____ are used in UNIX/Linux for granting permissions to one user or a group of users to access specific resources.

A. Collections
B. Associations
C. Aggregates
D. Groups


Answer: D

Computer Science & Information Technology

You might also like to view...

The UTF-8 character set includes only the characters used in the English language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Besides Excel, which program is often used to view the contents of a CSV file?

A) Notepad B) Word C) Publisher D) Outlook

Computer Science & Information Technology

One interesting problem that occurs in distributed-control, token-passing systems, is that the token may get lost. Indeed, if a token is not properly circulating around the network, no station can transmit. Comment on this problem. What safeguards can be built into a token-passing network to determine whether a token has been lost and then to restore proper operation of the network?

What will be an ideal response?

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following is NOT a reason that consumers purchase separate stand-alone devices?

A. They want to be able to use both devices at the same time. B. They want protection if the combined device breaks. C. The stand-alone device has more features than the combined device offers. D. They are practitioners of online integration.

Computer Science & Information Technology