Define file permission in unix, Operating System

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components stored in the inode table entry for the folder.

Every file has permission or protection attributes for 3 levels or classifications of machine user, i.e.

  • User (u)
  • Group (g)
  • Other (o)

These permissions are loaded using the ls -l command. The permission mask is spited into three areas, also named levels of permission. The left most group of three functions are those permissions that apply to the operator, or individual who contains the file.
In that case, ownership is calculated by the user identification number given when the file is build. Don't lay about the user identification number at that point, we'll see closely at it when we see at how your user record is prepared and stored.

 

2250_File permission in unix.png

Posted Date: 7/28/2012 8:17:32 AM | Location : United States







Related Discussions:- Define file permission in unix, Assignment Help, Ask Question on Define file permission in unix, Get Answer, Expert's Help, Define file permission in unix Discussions

Write discussion on Define file permission in unix
Your posts are moderated
Related Questions
What are kernels and what do kernels do? The kernel is a program that comprises the central core of a computer operating   system. It has entire control over everything that

Q. List the four steps that are essential to run a program on a completely dedicated machine. Answer: a) Reserve machine time b) Manually load program into memory c)

Banker's Algorithm In this analogy Customers ≡ processes Units ≡ resources, say, tape drive Ba

Write a short note on file organization and access. There are three methods to access files 1Record Access 2Sequential Access 3Random Access The record access

Evicting the most-recently used (MRU) page does very well on LRU's worst case. In general, however, MRU is a bad idea, since many programs exhibit temporal locality in their memory

time-stamping It is a method proposed by Lamport, used to sequencing events in a distributed machine without the use of clocks. This process is intended to order events consis

Synchronization can be achieved by means other than locks and condition variables. One alternative is semaphores. A semaphore is used to regulate traf?c in a critical section. A se

Define Middleware to Ease the Low-Level Protocol Burden Fortunately, many products are available today to ease the low-level protocol burden on the application programmer. Midd

What is the resident set and working set of a process? Resident set is that portion of the process image that is actually in real-memory at a certain instant. Working set is th

Is disk scheduling, other than FCFS scheduling, useful in a single-user environment? Explain your answer. In a single-user environment, the I/O queue usually is blank. Requests