Introduction to Data Communications Final Project Instructions: In this Final Project, you will test the skills and knowledge gained throughout th...

    can you please help me with this homework. DCOM 101 – Introduction to Data Communications Final Project Instructions: In this Final Project, you will test the skills and knowledge gained throughout this course. The steps listed below are loosely based on the Assignments you have completed thus far, so don’t hesitate to look back and use those resources. Follow the steps in each section, and paste screenshots when prompted. This assignment is worth 10% of your final grade. Basic Network...

  • The Assignment`s Learning Outcomes: In the second assignment for the Quality Management course, the students are...

    The Assignment`s Learning Outcomes: In the second assignment for the Quality Management course, the students are required to read the “ Nestlé Waters Unifying real-time visibility across 26 factories” case study, and answer the related questions, upon successful completion of the assignment the student should be able to: Implement business-integrated quality systems through process control. Use quality improvement tools and practices for continuous improvement. Develop strategies for organizational change and transformation. Case Study - PDF Attached Assignment Regulations: This assignment...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241...

    Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241 through 246). Question 2 Prepare a plan for the remainder of the project in response to Adams’ memo (lines 241 through 246). Your answers to the above will be assessed in terms of the level of communication displayed, the insights and inferences drawn, and your ability to...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT