Informática Básica

Total Page:16

File Type:pdf, Size:1020Kb

Informática Básica Escola Estadual de Educação Profissional - EEEP Ensino Médio Integrado à Educação Profissional Curso Técnico Informática Básica Governador Cid Ferreira Gomes Vice Governador Domingos Gomes de Aguiar Filho Secretária da Educação Maria Izolda Cela de Arruda Coelho Secretário Adjunto Maurício Holanda Maia Secretário Executivo Antônio Idilvan de Lima Alencar Assessora Institucional do Gabinete da Seduc Cristiane Carvalho Holanda Coordenadora da Educação Profissional – SEDUC Andréa Araújo Rocha CURSO TÉCNICO PROFISSIONALIZANTE INFORMÁTICA BÁSICA JANEIRO / 2011 FORTALEZA/CEARÁ ESCOLA ESTADUAL DE EDUCAÇÃO PROFISSIONAL | INFORMÁTICA BÁSICA P á g i n a | 1 CURSO TÉCNICO PROFISSIONALIZANTE SECRETARIA DE EDUCAÇÃO DO CEARÁ Consultor Técnico Pedagógico Renanh Gonçalves de Araújo Equipe de Elaboração Evandilce do Carmo Pereira João Paulo de Oliveira Lima Juliana Maria Jales Barbosa Liane Coe Girão Cartaxo Moribe Gomes de Alcântara Renanh Gonçalves de Araújo Valbert Oliveira Costa Colaboradores Maria Danielle Araújo Mota Júlio César Cavalcante Bezerra FORTALEZA 2012 ESCOLA ESTADUAL DE EDUCAÇÃO PROFISSIONAL | INFORMÁTICA BÁSICA CURSO TÉCNICO PROFISSIONALIZANTE Sumário Apresentação .................................................................................................................................................. 9 Objetivos de Aprendizagem ......................................................................................................................... 10 MÓDULO 01 - O QUE É UM COMPUTADOR?História e Evolução da Informática .............................. 11 História e Evolução da Informática ............................................................................................................. 12 1.1. História da Informática ............................................................................................................. 12 1.2. A Evolução do Computador ...................................................................................................... 16 1.3. O Futuro da Informática ............................................................................................................ 17 02. Hardware ............................................................................................................................................ 18 2.1. Dispositivos de Entrada e Saída ................................................................................................ 18 2.2. Unidades de Armazenamento .................................................................................................... 19 2.2.1. Unidades de Armazenamento: ............................................................................................ 19 2.3. Dispositivos de um Computador ............................................................................................... 20 2.3.1. Processador......................................................................................................................... 20 2.3.2. Placa mãe............................................................................................................................ 20 2.3.3. Memória RAM ................................................................................................................... 20 2.3.4. Disco Rígido – HD ............................................................................................................. 20 2.3.5. Drive CD/DVD .................................................................................................................. 21 2.3.6. FONTE DE ALIMENTAÇÃO .................................................................................................... 21 2.4. Conectores e ―Encaixes‖ (slots) ................................................................................................ 21 2.5. Problemas e Soluções................................................................................................................ 23 03. Redes de Computadores ..................................................................................................................... 24 3.1. Topologias ................................................................................................................................. 24 3.1.1. Topologia em Barramento ........................................................................................................ 24 3.1.1. Topologia em Anel ............................................................................................................. 25 3.1.2. Topologia em Estrela .......................................................................................................... 25 3.1.3. Topologia Wireless ............................................................................................................. 26 3.2. Classificação das Redes ............................................................................................................ 26 3.2.1. Redes LAN ......................................................................................................................... 26 3.2.2. Redes WAN ........................................................................................................................ 27 3.3. Componentes de uma Rede ....................................................................................................... 27 MÓDULO 02 – Sistemas Operacionais: Qual ―mente‖ orienta o ―corpo‖ destes computadores?Linux: Um Sistema Operacional Livre ........................................................................................................................... 29 Linux: Um Sistema Operacional Livre ........................................................................................................ 30 3.4. Os Sistemas Linux (UNIX) ....................................................................................................... 30 3.5. Linux Educacional 3.0 .............................................................................................................. 30 3.6. O menu Iniciar do Linux Educacional 3.0 ................................................................................ 31 3.7. As janelas no Educacional ........................................................................................................ 