Assuming that you have right to change permissions

Assignment Help Basic Computer Science
Reference no: EM133234585

Assuming that you have the right to change permissions for existing file food.txt, after which of the following command lines you can be sure that its permissions are:

- for the owner: at least readable and executable

- for the group: at least readable

- for the others: at least readable

chmod 755 food.txt

chmod 644 food.txt

chmod u+rx,g+r,o+r food.txt

chmod 544 food.txt

Reference no: EM133234585

Questions Cloud

What is purpose of rc script on freebsd system : What is purpose of rc script on freeBSD system ? How can user configure behaviour of rc and its script on freeBSD ?
Provided by off-site web analytics : Which of the following information would be provided by off-site web analytics? Google offers GA certification options for.
Masm and manual calculation : Provide Screenshots of Program, output using MASM and Manual calculation for:
Metrics are most associated with country happiness index : What related metrics are most associated with a country's happiness index? Highlight 2-3 trends you are seeing in the data.
Assuming that you have right to change permissions : Assuming that you have the right to change permissions for existing file food.txt, after which of the following command lines
Operate many flights using different aircraft-models : Pilots can operate many flights using different Aircraft-Models. Each tourist can book many flights, and each flight can hold many tourists.
Will be reviewing Android OS and iOS : Will be a reviewing Android OS and iOS, what are the similarities, advantages and disadvantages, cost, user friendliness, open source applications, etc.
Explain Windows processes and creation mechanisms : Explain Windows processes and their creation mechanisms. Explain the integration of physical memory and the page file.
What is transaction processing systems : What is the Transaction Processing Systems (TPS)? Explain the concept of ACID properties.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A visual aid to draw interest

A PowerPoint presentation is a visual aid in which well-designed slides help the audience understand complex information

  Design an algorithm to input student records

Design an algorithm to input student records; each record contains a student name, registration code, and credits field. A registration code of 1 indicates that the student is a resident. A registration code of 2 indicates that the student is a nonre..

  Logic flow chart with four methods

Create a Visual Logic flow chart with four methods. Main method will create an arrayof 5 elements, then it will call a read method, a sort method and a print methodpassing the array to each.

  Centralized-decentralized database management systems

Big Data brought its own challenges to the field of databases. What are these challenges, and how does the emerging NoSQL model address these challenges?

  Create an instance variable credit limit to indicate

Create another sub class CreditCustomer. Create an instance variable credit limit to indicate the maximum limit ($500). Credit customers get a markup of 2% on the order price.

  Name at least one recent high profile security intrusion

Name at least one recent high profile security intrusion.

  Issues of cyber crime and investigation

We have discussed the fact that law enforcement is currently not trained well in issues of cyber crime and investigation.

  Contrast theories of absolute and comparative advatages

Compare and contrast theories of absolute and comparative advatages. Explain Porter's "Diamond" model of national competitive advantage. Briefly describe some of the main instruments of trade policy that countries use to interfere with free trade.

  Develop a very brief computer and internet security policy

Your job is to develop a very brief computer and internet security policy for the organization - Internet acceptable use policy

  Difference between the OSI and TCP-IP models

Describe the difference between the OSI and TCP/IP models. Describe at which layer of the TCP/IP model each network device operates.

  Best practices for creating organizational units

Within companies, people are hired, fired, change departments, change their names, lose or forget their passwords.

  What are the advantages of integrating erm with strategy

What are the advantages of integrating ERM with strategy and strategy execution as described in this case?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd