A user cannot execute a script (collect.sh) she created and has sent you the contents of the script via email to inspect. After looking at the script, you determine the script is correctly written but permissions are the problem. What command can you issue to adjust the file's permissions as necessary?
A. chmod 555 collect.sh
B. chmod u+x collect.sh
C. rm collect.sh
D. chown root collect.sh
Ans: B. chmod u+x collect.sh
You might also like to view...
A code used by an ice cream store to order its products is 12DRM215-220. This code is deciphered in this manner: 12 stands for the count of items in the box, DRM stands for Dreamcicles (a particular kind of ice cream novelty), and 215-220 indicates the entire class of low-fat products carried by the distributor.
a. What kind of code is used? Describe the purpose behind each part (12, DRM, 215-220). b. Construct a coded entry using the same format and logic for an ice cream novelty called Pigeon Bars, which come in a six-count package and are not low-fat. c. Construct a coded entry using the same format and logic for an ice cream novelty called Airwhips, which come in a 24-count package and are low-fat.
In the past assembly language was popular, but then an entire group of new languages emerged to make programming easier, including BASIC, FORTRAN , Pascal, and COBOL.
Answer the following statement true (T) or false (F)
____ is a major contributor to reliable and robust programs.
A. Resolution B. Concatenation C. Encapsulation D. Identification
Describe the Lightweight Directory Access Protocol (LDAP) and explain how it is used by Windows Active Directory.
What will be an ideal response?