Write the same command using the octal number code

Assignment Help Computer Engineering
Reference no: EM133370875

a. Set all files with extensions .html in the current directory and all its subdirectories to be readable, writeable and executable their owner and only readable (not writeable or executable) by groups and others. Achieve this by using the standard letter code arguments for granting and removing permissions. Note: Some of the files have spaces in their name which will confuse the relevant commands you'll need. Read the man pages for options on handling file names with spaces.

b. Write the same command using the octal number code arguments to grant/remove the permissions

For a, I tried: find . -name '*.html' -type f -exec chmod u+rwx,g+r,o+r {} ;

For b, I tried find . -name '*.html' -type f -exec chmod 744 {} ;

Reference no: EM133370875

Questions Cloud

Diagram depicting the storage requirements : Description of the size of Big Data and storage requirements. Explaining the process of Extract, Transform, and Load
Discuss ethical situation : Analyze and discuss an ethical situation that you had to face at work or within another organization and the decision you made.
Discuss what the actual intent of the policy was : Discuss what the actual intent of the policy was and what the unintended health consequences of that policy were. Discuss how you think these consequences
How do you think this theory was helpful : Provide the article title, author, and year. Give a brief summary of the purpose of the article. Explain which theory you chose, and how it is used
Write the same command using the octal number code : Write the same command using the octal number code arguments to grant/remove the permissions - Some of the files have spaces in their name which will confuse
Why is only one of the fuzzy matches in the first match : Why is only one of the fuzzy matches in the first match a likely match and not the remaining ones and What additional data would be useful to understand
Meeting with potential clients : You are an American businessperson who will be meeting with potential clients from Sweden. Which negotiating site would give you the greatest advantage?
Examine the error information, and then click copy formula : Examine the error information, and then click Copy Formula from Above. Examine the error in cell J8, and then click Copy Formula from Left
What violation of decorum and civilly could be witnessed : What risky behavior could have been experienced or observed? What violation of decorum and civilly could be witnessed?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyse cryptographic techniques for data security

Describe and explain the role and function of network connectivity in current computing. Analyse cryptographic techniques for data security.

  Develop in accordance with the system development life cycle

Record all tasks, subtasks, resources, and time related to the project. Outline the planning, analysis, design, and implementation phases. Develop in accordance with the systems development life cycle (SDLC).

  The decades to include various methodologies

The System Development Life Cycle has developed over the decades to include a variety of Methodologies. Each of these Methodologies utilizes the same methods in a different way. define the primary SDLC Methodologies, their advantages and disadvant..

  Write a powershell script that takes-receives two arguments

Displays all the processes with -ProcessName comprising string 'win' ordered by their IDs

  Discuss two competencies needed by public managers

Discuss two competencies needed by public managers to interface with policy informatics project. Discuss 3 competencies required by policy informatics analyst.

  Display how many bytes oldschoolstring actually requires

Calculates (so not a hard-coded value) and displays how many bytes oldschoolstring actually requires.

  Conduct a small research project

Conduct a small research project aiming to answer a question related to a topic in SIT111. Create a plan to outline the question and method for your research

  Considering the mistakes made by the police department and

perhaps one of the most famous and publicized crime stories in contemporary america occurred in june of 1994 when the

  Design a pda to accept the language by either final state

Design a PDA to accept the language by either final state or by empty stack, whichever is most convenient for the particular language

  Why a website would need to be redesigned

Why do you think it is important to always be planning the next site redesign for a company.

  Implementing the callback function using mouse and keyboard

Implementing the Callback Function using Mouse and Keyboard. The goals of assignment are to familiarize yourself with the OpenGL command of rendering pipeline

  Convert both ways with one textfield and one button

Design a graphical user interface (GUI) to show the conversion. For instance be able to convert both ways with one textfield and one button.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd