What CLI is used to select and modify a file as to who has what level-of-use permission?

A) chmod
B) chown
C) iwconfig
D) pwd


A

Computer Science & Information Technology

You might also like to view...

_____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.

A. Secure Sockets Layer (SSL) B. Card Verification Number C. Virtual private network (VPN) D. Payment Card Industry (PCI)

Computer Science & Information Technology

When software is uninstalled or removed from the system, the _____ files have to be modified accordingly.

A. Registry B. Buffer C. Program D. System

Computer Science & Information Technology

If you specify only a filename for the background-image property, the image is automatically ____ to cover the entire element.

A. concatenated B. separated C. tiled D. floated

Computer Science & Information Technology

What can you not import from one Access database into another Access database?

A) Sheets B) Forms C) Tables D) Reports

Computer Science & Information Technology