Define file permission in unix, Operating System

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components stored in the inode table entry for the folder.

Every file has permission or protection attributes for 3 levels or classifications of machine user, i.e.

  • User (u)
  • Group (g)
  • Other (o)

These permissions are loaded using the ls -l command. The permission mask is spited into three areas, also named levels of permission. The left most group of three functions are those permissions that apply to the operator, or individual who contains the file.
In that case, ownership is calculated by the user identification number given when the file is build. Don't lay about the user identification number at that point, we'll see closely at it when we see at how your user record is prepared and stored.

 

2250_File permission in unix.png

Posted Date: 7/28/2012 8:17:32 AM | Location : United States







Related Discussions:- Define file permission in unix, Assignment Help, Ask Question on Define file permission in unix, Get Answer, Expert's Help, Define file permission in unix Discussions

Write discussion on Define file permission in unix
Your posts are moderated
Related Questions
The code should be nicely formatted with plenty of comments. It should be easy to read, properly The summary section should include three parts: (1) Record the running t

File structure Certain files must conform to a needed structure that is understood by the operating system. The operating system may consist that an executable file has a parti


What is spooling? Spooling overlaps the I/O of single job with the computation of other jobs.

Show the search tree generated by Hill-Climbing search (text figure 4.2, page 122; or Local Search lecture, slide 6) for each of the two heuristics (a) and (b) applied to the follo

List operations to be performed on directories. Search for a file, delete a file, create a file, list a directory, rename a file, and traverse the file system.

Q. Show that a few schedules are possible under the two-phase locking protocol however not possible under the timestamp protocol and vice versa. Answer: A schedule that is auth

What is an I/O subsystem? The control of devices connected to the computer is a main issue while designing operating systems. Because I/O deices differ widely in their function

What is multiprogramming? Multiprogramming: The management of many processes within a single processor system. Operating systems such like UNIX provide multiprogramming for sha

What are the phases of background processing? Phases are:- Job Scheduling. Job Processing. Job Overview.