Assume you are given the directory structure shown in Figure 4-2 on page 83 and the following directory permissions:

d--x--x--- 3 zach pubs 512 2013-03-10 15:16 business
drwxr-xr-x 2 zach pubs 512 2013-03-10 15:16 business/milk_co
For each category of permissions—owner, group, and other—what happens
when you run each of the following commands? Assume the working direc-
tory is the parent of correspond and that the file cheese_co is readable by
everyone.
a. cd correspond/business/milk_co
b. ls –l correspond/business
c. cat correspond/business/cheese_co


a. owner: OK; group: OK; other: Permission denied
b. owner, group, and other: Permission denied
c. owner and group: Is a directory; other: Permission denied

Computer Science & Information Technology

You might also like to view...

A String constructor cannot be passed ________.

a. char arrays. b. int arrays. c. byte arrays. d. Strings.

Computer Science & Information Technology

C parameters use the ______ of a variable

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which aspect of strengthening the performance of IDPS may involve degaussing?

A. managing memory B. managing bandwidth C. managing storage D. managing processors

Computer Science & Information Technology

A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology