UNIX Crossword 1
Across
- 2. Short name for group id
- 8. Command used to change your password
- 9. Users belong to at least on of these
- 10. A type of question of which there are none in the UNIX class
- 14. How to find out information on the files in a directory
- 15. Features in the bash shell that are not in the sh shell
- 16. The part of an SSH key that you do not want others to get a hold of
- 19. Most UNIX commands have these to change how they behave
- 21. Last name of person that started the GNU Project
- 22. Part of an account that identifies the user
- 23. Type of SSH key we will be using (if possible)
- 26. Besides being a term meaning “humanity”, it is the name of a Linux distribution
- 27. An easy way to distribute a public key from a UNIX system
- 29. Where I am at in the directory structure
- 31. Name of superuser on UNIX systems
- 34. What CLI stands for
- 36. Display a text file on the terminal
- 37. Kind of a password for SSH keys
- 39. The name of the operating system we are learning in this course
- 40. Current sh shell, and default for the root account
Down
- 1. First name of the creator of linux
- 3. Not copyright, but …
- 4. Short name for user ID
- 5. A form of UNIX
- 6. The part of an SSH key that you want distributed
- 7. The only shell we will use in the class
- 8. Part of an account that is used for authentication
- 11. Last name of the creator of Linux
- 12. Another type of SSH key
- 13. “_____ on the cob” [sic], name of a shell
- 15. What bash stands for
- 16. An SSH client for Windows
- 17. Type of SSH key
- 18. Each user account has this to store files
- 20. We can use this to interact with UNIX on a command line
- 24. What GNU is an abbreviation of
- 25. Type of GNU license
- 28. How to change directories
- 30. A method to generate secure passwords
- 31. One of the creators of UNIX
- 32. Files are organized into these
- 33. The creator of linux was bitten by one of these as a child, and it serves as a symbol for Linux
- 35. Another creator of UNIX, and the name of a shell
- 38. How we can access remote machines