This lab is an exercise to familiarize you with the University of Delaware computing environment. You will learn:
Reference Materials
“Introduction to Unix” , University of Delaware, Chapter 1, Sections 2.1-2.7.
Step 1: Getting an account and password
Every user of the University computer system must have three things: a login number or name, a password, and a project number. The project number for CISC105 Section 440 is 2026. Only students officially registered for the class are authorized for this project. You may already have a login number or login name and a password from previous classes or from having established an e-mail account. If so, skip to the next section. If not, you will need to take your student ID to the Student Services Building between 8:30am and 5pm Monday through Friday. You will find instructions there for getting your user ID and password. These instructions include passing an exam on ethical computing. After you complete the above, you may proceed with this lab. For now, look over the shoulder of someone who has an account.
Step 2: Logging in
A login window should already be on your screen when you sit down at your X-terminal.
Type in your user name or number in the space provided after Login:. Press the RETURN (or ENTER) key. Type in your password at the password prompt and press ENTER. If you receive an incorrect login message, your number/name and password combination is invalid. Perhaps you made a typo; try again. If you still cannot login, your account is not yet active.
Congratulations! You are now logged into the computer. You should see the “C shell” prompt, strauss.udel.edu%. This means that the computer is waiting for you to type commands for it to execute. Whenever you type commands to the computer, you will need to press the ENTER or RETURN key after each command to send it to the computer. When class is over or whenever you need to log out, skip to the last section.
Step 3: Changing your password
Your password is your security against unauthorized users tampering with your files. Your password should:
To change your password, type the command passwd. Follow the instructions that are displayed. When you change your password, the change is not immediate; it becomes effective sometime within the next twenty-four hours. The new password will be recognized by all of the composer computers. Do not forget your password. It is encrypted within the computer and no one can access it for you. If you forget it, go to Smith Hall 002A for help. You can change your password at any time by typing the passwd command.
Step 4: Creating a login name
Your initial login is a number that will uniquely identify you for as long as you are a computer user at the University of Delaware. However, it is more convenient to be known by a name rather than a number, so you can specify a login name for yourself. Note, however, that YOU CAN ONLY GIVE YOURSELF A USER NAME ONCE, and it cannot be changed thereafter, so choose a name that you can live with for a long time. Most people simply use their last name as their login name. Using just your last name is my recommendation since other people often have to guess your user name, for example, when sending you e-mail. The next most common approach is the first letter of your first name followed by your last name. Others choose more fanciful names such as starbaby, monsterman... The choice is yours; just remember, your login name is like a tattoo. Once selected, you cannot change it. To create a name, type the command username (and as always, hit ENTER or RETURN). You will be prompted to give the user name that you want. If you have been getting e-mail at your account which still has a user number, then you will now get e-mail addressed to your user name as well as your user number.
Step 5: Changing your default project
When you use a computer, you are in effect renting time on it, the cost of which is charged to a project number. At the University of Delaware, you may be authorized to use several projects. For example, most students are authorized to use an e-mail account which has project number 4000. You are now also authorized to use your class project number for doing computer work for this course. It has the project number 2026. Whenever you log on, the computer time that you use is automatically charged to a project called your default project. If you have an e-mail account, then project 4000 is probably your default. Check to see what project numbers you are authorized to charge your time against and which of these is your default project by typing the UNIX command chdgrp. Here is an example execution:
strauss.udel.edu% chdgrp Project Title Remaining Valid on hosts 1286 Research 6000.00 brahms chopin bach ravel 2026 CISC105440 300.00 copland strauss 4000 U. OF D. E-MAIL 50.00 brahms chopin bach ravel default group is currently 4000
In the above case, the user is authorized to use any of three projects, and the user’s default project when they logon is currently 4000. If project number 2026 is not included in your list, you are not currently authorized for the CISC105 class project. This is normal if you have just recently registered for the course. See the TA or Professor to be added to the project. After you have been added, complete this section. For now, skip to the next section. It is important that you use project 2026 when working on CISC105 assignments so that you receive any late announcements. There are two ways to do this; the second way is recommended:
strauss.udel.edu% chdgrp 2026 Changing default project for rugg password: The changes will be made within 24 hours
Step 6: E-Mail
Read the CNS User Services manual entitled “Introduction to Pine: A Menu-driven Electronic Mail Program”. For the first step of this lab assignment, send an e-mail message to both the instructor and the TA, with answers to the six questions below. IMPORTANT: In the Subject line of your mail message, be sure to include the keyword CISC105.
For full credit, you must send your message to both the instructor and the TA. This can be done through the use of the carbon copy capability of the mail system (putting both e-mail addresses as the recipients of the message) or by sending the same message two times.
Step 6: Logging out
Pull down the Root menu and hit “quit and logout”. You have successfully exited the system when the original login window appears. Never leave a terminal without logging out; otherwise the next user will have access to all your files! If you sit down at a terminal where the previous person left and did not log out, simply log that person out for him/her. Do not look around at that person’s files! Even looking without touching is an invasion of privacy and can get you in trouble.