31 3.8. Konqueror: referência para desvendar o Educacional .............................................................. 31 3.8.1. Manipulação de arquivos e pastas ............................................................................................. 32 3.8.2. Uso de um pendrive............................................................................................................ 33 3.9. Distribuiçoes Linux ................................................................................................................... 33 3.9.1. Kurumin ............................................................................................................................. 33 3.9.2. Ubuntu ................................................................................................................................ 35 3.9.3. Fedora ................................................................................................................................. 37 3.9.4. Mandriva ............................................................................................................................ 38 3.9.5. openSUSE .......................................................................................................................... 40 3.9.6. Slackware ........................................................................................................................... 41 04. Microsoft Windows: Explorando seu computador ............................................................................. 43 ESCOLA ESTADUAL DE EDUCAÇÃO PROFISSIONAL | INFORMÁTICA BÁSICA CURSO TÉCNICO PROFISSIONALIZANTE 4.1. Introdução ................................................................................................................................. 43 4.2. Principais Elementos do Windows ............................................................................................ 44 4.3. Windows Explorer .................................................................................................................... 45 4.4. Acessórios do Windows ............................................................................................................ 46 MÓDULO 03 - Os Pacotes de Escritórios – Disputando o mercado dos computadores pessoais: Os dois mais famosos pacotes de escritórios ..................................................................................................................... 47 05. Editores de Texto ................................................................................................................................ 48 5.1. Apresentação ............................................................................................................................. 48 5.2. A Interface ................................................................................................................................. 48 5.3. Tipo de Fonte ............................................................................................................................ 50 5.4. Tamanho da Fonte ..................................................................................................................... 50 5.5. Formato e alinhamento dos caracteres .....................................................................................
Recommended publications
  • Easy Slackware
    1 Создание легкой системы на базе Slackware I - Введение Slackware пользуется заслуженной популярностью как классический linux дистрибутив, и поговорка "кто знает Red Hat тот знает только Red Hat, кто знает Slackware тот знает linux" несмотря на явный снобизм поклонников "бога Патре­ га" все же имеет под собой основания. Одним из преимуществ Slackware является возможность простого создания на ее основе практически любой системы, в том числе быстрой и легкой десктопной, о чем далее и пойдет речь. Есть дис­ трибутивы, клоны Slackware, созданные именно с этой целью, типа Аbsolute, но все же лучше создавать систему под себя, с максимальным учетом именно своих потребностей, и Slackware пожалуй как никакой другой дистрибутив подходит именно для этой цели. Легкость и быстрота системы определяется выбором WM (DM) , набором программ и оптимизацией программ и системы в целом. Первое исключает KDE, Gnome, даже новые версии XFCЕ, остается разве что LXDE, но набор программ в нем совершенно не устраивает. Оптимизация наиболее часто используемых про­ грамм и нескольких базовых системных пакетов осуществляется их сборкой из сорцов компилятором, оптимизированным именно под Ваш комп, причем каж­ дая программа конфигурируется исходя из Ваших потребностей к ее возможно­ стям. Оптимизация системы в целом осуществляется ее настройкой согласно спе­ цифическим требованиям к десктопу. Такой подход был выбран по банальной причине, возиться с gentoo нет ни­ какого желания, комп все таки создан для того чтобы им пользоваться, а не для компиляции программ, в тоже время у каждого есть минимальный набор из не­ большого количества наиболее часто используемых программ, на которые стоит потратить некоторое, не такое уж большое, время, чтобы довести их до ума. Кро­ ме того, такой подход позволяет иметь самые свежие версии наиболее часто ис­ пользуемых программ.
    [Show full text]
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • INSECURE-Mag-8.Pdf
    Hello everyone, welcome to issue 8 of (IN)SECURE. We’re happy to report that our subscriber list is growing strong. This, combined with the e-mails and quality article submissions, is a clear indication that the security community has embraced this concept and found it to be a valuable resource. This issue is packed full with material for every knowledge level and will especially be of interest to those that want to know more about the inner workings of the Payment Card Industry since we got two articles related to the topic. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com Defend Windows web servers with ThreatSentry 3.0 ThreatSentry 3.0 is a Host Intrusion Prevention System (HIPS) specifically designed to address internal and external unauthorized system access and cyber-criminal threats on Web servers utilizing Microsoft Internet Information Services (IIS). Since its introduction, IIS has grown in popularity and ranks as one of the most widely used platforms for enabling simple to sophisticated Web sites and Web-based applications.
