Touge Big Data Assignment 1: Activate ECS and use Linux commands

Extracurricular homework 1: Activate ECS and use Linux commands

  • Job details

content

  • Experimental questions

1. "Newbies on ECS cloud server", remote login to ECS instance. Screenshot of successful login. Screenshot of evaluation results 2. "Basic ECS commands and simple applications". Modify the root password and use the text editor to create the txt file mv or cp you created yourself. directory, compare the two. Except for the difference in creation time, other read and write permissions are exactly the same. 3, "How to quickly activate and use ECS cloud server" (1), instance payment method: pay as you go (2), region: East China 1 (Hangzhou) (3), Specification: ecs.n4.small (4), Mirror: ubuntu_22_04_x64_20G_alibase_20230208.vhd (5), Port opened by security group: Security group is similar to the firewall function, it is a logical grouping used to set Network access control 3389/3386 (Windows remote login) 22/22 (Linux SSH login) ICMP protocol (ping)

Security group ID joined: sg-bp15cqoiqxk1w34wm3o6 (6), instance name: zhuyaling1768

  • Briefly answer the content of "Classroom Assessment"
  1. What does experimental desktop mean? How is it different from the desktop of the computer you are using? Which is a virtual desktop?

Answer: Experimental Desktop is a cloud computing service launched by Alibaba Cloud. It can provide users with a virtual desktop environment, allowing users to access their work environment and applications anywhere and on any device. Different from ordinary computer desktops, the experimental desktop is based on cloud computing technology. Users can connect to the cloud virtual desktop through the network anytime and anywhere to operate without worrying about data loss, computer failure and other issues. The experimental desktop is a virtual desktop.

  1. What is the Alibaba Cloud experimental account used for? Is it a real experimental account? How are the permissions different from those of your own Alibaba Cloud account?

Answer: Alibaba Cloud experimental account is an account used to learn and test Alibaba Cloud products. It is a real experimental account. Compared with personal Alibaba Cloud accounts, experimental accounts usually have more restricted permissions and can only access specific Alibaba Cloud products and services. The experimental account is subordinate to the Alibaba Cloud account and cannot own any actual resources. All resources belong to the Alibaba Cloud account.

  1. What are the functions of the browser login console?

Answer: The browser login console in Alibaba Cloud can be used to manage your cloud servers, databases, storage and other cloud services, including but not limited to operations such as creation, start, stop, restart, backup, recovery, and monitoring. In addition, you can also view your account information, order information, invoice information, etc. in the console.

  1. Super user Root or Administrator, which one belongs to Windows? Which one is Linux?

Answer: Super user root is Linux, Administrator is Windows

  1. What is the LX terminal used for? What is the command to log in to a Linux server remotely? Is there any other way to log in?

Answer: LX terminal is a very useful Linux terminal program. It can remotely log in to the Linux server through the graphical interface without logging in locally. The command to remotely log in to the Linux server is: ssh. In addition to the LX terminal, you can also log in to the Linux server through the virtual terminal (VT), virtual machine (VM) and X Window system.

  1. What is PuTTY ? Do you know of any other similar software?

Answer: PuTTY is an open source free network management tool that can be used to remotely log in to other computers, such as Linux or Windows servers. In addition to PuTTY, there are similar software such as KiTTY, Bitvise SSH Client, SecureCRT and Xshell that can be used for remote login.

  1. What do the Linux commands pwd, ls, mkdir, cd, mv, cp, passwd, touch, and vim do?

Answer: pwd: display the current working directory (print working directory) ls: list the files in the current directory (list) mkdir: create a new subdirectory (make directory) cd: change the current working directory (change directory) mv: move or Rename a file or directory (move) cp: Copy a file or directory (copy) passwd: Change the password of a user account (password) touch: Update the timestamp of a file (time updated) vim: Enter text editing mode (vi improved)

  1. What is ECS ? What is an example?

Answer: ECS is the abbreviation of Elastic Compute Service. It is an elastic computing service provided by Alibaba Cloud. With the support of virtualization technology, you can apply for one or more elastically scalable and flexibly managed virtual server instances on demand. , that is, an ECS instance. ECS instances can support the installation and configuration of operating systems, common software, and various application environments, and can meet the computing and storage needs of most enterprise users.

  1. What are the ways to change the root user password in ECS ?

Answer: There are two ways to change the root user password in ECS. One is to use the security audit function to change the password, and the other is to change the password through the console. In addition, you can also use the SSH protocol to connect to the ECS instance, and then use the passwd command to change the password of the root user.

