Define file permission in unix, Operating System

The permission function is used to calculate what, if any access each class or level of user has to each file on a Unix machine. The permission task is one of the data components stored in the inode table entry for the folder.

Every file has permission or protection attributes for 3 levels or classifications of machine user, i.e.

  • User (u)
  • Group (g)
  • Other (o)

These permissions are loaded using the ls -l command. The permission mask is spited into three areas, also named levels of permission. The left most group of three functions are those permissions that apply to the operator, or individual who contains the file.
In that case, ownership is calculated by the user identification number given when the file is build. Don't lay about the user identification number at that point, we'll see closely at it when we see at how your user record is prepared and stored.

 

2250_File permission in unix.png

Posted Date: 7/28/2012 8:17:32 AM | Location : United States







Related Discussions:- Define file permission in unix, Assignment Help, Ask Question on Define file permission in unix, Get Answer, Expert's Help, Define file permission in unix Discussions

Write discussion on Define file permission in unix
Your posts are moderated
Related Questions
Define properties of Distributed operating system Distributed:- This system distributes computation among several physical processors. The processors do not share memory or a

Define the Executor (Worker Thread)  The responsibility of the Executor (or Worker Threads) is to execute instructions on behalf of a client-server connection. The Executor mus

What is critical section? Every process has a segment code called the critical section, in which the process may be updating tables, changing variables, writing file and etc. W

. A paper mill produces two grades of paper viz., X and Y. Because of raw material restrictions, it cannot produce more than 400 tons of grade X paper and 300 tons of grade Y paper

SEGMENTATION HARDWARE An execution to map two-dimensional user-defined addresses into one-dimensional physical addresses. This mapping is affected by means of segment table. Ev

function of lazy swapper

Question: a) Each process is represented in the operating system by a process control block (PCB). The PCB contains many pieces of information associated with a specific proce


What are the drawbacks of contiguous allocation of disk space? The disadvantages are a. Suffers from internal fragmentation b. Suffers from external fragmentation c. F

How is memory management done using bit maps? A bit map is here in this we signify the bit value as 0 or 1. 1-hole 0-process In this we are able to represent the proce