    [Show full text]
  • Slackware Linux Basics for Slackware Linux 12.0
    Slackware Linux Basics For Slackware Linux 12.0 Daniël de Kok Slackware Linux Basics: For Slackware Linux 12.0 by Daniël de Kok Published Sun Jan 20 19:45:13 CET 2008 Copyright © 2002-2008 Daniël de Kok License Redistribution and use in textual and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of this book must retain the above copyright notice, this list of conditions and the following disclaimer. 2. The names of the authors may not be used to endorse or promote products derived from this book without specific prior written permission. THIS BOOK IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS BOOK, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. Linux is a registered trademark of Linus Torvalds. Slackware Linux is a registered trademark of Patrick Volkerding and Slackware Linux, Inc. UNIX is a registered trademark of The Open Group. Table of Contents Preface ........................................................................................................................................... xiii I. Getting started ................................................................................................................................ 1 1. About this book .....................................................................................................................
    [Show full text]
  • Read Ebook {PDF EPUB} Linking Windows 3.1 by Jenna Christen Linking Windows 3.1 [Christen, Jenna] on Amazon.Com
    Read Ebook {PDF EPUB} Linking Windows 3.1 by Jenna Christen Linking Windows 3.1 [Christen, Jenna] on Amazon.com. *FREE* shipping on qualifying offers. Linking Windows 3.1 Find many great new & used options and get the best deals for Linking Windows 3.1 by Jenna Christen at the best online prices at eBay! Free shipping for many products! Hello Select your address Best Sellers Today's Deals New Releases Electronics Books Customer Service Gift Ideas Home Computers Gift Cards Subscribe and save Coupons Sell Linking Windows 3.1: Christen, Jenna: 9781565290518: Books - Amazon.ca. Skip to main content.ca. Hello Select your address Books Hello, Sign in. Account & Lists Account Returns & Orders. Cart All. Best Sellers Gift Ideas ... Compra Linking Windows 3.1. SPEDIZIONE GRATUITA su ordini idonei Linking Windows Applications: Christen, Jenna, Pfaffenberger, Bryan: Amazon.sg: Books. Skip to main content.sg. Hello Select your address All Hello, Sign in. Account & Lists Account Returns & Orders. Cart All. Best Sellers Today's Deals Prime Customer ... View the profiles of people named Jenna Christian. Join Facebook to connect with Jenna Christian and others you may know. Facebook gives people the power... OS/2 is a series of computer operating systems, initially created by Microsoft and IBM under the leadership of IBM software designer Ed Iacobucci. As a result of a feud between the two companies over how to position OS/2 relative to Microsoft's new Windows 3.1 operating environment, the two companies severed the relationship in 1992 and OS/2 development fell to IBM exclusively. Search the world's information, including webpages, images, videos and more.
    [Show full text]
  • Microsoft Windows Ce and Windows Ce Services Read Me File
    MICROSOFT WINDOWS CE AND WINDOWS CE SERVICES READ ME FILE Ó1998 Microsoft Corporation. All rights reserved. This document provides late-breaking or other information supplementing the documentation for MicrosoftÒ WindowsÒ CE for the Handheld PC (H/PC) and Palm-size PC (P/PC) devices and the Microsoft Windows CE Services version 2.2 desktop software. ________________________________________________________________ CONTENTS 1.0 HANDHELD PC PROFESSIONAL VERSION 3.0 2.0 HANDHELD PC VERSION 2.0 3.0 PALM-SIZE PC 4.0 MICROSOFT WINDOWS CE SERVICES VERSION 2.2 ________________________________________________________________ 1.0 HANDHELD PC PROFESSIONAL VERSION 3.0 CONTENTS 1.1 GENERAL ISSUES 1.2 MICROSOFT POCKET INTERNET EXPLORER 1.3 MICROSOFT POCKET OUTLOOK 1.4 MICROSOFT POCKET WORD 1.5 MICROSOFT POCKET EXCEL 1.6 MICROSOFT POCKET POWERPOINT 1.7 MICROSOFT POCKET ACCESS 1.8 INKWRITER 1.9 COMPATIBILITY WITH VERSION 2.0 PROGRAMS ________________________________________________________________ 1.1 GENERAL ISSUES · If your H/PC supports backlighting, you may have a Backlight tab in Control Panel Display. On some H/PCs, the Advanced button may be disabled if the device does not support advanced features. · If you are printing via a serial connection and you disconnect and reconnect your cable, strange characters may appear at the top of your printout. After disconnecting your cable, turn off your printer before reconnecting to clear the printer buffer of any extraneous information. · File names that contain Russian characters cannot be opened on H/PC Professional devices. Rename files so that names do not include Russian characters. · When installing third-party programs to your H/PC Professional device, it is recommended that you use Windows CE Services version 2.2 or later, not version 2.1.
