uli101_week4_practice
.docx
keyboard_arrow_up
School
Seneca College *
*We aren’t endorsed by this school
Course
101
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by ChancellorDragonfly3067
ULI101 Data Representation / File Permissions Practice
_____________________________________________________________________________
Instructions:
This handout is just for practice. It is the responsibility of the student
to attend class to mark
their own
work in class when your professor takes up this exercise. You are NOT required to
hand this practice sheet into your professor (keep it for future practice).
The answers to this handout will NOT
be posted or emailed to students.
1.
List the
number of digits
for the following numbering systems:
Decimal = 10
Binary = 2
Octal = 8
Hexadecimal = 16
2.
Write a simple chart to show which values are represented for letter
A - F
for a hexadecimal number.
A 10 - 1010
B 11 - 1011
C 12 - 1100
D 13 - 1101
E 14 - 1110
F 15 - 1111
3.
How many
binary
digits does 1
octal
digit represent?
3
4.
How many
binary
digits does 1
hexadecimal
digit represent?
4
5.
Use manual
numbering conversion to complete the table displayed below.
1
PAGE
ULI101 Data Representation / File Permissions Practice
_____________________________________________________________________________
6.
Write the
chmod
command (using the
symbolic
method) to set “
pass-through
”
permissions (eg.
r w x - - x - - x
) for your
home
directory using an
absolute pathname
.
Also, write a Linux command to verify that permissions where set.
Chmod a+rwx /home/username
7.
Perform a binary to octal numbering conversion
for the permissions:
r w x - - x - - x
Write single Linux command to set “
pass-through
” permissions for your
home
directory
but use the
absolute method
(i.e.
octal
numbers).
r w x - - x - - x
111 001 001
7 1 1
chmod 777 /home/username
8.
Write a single Linux command to
add read
permissions
for
same group members
for
the
~/tests
directory. Use the
symbolic
method.
chmod g+r ~/tests
9.
Write a single Linux command to
remove
write
permissions
for
same group members
and
other group members
for the
~/projects
directory. Use the
symbolic
method.
chmod go-w ~/projects
10.
Write a single Linux command to set the permissions for the
~/assignments
directory
to the following using the
absolute
method (i.e. octal numbers):
r w x r - x - - x
NOTE:
Show your work to perform a
binary
to
octal
conversion.
111 101 001
7 5 1
chmod 751 ~/assignments
2
PAGE
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
in the FILE structure :
What two fields we used to determine the size of the internal buffer allocated :
Group of answer choices
read_ptr and write_ptr
base and end pointer
flags and fileio
all of the above
arrow_forward
7. What new files should you create to help eliminate the data redundancies found
in the file shown below?
UNC CODE JOB_CHO HOUR PROJ HOURS EM PHONE
133 653-234-3245
16.2 653-224-1123
14.3 615-233-6568
19.0.653-234-3254
175 905-554-7012
116615-223 5680
23.4 553-234-1123
19.1615-233-5432
207 615-878-6679
PROJUNUM PROJ NAME EMP NUM,
1 Huricane
1 Hunicane
1 Humicane
BMP NAME
101 JOh D Newson
105 David F. Schwann CT
EE
85 DO
E0.00
60.00
110 Ave R. Romeras
EE
CT
101 John D. Newwoon
05.00
2 Cuast
2 Coast
3 Satelite
3 Sotelite
108 June H Sottieme
EE
65.00
62.00
26.00
110 Anne R. Renoras
cr
105 David F Schwern CT
55.00
123 Mary D Chen
112 Alecia R. Smith
EE
3 Satelte
DE
05.00
3 Satelite
arrow_forward
Symbian, Android, and the iPhone all employ the same file deletion mechanism.
arrow_forward
Describe the format of a read buffer, along with the code for the rio_readinitb function that initializes it.
arrow_forward
In an MS-DOS filename entry, identify the six possible status byte values.
arrow_forward
What is the function of a master file that contains largely permanent data?
arrow_forward
Instructions
Your job is to write a program to encrypt outgoing messages and decrypt incoming messages using a Vigenere Cypher.