  1. What does it mean to create an ECS region? What regions does Alibaba Cloud have?

Answer: When creating ECS, you need to specify a region, which refers to the logical partition where the physical host to which the ECS instance belongs is located. Alibaba Cloud has 15 regions, including: China (Shanghai and Beijing), Singapore, the United States (Virginia and California), Europe (Frankfurt, Ireland and the United Kingdom), Australia, Japan, Hong Kong, Taiwan, the Middle East, Russia, India, Spain, South Korea and Indonesia.

  1. Which scenarios are suitable for the annual and monthly subscription and pay-as-you-go billing methods?

Answer: The annual and monthly payment method is suitable for users who use ECS instances for a long time. Enterprise users can pay for ECS instances in the long term based on their estimated needs and enjoy more favorable prices; while pay-as-you-go payment method is suitable for users who use ECS instances for a short period of time. Paying for ECS instances based on the number of instances used and the time of use helps users build their own instance environments faster and more flexibly.

  1. What are the two mainstream CPU architectures? Which two companies mainly produce X86 architecture CPUs?

Answer: The two mainstream CPU architectures are Intel x86 architecture and AMD x86 architecture. x86 architecture CPUs are mainly produced by Intel and AMD. Intel produces more low-power and high-performance processors, while AMD Produce more cost-effective mid-range processors.

  1. What are vCPUs ? Which specification did you choose?

Answer: The vcpus in Alibaba Cloud ecs server is a virtual processor core, usually a combination of multi-core processors, which can help process tasks faster.

  1. What is the mirror in the experiment? Is Alibaba Cloud Linux Linux or Windows? Why are there many commercial versions of Linux but not Windows?

Answer: The image in the experiment refers to a virtual machine image, which represents a virtualization technology that allows operating systems, applications and services, and configuration files to be shared among each other, thereby reducing resources and reusing applications.

Alibaba Cloud Linux is an operating system based on the Linux kernel that provides high availability and scalability and can be used to run large-scale commercial applications between different systems.

There are many commercial versions of Linux because Linux is designed for businesses, while Windows is usually used by individual users who can get more features and scalability from commercial versions.

  1. What is a VPC ? When configuring the network for ECS, did you choose the default VPC? Can I recreate a VPC to configure it?

Answer: VPN (Virtual Private Network) is a technology that provides safe, secure, reliable and private network communications over the Internet.

  1. What are security groups? Which ports are open to the default security group here? Why?

Answer: Security group is a security function provided by Alibaba Cloud ECS. It can protect your instance from external attacks and make your instance run more securely.

The default security group places ports 80, 443, and 22, which are standard ports for network services and are used to connect to network services and provide reliable services.

  1. What are the public IP and bandwidth? Is it possible to do without them? Why?

Answer: The public IP is the only IP address that allows access and access to your server from the Internet. Bandwidth is the amount of data that a link in the network can transmit within a period of time. It's okay without them, but you won't be able to access your server directly from the Internet, and you won't be able to achieve optimal service and data transmission.

  1. What is the name of your Linux cloud server?

Answer: zhuyaling1768

  • exercise
  1. Let’s try to describe the three informatization waves in the history of information technology development and their specific contents.

Answer: The wave of informatization can be divided into: the first wave of informatization, that is, the application of personal computers, which can effectively solve more information processing problems; the second wave of informatization, that is, the application of network informatization, which can not only solve information It can also manage the acquisition and transmission of information; the third wave of informatization, that is, digital information dissemination and management, can carry out specific digital encoding of information to produce lower-cost and more refined information. Communication and management.

  1. Describe the several stages that data generation goes through.

Answer: The several stages of data generation include: the first stage is traditional data, produced by human recording and collection; the second stage is semi-structured data, produced by computer technology and communication technology; the third stage is semi-structured data and The combination of unstructured data is driven by network technology; the fourth stage is the combination of unstructured data with semi-structured and structured data, resulting from social networks, the Internet of Things and mobile Internet technologies.

  1. Describe the 4 basic characteristics of big data.

Answer: The four basic characteristics of big data are: high concurrency, high availability, high complexity and high dynamic scalability.

  1. Let’s describe the “data explosion” characteristics of the big data era.

Answer: The "data explosion" characteristic of the big data era refers to the rapid growth in the quantity, rhythm and complexity of data generated in various fields of society with the popularization of the Internet, making data processing, analysis and utilization more complex. Complexity, and thus the ability to discover value from it more effectively is also improving.