    [Show full text]
  • Noprianto Instalasi Pprogramrogram
    UTAMA Noprianto Instalasi PProgramrogram eiring dengan semakin banyaknya Linux digunakan, teknologi Syang memudahkan instalasi program di Linux ddii LLinuxinux pun bertambah. Kita akan membahasnya di tulisan ini. Suatu sistem yang solid adalah impian contoh, di sistem berbasis RPM, kita me- sendiri-sendiri. Selain karena alasan tidak semua pengguna komputer. Baik pengguna ngenal program yang dipaketkan sebagai ingin adanya redundansi yang tidak diper- komputer di server besar sampai perangkat fi le dengan ekstensi rpm yang dapat diin- lukan, juga karena kemungkinan terjadinya genggam. Permasalahannya adalah sistem stal. Atau, di sistem berbasis DPKG, kita inkompatibilitas versi pustaka. operasi yang telah terinstal tidak dapat mengenal program yang dipaketkan sebagai Oleh karena itu, sebuah paket barangkali memenuhi kebutuhan semua pengguna. fi le dengan ekstensi .deb. Dan masih banyak akan membutuhkan paket lainnya. Dan, pa- Baik saat pertama penggunaan ataupun di lagi. ket tersebut juga mungkin dibutuhkan oleh waktu yang akan datang. Oleh karena itu, Khususnya di Linux, masalah instalasi paket lainnya. Beberapa package manage- sistem operasi modern mengizinkan insta- program menjadi sangat istimewa karena ment modern sudah mengatasi masalah lasi aplikasi tambahan, baik yang berjalan adanya keinginan untuk mengumpulkan dependency ini, namun sempat menjadi isu sepenuhnya di user space ataupun yang me- semua pustaka di satu atau beberapa tem- yang sangat rumit di beberapa waktu yang nyentuh kernel space. pat yang disepakati bersama. Demikian lalu ataupun di beberapa sistem saat ini. Instalasi program dapat dilakukan juga dengan lokasi executable program. Di Kebutuhan akan versi pustaka yang ber- dengan berbagai cara. Di sistem operasi Linux, kita tidak disarankan untuk menggu- beda-beda juga bisa menjadi masalah besar.
    [Show full text]
  • Juniper Networks Unified Access Control
    Juniper Networks Unified Access Control Administration Guide Release 2.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 22A082407DO This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright © 1986–1997, Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright © 1988, 1989, 1993, University of Toronto. This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by The Regents of the University of California. Copyright © 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994. The Regents of the University of California. All rights reserved. GateD software copyright © 1995, The Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators. Gated is based on Kirton’s EGP, UC Berkeley’s routing daemon (routed), and DCN’s HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright © 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright © 1991, D. L. S. Associates. Juniper Networks, the Juniper Networks logo, NetScreen, NetScreen Technologies, the NetScreen logo, NetScreen-Global Pro, ScreenOS, and GigaScreen are registered trademarks of Juniper Networks, Inc.
    [Show full text]
  • Odyssey Access Client
    DATASHEET ODyssey Access Client Product Overview Product Description Juniper Networks® Odyssey Access Client is a family of standards-based, enterprise- As the demand to enable users to class 802.1X clients or supplicants built explicitly for use by enterprises and government work from anywhere, at anytime agencies. OAC delivers comprehensive support for the advanced protocols required for increases, so does the need for secure secure network access. It provides robust security for both wired and wireless networks, network accessibility and robust fully ensuring the safety and integrity of user credentials and transmitted data. OAC authentication. Mobility drives the secures user authentication and network connectivity, ensuring that users connect need to harness user and device data to the appropriate network in the appropriate manner, that login credentials are not to control network access and to compromised, and that user and device credentials and transmitted data remain secure ensure secure, appropriate network and private. connectivity. Juniper Networks Deploying and managing OAC enterprise-wide is quick and easy, lowering total cost of Odyssey Access Client 802.1X access ownership (TCO). One OAC client can be deployed and used for both wired and wireless clients/supplicants ensure the privacy 802.1X access, enabling unified enforcement of corporate security policies, and saving and integrity of user credentials and administration and provisioning time, effort, and cost. Through its common user interface network data through their robust for both wired and wireless access, OAC delivers a simplified user experience that reduces authentication and data security. training and support costs, allowing organizations to standardize on a single network OAC is quickly deployed and can access client across their business, regardless of network connection.
    [Show full text]
  • Package Managment Package Managment
    2021/07/26 13:02 (UTC) 1/7 Package Managment Package Managment Many users decide to use Linux based Operating Systems because of the freedoms they enjoy, included in the list is the freedom to choose the right tool for the job. The Slackware package management schema is a model for displaying the choices that are available to the users. When maintaining a server or even a personal system a certain amount of control must be given to the administrator, the control and simplicity of Slackware package management is what may in fact make you want to try or continue to use Slackware. Brief Explanation of Slackware Packages In terms of security and accountability Slackware is excellent because it brings you software in the condition that the authors intended. What this means is that the Slackware community does not modify the source or add and remove functions from software beyond the author's design, unless a small patch is required to work on Slackware. All packages are built using the original source code in which only official patches are applied, the only modifications that are made for the packages are adding .desktop files (executables for windows managers) and running installed applications/scripts to update databases, font or icon caches to include the newly installed files. Other distributions such as debian and redhat choose to modify the original source code with their own revisions prior to distribution, this can add additional functionality but in some cases such as the debian OpenSSL packages it can result in exploits that only effect the specific distribution which can remain unseen for some time because the original authors (those who know the applications best) were not responsible for the changes or aware of the changes.
    [Show full text]
  • Diapositiva 1
    S.O. GNU/Linux Tema 1 SRI Vicente Sánchez Patón I.E.S Gregorio Prieto S.O. GNU/Linux Una distribución Linux (coloquialmente llamada distro) es una distribución de software basada en el núcleo Linux que incluye determinados paquetes de software para satisfacer las necesidades de un grupo específico de usuarios, dando así origen a ediciones domésticas, empresariales y para servidores. Por lo general están compuestas, total o mayoritariamente, de software libre, aunque a menudo incorporan aplicaciones o controladores propietarios. Además del núcleo Linux, las distribuciones incluyen habitualmente las bibliotecas y herramientas del proyecto GNU y el sistema de ventanas X Window System. Dependiendo del tipo de usuarios a los que la distribución esté dirigida se incluye también otro tipo de software como procesadores de texto, hoja de cálculo, reproductores multimedia, herramientas administrativas, etcétera. En el caso de incluir herramientas del proyecto GNU, también se utiliza el término distribución GNU/Linux. S.O. GNU/Linux Existen distribuciones que están soportadas comercialmente, como Fedora (Red Hat), openSUSE (Novell), Ubuntu (Canonical Ltd.), Mandriva, y distribuciones mantenidas por la comunidad como Debian y Gentoo. Aunque hay otras distribuciones que no están relacionadas con alguna empresa o comunidad, como es el caso de Slackware. S.O. GNU/Linux Distribuciones populares Entre las distribuciones Linux más populares se incluyen: Arch Linux, una distribución basada en el principio KISS, con un sistema de desarrollo continuo entre cada versión (no es necesario volver a instalar todo el sistema para actualizarlo). Debian, una distribución mantenida por una red de desarrolladores voluntarios con un gran compromiso por los principios del software libre.
    [Show full text]
  • Acorn System Administration Documentation Release 1.0
    Acorn System Administration Documentation Release 1.0 Pavan Rikhi May 30, 2020 CONTENTS: 1 IT Architecture 3 1.1 Servers..................................................3 1.2 Buildings.................................................4 1.3 Networking................................................7 1.4 VM Cluster................................................8 2 Hardware 11 2.1 Console.................................................. 11 2.2 Switches................................................. 11 2.3 Cluster Nodes.............................................. 15 3 Administration & Maintenance Guides 19 3.1 Server Rack............................................... 20 3.2 Networking................................................ 21 3.3 Website/VPS............................................... 24 3.4 Arch Linux................................................ 25 3.5 CUPS Print Server............................................ 26 3.6 Slackware................................................ 27 3.7 Windows................................................. 29 4 Slackware Server Administration 33 5 Debian Workstation Automated Setup 35 5.1 Quickstart................................................ 35 5.2 Automated Installs............................................ 36 5.3 Ansible Setup............................................... 36 5.4 Automated Maintenance with Fabric.................................. 38 5.5 To Do................................................... 39 6 Acorn VM Cluster 41 6.1 Setup & Configuration.........................................
    [Show full text]