Which of the following umask settings will result in new files receiving the default permissions -rw-------?

A. 0177
B. 0600
C. 0188
D. 0688


Answer: A

Computer Science & Information Technology

You might also like to view...

When one process spawns another, the spawned process is referred to as the __________

A) ?trap process ? B) ?child process C) ?stack process D) ?parent process

Computer Science & Information Technology

State whether or not each of the following statements could be an integrity constraint of a checking account database for a banking application. Give reasons for your answers.

a. The value stored in the balance column of an account is greater than or equal to $0. b. The value stored in the balance column of an account is greater than it was last week at this time. c. The value stored in the balance column of an account is $128.32. d. The value stored in the balance column of an account is a decimal number with two digits following the decimal point. e. The social_security_number column of an account is de?ned and contains a nine-digit number. f. The value stored in the check_credit_in_use column of an account is less than or equal to the value stored in the total_approved_check_credit column. (These columns have their obvious meanings.)

Computer Science & Information Technology

What user account is known as the system administrator or super user account?

A. root B. sysadmin C. admin D. super

Computer Science & Information Technology

The top of the DNS hierarchy is called the ________domain

Fill in the blank(s) with correct word

Computer Science & Information Technology