What are the three basic file protection schemes available in LINUX?

What will be an ideal response?


The following are the three basic file protection schemes available in LINUX.
1. Password based protection
2. Encryption based protection
3. Protection based on access privileges

Computer Science & Information Technology

You might also like to view...

Which of the following is not a phase of the program-design process?

a. Problem-solving b. Implementation c. Marketing the final program

Computer Science & Information Technology

Which of the following statements is true?

a. Ranges of characters can be represented by placing a ~ between two characters. b. [^Z] is the same as [A~Y]. c. Both “A*” and “A+” will match “AAA”, but only “A*” will match an empty string. d. All of above.

Computer Science & Information Technology

Which of the following statements is true of retargeting?

A. It is targeted at approximately 50% of Website visitors who shop using smartphone applications. B. It employs personalized ads to direct shoppers back to a retailer's Website they previously abandoned. C. It attempts to change buying habits of Web shoppers to get them to consider products they have never considered purchasing before. D. It attempts to change buying habits of Web shoppers by getting them to visit Websites they have not visited before.

Computer Science & Information Technology

What is an anonymous class?

What will be an ideal response?

Computer Science & Information Technology