  1. What are the four stages of scientific research?

Answer: The four stages of scientific research include: The first stage is the stage of inductive insights. This stage has the following characteristics: relies on experience and research; has limited data sources and can only collect some single types of data; mainly focuses on factor comparison. , researchers pay more attention to the relationship between comparative factors; the second stage is the proof of concept stage, which has the following characteristics: improving data quality; collecting multiple types of data; focusing on empirical evidence of factors; the third stage is the stage of predicting results , this stage has the following characteristics: focusing on insights; multiple data sources; focusing on factor connection; the fourth stage is the problem-solving stage, this stage has the following characteristics: multiple data sources; focusing on optimal decision-making; Mainly based on factor prediction.

  1. Describe the important impact of big data on the way of thinking.

Answer: The important impact of big data on the way of thinking is that it promotes the transformation from extensive static reasoning and analysis to real-time dynamic reasoning and analysis, and from a single data source and independent data management model to true big data. The environmental and multi-perspective data management model changes from a rational decision-making model to an uncertain decision-making model, and from a passive observer to an active discoverer, which helps to expand the horizons of data analysis and decision-making analysis, in-depth research aspects, and then affects predictions Decision-making drives the way we understand and manage the world.

  1. What is the difference between big data decision-making and traditional data warehouse-based decision-making?

Answer: Big data decision-making is very different from traditional data warehouse-based decision-making. Big data decision-making relies on massive historical data and high-speed processing data to make decisions. It is more accurate, faster, and more meaningful than traditional decision-making methods. Big data can be used to achieve real-time monitoring, predictive analysis, etc., thereby more effectively supporting enterprise management decisions.

  1. Give examples to illustrate specific applications of big data.

Answer: The supermarket monitoring system based on big data can conduct real-time monitoring at different times and locations, grasp customer flow based on real-time data, adjust product sales strategies in a timely manner, and improve market sales efficiency; in addition, the intelligent customer service system based on big data, its machines The learning algorithm can automatically identify the information sent by the user and automatically reply to the customer, improving customer service efficiency.

  1. Give examples to illustrate the key technologies of big data.

Answer: The key technologies of big data include: data mining, statistical analysis, machine learning, cloud computing, etc. Data mining is a technology used to mine valuable data information from various data sources; statistical analysis is a technology used to mine specific trends from large amounts of data; machine learning technology can analyze large amounts of data to Automatically identify specific patterns; cloud computing is a technology that uses Internet technology to provide computing services on the network.

  1. What levels does the big data industry include?

Answer: The big data industry includes data collection, management, analysis and application. The data collection level includes: data acquisition, data storage, etc.; the data management level includes: data processing, data security, etc.; the data analysis level includes: data mining, statistical analysis, etc.; the data application level includes: social networks, wireless networks, etc.

  1. Give definitions of the following terms: cloud computing, Internet of Things.

Answer: Cloud computing is an Internet technology that allows users to use virtualized IT facilities to achieve flexible computing capabilities by supporting real-time computing, storage and applications, as well as rich service functions.

The Internet of Things refers to the connection between objects and the Internet. It can connect objects in the tangible world through sensors and other hardware, so that they can communicate through the network, thereby collecting, processing, analyzing and utilizing data to obtain various valuable information to provide managers with decision-making information. 12. Elaborate on the differences and connections between big data, cloud computing and the Internet of Things.

Answer: Big data is a technology that can process massive amounts of data and analyze this data to obtain valuable information to support enterprises in making the best management decisions. Cloud computing is an Internet technology that allows users to use virtualized IT facilities to achieve flexible computing capabilities, real-time computing, storage and applications, as well as rich service functions. The Internet of Things refers to the connection between objects and the Internet. It can connect objects in the tangible world through sensors and other hardware, so that they can communicate through the network, thereby collecting, processing, analyzing and utilizing data, thereby obtaining various useful information. Value information provides managers with decision-making information.

The relationship between big data, cloud computing and the Internet of Things is that cloud computing is the basis of big data analysis, because big data analysis can only be achieved when big data analysis requires big data analysis, and the emergence of cloud computing also makes big data Analysis becomes more convenient and faster. In addition, the Internet of Things can also be used as a data collection method for big data, connecting objects in the tangible world through sensors and other hardware, thereby collecting a large amount of valuable data and providing a data source for big data analysis.

Guess you like

Origin blog.csdn.net/qq_50530107/article/details/131260831