What will the permissions string contain

Assignment Help Programming Languages
Reference no: EM13754689

The developer, phavard, is a member of the "dev" group.  All members of the "dev" group, including phavard, have all permissions on the "/export/home/phavard/project38" folder so that they can all work on the files for the project.  phavard owns the project38 folder and the iapp_v_8 file contained in the folder.   phavard has given "user" read/write/execute and "group" read/execute permissions on iapp_v_8.  All "Others" have read privileges on project38 and no privileges on the files it contains.

a. If you execute ls -ld on the project38" directory, what will the permissions string contain?

b. If you execute ls -l on the iapp_v_8 file contained in project38 , what will the permissions string contain?

phavard has created a phone list that is located in the project38 folder and she would like everyone to be able to edit the phone list. The name of the file everyone needs to edit is:

/export/home/phavard/project38/phone_list.txt.

c. Given the permissions described above, are "others" able to see phone_list.txt by listing the contents of project38.

d. What permissions will phavard have to grant to others on the project38 directory in order to allow others to edit phone_list.txt.

e. Provide the code to grant the required  permissions for "d".

f. What are the minimum permissions phavard will have to grant to "dev" and "others" on the phone_list.txt file in order to allow them to edit phone_list.txt.

g. Provide the code to grant the required  permissions for "f"

Given the following information from a session log:

bash>ls  -ld  /export/home

drwx  r- x r- x   1  phavard           dev        512         Feb  9 12:12        phavard
drwx  r- x r- x   1  bjones              dev        512         Feb  9 12:13        bjones
drwx  r- x r- x   1  lao                      dev        512         Feb  9 12:13        lao

bash>ls  -l  ../export/home/phavard

drwx r- x r- x    1  phavard           dev        512         Feb 3 12:13         project38

bash>ls   -l  /export/home/phavard/project38

- rw - r- -  r - -    3 phavard       admin   5             Feb  9 12:29        iapp_v_8

h. Draw the file system described by the commands above. Include the location of iapp_v_8.  Show the permissions strings for each directory and iapp_v_8.

i. Can bjones edit the file iaap_v_8?

j. Is bjones "user", "group", or "other" with respect iapp_v_8?

k. Can members of the group "admin" update the file iapp_v_8?

l. Is bjones "user", "group", or "other" with respect to project38?

m. If necessary, how would phavard grant permissions on iapp_v_8 to bjones that would allow bjones to edit the file? Show the command

n. Assume bjones logs in and is in his home directory.  Show two commands that would change bjones's working directory from /export/home/bjones to /export/home/phavard/project38

o. Provide the command that phavard would use to grant bjones the ability to add files to /export/home/phavard/project38.

p. Assume project 38 has reached a milestone. The permissions on the directory and it's files must be changed so that no changes can be made to the contents of the directory or to any of its files. 
What command is needed to change the directory permissions to the appropriate permissions?  Show the command.

q. What command is needed to change the permission on files in project38 so that the files cannot be altered?  Show the command.

Reference no: EM13754689

Questions Cloud

Sears conducted a quality control study on the car : Sears conducted a quality control study on the car batteries that customer purchase off of the shelf. 50 batteries are selected and it is determined that 6 are defective and 44 are functioning properly. This is a binomial experiment. Select the appro..
Why was rachel carson so worried about the use of ddt : Why was Rachel Carson so worried about the use of DDT? How did her book usher in the environmentalist movement?
Describe the purpose of a risk assessment : Describe the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Select risk assessment methodology and give your rationale behind the one you chose.
Analyze the conflict between traditionalism and modernism : Identify and analyze the conflict between traditionalism and modernism during the 1920's. Create a 2 column organizer in notes indicating manifestations of both traditionalism and modernism.
What will the permissions string contain : If you execute ls -ld on the project38" directory, what will the permissions string contain? If you execute ls -l on the iapp_v_8 file contained in project38 , what will the permissions string contain
What tool of monetary policy will the federal reserve : What tool of monetary policy will the Federal Reserve use to increase the federal funds rate from 1% to 1.25% - If the Federal Reserve increases the required reserves, financial institutions will likely lend out
Question regarding the money management : Most money managers have a portion of their compensation tied to the performance of the portfolios they manage. Explain how this arrangement can create an ethical dilemma for the manager and suggest a way to ensure ethical behavior.
Symptoms of post traumatic stress disorder : What are the diagnostic criteria for and symptoms of Post Traumatic Stress Disorder (PTSD). How do people's perceptions and coping strategies play a role in the development of this disorder? Who is at risk for PTSD?
Effect on project npv : What is the effect on project NPV, if sales increase from $11.5 million to $13.5 million?

Reviews

Write a Review

Programming Languages Questions & Answers

  Write program which prompts for boiling point of substance

Write program which prompts user for observed boiling point of substance in Centigrade and identifies substance if observed boiling point is within 5% of the expected boiling point.

  Write program to enter name-number of planet from sun

Write down the program which permits the user to enter name of planet, and then prints message stating that planet's number when counted outward from sun.

  Write logic for application for company which wants reports

Write logic for the application for company which wants report containing breakdown of payroll by department. Input includes each employee?s last name, first name, department number.

  Implicit unsafe type conversions-statements and expressions

Write a report using APA format for references that researches the definition of the language with respect to implicit unsafe type conversions in both assignment statements and expressions.

  Create set-list of enumerated constants called week

Create set/list of enumerated constants called week which contains days of week. Have variable called today that is of kind week. Allot a value to today.

  Problem related to reading file and doing averege

First the program must read a text file (The user must be able to write the name of the text file) , the text file contains the following: the expenses the company is going to spend. Text file example: Keywords:, #best_project_ever, Expenses:, Equi..

  What runtimeexception if any will the following program

q1. what runtimeexception if any will the following program throw?class exception1 public static void mainstring

  Write a program to operate the barriers

The entrance to the car park is on the left hand side. When a car drives into the car park there is a sensor that detects the car and this should cause the barrier to be opened to allow the car in.

  Write ipo steps and detailed pseudo code for program

Write IPO steps and detailed pseudo code for program which will ask user to enter restaurant meal cost. The program should then compute the tax, tip on the restaurant bill,

  Program to swap values from variables

Given two int variables, firstPlaceWinner and secondPlaceWinner , write some code that swaps their values. Declare any additional variables as necessary.

  Write a program to define constant

Display each of these constants in decimal, in hexadecimal, and as a character usingcout.

  Pogram to recognize the particular memory location

The 12-bit address recognizes the particular Memory location or I/O device. Illustrate the program execution for following programs.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd