Assume you are given the directory structure shown in Figure 4-2 on page 83 and the following directory permissions:
d--x--x--- 3 zach pubs 512 2013-03-10 15:16 business
drwxr-xr-x 2 zach pubs 512 2013-03-10 15:16 business/milk_co
For each category of permissions—owner, group, and other—what happens
when you run each of the following commands? Assume the working direc-
tory is the parent of correspond and that the file cheese_co is readable by
everyone.
a. cd correspond/business/milk_co
b. ls –l correspond/business
c. cat correspond/business/cheese_co
a. owner: OK; group: OK; other: Permission denied
b. owner, group, and other: Permission denied
c. owner and group: Is a directory; other: Permission denied
You might also like to view...
A String constructor cannot be passed ________.
a. char arrays. b. int arrays. c. byte arrays. d. Strings.
C parameters use the ______ of a variable
Fill in the blank(s) with the appropriate word(s).
Which aspect of strengthening the performance of IDPS may involve degaussing?
A. managing memory B. managing bandwidth C. managing storage D. managing processors
A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.
Fill in the blank(s) with the appropriate word(s).