File protection based on access permissions is provided by a mechanism that prevents users from accessing each others’ files when they are not logged on as the owner of a file. As the owner of a file, you can attach certain access rights to the file that dictate who can and cannot access it for various types of file operations. This scheme is based on the types of users, the types of access permissions, and the types of operations allowed on a file under LINUX. Without such a protection scheme, users can access each others’ files because the LINUX file system structure (see Figure 7.2) has a single root from which hang all the files in the system. The number of protection bits needed to implement this scheme is equal to the product of the number of types of users and the number of types of

What will be an ideal response?


The read permission on an ordinary file allows you to read the file, including displaying it on the monitor screen by using, for example, the cat command. When the read permission is set for a directory, you can read the directory. In particular, you can use the ls command to display the contents of the directory (i.e., the names and other attributes of the files and directories in it).
The write permission on an ordinary file allows you to edit the file, including writing and deleting the file’s contents by using an editor such as vi. You can also delete a file if you have the write permission for it. When the write permission is set for a directory, you can create new directory enteries (files and directories) in it as well as delete the existing enteries. In particular, you can use an editor or the cat, cp, mv, mkdir, and rmdir commands to add and delete files and subdirectories in the directory that you have the write permission for.
The execute permission on an ordinary file allows you to execute the file. You have to set the execute permission for a file that contains a binary executable code or a shell script before the script (or binary code) can be executed. The execute permission for a directory allows you to search the directory. Thus you can list the contents of the samples directory by using the ls ~/unixbook/scripts/samples command if you have the execute permission for the unixbook directory in your home directory and the scripts directory under ~/unixbook, and search and read permissions for samples. If you do not have search permission for a directory, you cannot make that directory your current directory by using the cd command.

Computer Science & Information Technology

You might also like to view...

If the field is automatically renamed, it may occur because:

A) the field in the query was created from data not in the table. B) the field in the query is a sum. C) the field in the query needed to be resaved. D) the field in the query exists twice.

Computer Science & Information Technology

Case Question 1Quinn is a Web designer working on a new Web site.  In order for Quinn and other designers to easily understand the structure of the pages on his site, Quinn decides to add comments to the HTML code. Referring to the figure above, prior to choosing Insert Comment, Quinn should ____ .

A. place the cursor where he wants the comment to appear, making sure he does not click within the code B. change the color of the surrounding text so that the comment is easily seen C. start and save a comment file associated with his current code D. choose whether or not the comments will be hidden or displayed

Computer Science & Information Technology

What command can you use to test the NIC's ability to send and receive packets?

A. arp-a B. ping 255.255.255.255 C. ping 127.0.0.1 D. ipconfig

Computer Science & Information Technology

What method is used for opening a SQLiteOpenHelper database?

a. getWritableDatabase() b. getDatabase() c. openDatabase() d. initWritableDatabase()

Computer Science & Information Technology