Could you immediately find space.txt?

Step 1. Open SciTE from the GUI
a. Log on to the CyberOps VM as the user analyst using the password cyberops. The account analyst is used as the example user account throughout this lab.
b. On the top bar, navigate to Applications > CyberOPS > SciTE to launch the SciTE text editor.
c. SciTE is simple but includes a few important features: tabbed environment, syntax highlighting and more. Spend a few minutes with SciTE. In the main work area, type or copy and paste the text below:
“Space, is big. Really big. You just won’t believe how vastly, hugely, mindbogglingly big it is. I mean, you may think it’s a long way down the road to the chemist, but that’s just peanuts to space.” — Douglas Adams, The Hitchhiker’s Guide to the Galaxy
d. Click File > Save to save the file. Notice that SciTE attempts to save the file to the current user’s home directory, which is analyst, by default. Name the file space.txt and click Save.
e. Close SciTE by clicking the X icon on the upper right side of the window and then reopen SciTE.
f. Click File > Open… and search for the newly saved file, space.txt.
g. Even though SciTE is looking at the correct directory (/home/analyst), space.txt is not displayed. This is because SciTE is looking for known extensions and .txt is not one of them. To display all files, click the dropdown menu at the bottom of the Open File window and select All Files (*).
h. Select space.txt to open it.


No

Computer Science & Information Technology

You might also like to view...

_________ is a protocol to allow X.509 certificates, commonly used for Transport Layer Security (TLS), to be bound to DNS names using DNSSEC.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following involves stealing another person's personal information, such as a Social Security number, and then using the information to impersonate the victim, generally for financial gain?

A. White hat hacking B. Identity theft C. Cyberterrorism D. Digital fraud

Computer Science & Information Technology

____ refers to the intensity of a color.

A. Scale B. Brightness C. Vibrance D. Dominance

Computer Science & Information Technology

Over the past week, every time Larry has started his computer, he has noticed that the time is not correct. Larry didn’t consider this a problem because his computer was working properly. However, now Larry has decided that he should investigate why the time is not accurate. ? What can you tell Larry to check to find out why the clock does not keep the right time?

A. POST is failing. B. The internal time clock is malfunctioning. C. The motherboard is going bad and needs to be replaced. D. The CMOS battery is bad and needs to be replaced.

Computer Science & Information Technology