In this assignment, you will parse a string of words from a file into tokens using the strtok_s command with pointers and then use the Vigenere Cypher algorithm to encrypt and decrypt the parsed words.
Before you can perform any encryption/decryption activities, the first step is to read in messages from a file and parse the messages into individual words.
The Program: Setting up classes and understanding tokenization
The first step in encrypting/decrypting messages is to parse the messages into words before applying the encryption/decryption algorithms to them. This parsing process is called “tokenization.”
Read the contents of a file into this array using the getline command.
The objective of this assignment is to demonstrate the use of pointers in a program utilizing c-strings and tokenization. The use of pointers is foundational in C++. This…
arrow_forward
Outside of the standard read, write, and execute access, what are some additional kinds of access that users may wish to offer to code or data?
arrow_forward
The meaning of a file extension must be kept distinct from its visual representation in a file.
arrow_forward
This article will define file extensions and identify the software responsible for their creation. Specific instances should be offered.
arrow_forward
Structural in-dependence exists when it is
possible to make changes in the file structure
without affecting the application program's
ability to access the data.
Select one:
True
False
arrow_forward
What is the purpose of a Master file with primarily permanent data?
arrow_forward
The method of file organization in which data records in a file are arranged in a specified order according to key field is known as the
(A) Sequential access method
(B) Queuing method
(C) Predetermined method
(D) Direct access method
arrow_forward
The___________ property stores an integer that represents the location of the record pointer in a dataset.a. BindingNavigator object’s Positionb. BindingSource object’s Position
c. BindingSource object’s Locationd. TableAdapter object’s Location
arrow_forward
What is the purpose of a Master file that contains mostly permanent data?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning
Related Questions
- in the FILE structure : What two fields we used to determine the size of the internal buffer allocated : Group of answer choices read_ptr and write_ptr base and end pointer flags and fileio all of the abovearrow_forward7. What new files should you create to help eliminate the data redundancies found in the file shown below? UNC CODE JOB_CHO HOUR PROJ HOURS EM PHONE 133 653-234-3245 16.2 653-224-1123 14.3 615-233-6568 19.0.653-234-3254 175 905-554-7012 116615-223 5680 23.4 553-234-1123 19.1615-233-5432 207 615-878-6679 PROJUNUM PROJ NAME EMP NUM, 1 Huricane 1 Hunicane 1 Humicane BMP NAME 101 JOh D Newson 105 David F. Schwann CT EE 85 DO E0.00 60.00 110 Ave R. Romeras EE CT 101 John D. Newwoon 05.00 2 Cuast 2 Coast 3 Satelite 3 Sotelite 108 June H Sottieme EE 65.00 62.00 26.00 110 Anne R. Renoras cr 105 David F Schwern CT 55.00 123 Mary D Chen 112 Alecia R. Smith EE 3 Satelte DE 05.00 3 Satelitearrow_forwardSymbian, Android, and the iPhone all employ the same file deletion mechanism.arrow_forward
- Instructions Your job is to write a program to encrypt outgoing messages and decrypt incoming messages using a Vigenere Cypher. In this assignment, you will parse a string of words from a file into tokens using the strtok_s command with pointers and then use the Vigenere Cypher algorithm to encrypt and decrypt the parsed words. Before you can perform any encryption/decryption activities, the first step is to read in messages from a file and parse the messages into individual words. The Program: Setting up classes and understanding tokenization The first step in encrypting/decrypting messages is to parse the messages into words before applying the encryption/decryption algorithms to them. This parsing process is called “tokenization.” Read the contents of a file into this array using the getline command. The objective of this assignment is to demonstrate the use of pointers in a program utilizing c-strings and tokenization. The use of pointers is foundational in C++. This…arrow_forwardOutside of the standard read, write, and execute access, what are some additional kinds of access that users may wish to offer to code or data?arrow_forwardThe meaning of a file extension must be kept distinct from its visual representation in a file.arrow_forward
- This article will define file extensions and identify the software responsible for their creation. Specific instances should be offered.arrow_forwardStructural in-dependence exists when it is possible to make changes in the file structure without affecting the application program's ability to access the data. Select one: True Falsearrow_forwardWhat is the purpose of a Master file with primarily permanent data?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning