what would the new umask value be? Files: rw-rw---- Directories: rwxrwx--x
Q: (a) Write a shell script to execute commands within scripts. Commands are- date, ls, ps -ef etc.…
A: #!/bin/bash # sequentially write the commands to be executed one after the other date # will…
Q: You need to use “Ubuntu 64-bit VM” to complete the following tasks. Task A: Familiar with the…
A: 1a. Display your current directory Command: pwd b. Use the echo command to print your name to the…
Q: Starting from the Linux default permissions for file and directories, what umask wouldyou use to…
A: Note: - As per the guidelines we can only answer a maximum of three subparts. Please resubmit the…
Q: Following the execution of the command umask 731, the permissions of all newly created files and…
A: Introduction; Permissions: In Linux operating system, the permissions are written in the format…
Q: QUESTION 48 Which of the following umask settings will result in new files receiving the default…
A: Answer (a):- 0177
Q: Consider the following access rights of file run.sh -rw-r-r- 1 luk dev 5 May 7 15:08 run.sh 1.…
A: Dear Student, The first digit in the 3digit numeral is to give permission to the file owner, the…
Q: Which command is used to delete files and directories?
A: Command to delete file: rm filename If the file is in another directory, first change the directory…
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: at command in linux is used to schedule a job to execute on perticular time.at command to run a…
Q: Consider the following interaction with shell $ myapp -bash: myapp: command not found Further, the…
A: Third option of the question is most correct. In unix operating system, whenever we enter a command…
Q: How do you set permissions in Linux using PuTTY for each shared directory so only the users and…
A: How do you set permissions in Linux using PuTTY for each shared directory so only the users and…
Q: In this assignment, your task is to create a bash script file 'assignment3.sh'. Assume a user runs…
A: The complete explanation is given below.
Q: You are given the command with arguments provided below. After a shift command is executed in…
A: Shift is a built-in command in bash which after getting executed, shifts/move the command line…
Q: Write a bash script that will copy all the .cc, .cpp, .c, and .h files to user defined folder, whose…
A: The following bash script copy all the .cc, .cpp, .c and .h files in the current directory to…
Q: 10. Which parameter describes the destination directory which would contain the archive? a)…
A: Question 10. Which parameter describes the destination directory which would contain the archive?…
Q: What are the permission of file01 after executing this command? chmod 777 file01 الاجابات…
A: chmod 777 file01 will give read, write, and execute permissions to everyone. 7 means rwx so for
Q: Give three different commands to get back to your home directory.
A: Note: As per policy we are entitled to answer 1 question at a time. cd: The cd command ("Change…
Q: A company has implemented a discretionary access control system for important documents and programs…
A: Discretionary Access Control (DAC) Discretionary Access Control (DAC) is a sort of access control…
Q: Write one or more bash commands to perform the following tasks. You may assume that each part of the…
A: echo #!bin/bash >> Question2.sh echo Name ID >> MyDetails.txt wc -w MyDetails.txt
Q: Write code that when executed in PowerShell, will satisfy the following requirements: • List all of…
A: PowerShell commands List all of the processes on a remote computer. use invoke command with script…
Q: Answer in the single command line. Follow the diagram in question 1 a: Display the list of files in…
A: According to the policy we are allowed to answer only first three subparts of the given question if…
Q: BELOW MCQ GIVEN ANSWER CAN BE MORE THAN ONE OPTION. PLEASE PROVIDE CORRECT ANSWERS.…
A: ANSWER C
Q: Write a script to back up a prompted filename use .bck for the backup file crontab to execute the…
A: backup contrab file create a folder (NOT in the a_html or www folder) to save the backup files.…
Q: Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is…
A: This mcq is based on NTFS permissions.
Q: A company has implemented a discretionary access control system for important documents and programs…
A: Discretionary Access Control (DAC) Discretionary Access Control (DAC) is a sort of access control…
Q: Write a program to ask customer what are the bucket name and folder name in AWS S3, and which local…
A: # program using python import boto3 # import boto3 library import os import sys # create connection…
Q: When the shell creates a new process to perform a command, how does it determine whether a file is…
A: Introduction: The access permission of a file aids in determining whether or not the file is…
Q: Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod…
A: a) mkdir -p dir1/dir2 -p will create the parent directory as necessary. if dir1 or dir2 doesn't exit…
Q: Which of the following statements are true of volumes? A spanned volume volume uses free space…
A: - We need to show the correct option regarding the volumes. - The options :- The first option…
Q: Question 7 Let us assume that we run the following command in the bash shell: ps ef grep 1909 The…
A: The following can be concluded from the given PID and PPID: Option 2 is True because the ppid of…
Q: Q-1: Write a shell script which can read the below mentioned file(mydata.txt), and it should print…
A: This question have multiple questions so I AM SOLCING the first one it is a linux awk command…
Q: To create the file, use the tar command with the -cf switches to create a new archive file. Use -z…
A: In this question we have to perform a lab task in which we need to compress a directory in a root…
Q: Create a hierarchy of three new directories at the same time with the names of: top, medium and low.…
A: In this question, we have to create three three new directories at the same time by following the…
Q: Consider the file scriptfile with the following permissions: rwxr-xr—- Who can run each of the…
A: The, given information is: USER GROUP OTHER $ source scriptfile $…
Q: You wish to configure the runlevels that a particular upstart daemon is started in. Whatshould you…
A: /etc/init is the directory that contains configuration files used by upstart to start, stop, reload,…
Q: The root user utilizes the chgrp command to give ownership of a file to another user.What must the…
A: chgrp command chgrp command is used for changing the group ownership of files or directory. Each…
Q: A special variable on the system called the umask (user mask) takes away permissions on new files…
A: A special variable on the system called the umask (user mask) takes away permissions on new files…
Q: using Linux/Unix, please Suppose that you want to block everyone (except you) at the main door…
A: Actually, given information: Suppose that you want to block everyone (except you) at the main door…
Q: What command (include the full syntax) would you use to change access control for the group to read,…
A: Since, there are multiple questions posted, we will answer for the first question. If you want any…
Q: Which of the following UNIX command can be used in symbolic mode to grant the following permissions…
A: r = read w =write x =executer - sign indicates that particular permission has been removed b…
Q: Assume that all the course syllabus in your working directory are named by a major çode of three…
A: Given :- Assume that all the course syllabus in your working directory are named by a majorcode of…
Q: Write the command that will create a tar archive of all the files in the directory named…
A: Write the command that will create a tar archive of all the files in the directory…
Q: When a shell creates a new process to execute a command, how does it know that file is executable?…
A: The access permission of a file helps to distinguish that file is executable or not. There are three…
Q: Q1 Answer the questions in detail 1.1)What MS-DoS command is used to remove or delete a directory?…
A: deltree command or rmdir command are used to delete or remove a directory.
Q: A file has the following permissions: r-- --x-w-. The command chmod 143 would havethe same effect as…
A: Permissions: In Linux operating system, the permissions are represented with the help of notions of…
Q: difference between asynchronously loading a script file and deferring the loading of the script file
A: <script>: <script src="mtscript.js"></script> Here, the HTML is parsed until the…
Q: 14. Which of the following is default permission set for directories? a) rw-rw-rw- b) rwxrwxrwx…
A: 14. Which of the following is default permission set for directories? a) rw-rw-rw- b) rwxrwxrwx c)…
Q: the command that will display all directories (ONLY) that meet the following criteria: * directory…
A: The dir command displays information about files and directories, and how much disk space is…
Q: In DAC a user is granted permissions to a resource by being placed on an access control list (ACL)?…
A: Answer: In DAC a user is granted permissions to a resource by being placed on an access control list…
Q: What are two ways you can execute a shell script when you do not have execute permission for the…
A: Actually, script is a program or sequence of instructions.
Q: a BASH command that concatenates the value of the variable FILENAME with the value of the variable…
A: Bash is a command language interpreter. It is widely available on various operating systems and is a…
Assume new files are created with default permissions of rw-rw-rw- and new directories are created with default permissions of rwxrwxrwx. What command would you execute to change the umask such that new files and directories had the following permissions, respectively? In other words, what would the new umask value be?
Files: rw-rw----
Directories: rwxrwx--x
Step by step
Solved in 2 steps
- Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod +w *.py e) grep -n ‘^[D-H]’ filename f) rm -rf dir1 How likely would you use the -f flag with the rm utility in the last command? Is it a safe way to manipulate directories?Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.Question 5 Given a file that appears on "ls -l" as follows... -rw-r--r--. 1 montclair MSU 39 Jan 16 20:15 test.txt ..after issuing the command, "chmod 754 test.txt", what would the new permissions look like? Group of answer choices: a. -rwxr-xr--. b. -rw-------. c. -rwxr-xr-x. d. -rwxr--r-x. Full explain this question and text typing work only thanks
- After typing the ls –F command, you see the following line in the output: -rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1What does this mean?* a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.You have created the directory structure and some base files to be used by the Web server and Web site. For the Web site to be created in a production environment, you need to package your commands in a script so that the patching team can run them on the production enviro nment. Your task for this assignment is the following: Create a Bourne shell script. The script should do the following: Explain what the script will do and who is the author in a comment area. cd to your home directory Show your current working directory. List the contents of the current directory. Create the directory structure and create the files as defined in the previous Individual Project. For each directory and file, test to see if the file or directory already exists; if it does exist, do not recreate; if it is missing, create it. In the end, generate a directory listing showing the structure and content of the new directories. At the beginning of the script, set a variable called INSTALL_DIRECTORY that…After typing the ls –F command, you see the following line in the output:-rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1What does this mean?a. User1 has read and write, members of the root group have read and execute, and allothers have read permissions to the file.b. Members of the root group have read and write, user1 has read and execute, and allothers have read permissions to the file.c. All users have read and write, members of the root group have read and execute,and user1 has read permissions to the file.d. User1 has read and write, all others have read and execute, and members of theroot group have read permissions to the file.
- A company has implemented a discretionary access control system for important documents and programs on a shared Linux server. Figure 1 shows the current implementation of the DAC system. It only applies to the directory /opt/company (you can ignore all files/directories that are not within this directory). The list of users is shown in the output from the firstls command; the members of each group is shown in the output of the tail command; the permissions are shown in the output of the second ls command. Assume the files are the objects, the subjects are the five users and there are four access rights: own, read, write and execute. Refer to Figure 4.2 and Table 2 in the textbook and complete the following subquestions I. Draw the Access Control Lists that illustrate the implementation on the Linux server; II. Draw the Capability Lists that illustrate the implementation on the Linux server; III. Build the Authorization Table that illustrate the implementation on the Linux server.At the command prompt, type find /root –name "sample" and press Enter. What files are listed? Why? the command prompt, type find /root –type l and press Enter. What files are listed? Why? At the command prompt, type rmdir undermysamples to delete and press Enter. Did the command work? Why? Next, type ls –F at the command prompt and press Enter. Were both directories deleted successfully?You need to send a backup copy of the /etc directory across the network. To create the file, use the tar command with the -cf switches to create a new archive file. Use -z as the preceding option to compress the file. In this lab, your task is to: Create a compressed archive of the /sales directory and all its contents Name the file /salesbkp.tar.gz and save it in the root directory (/).
- Following the execution of the command umask 731, the permissions of all newly created files and folders will be altered.What will the permissions be on all new files in this case? a. rw-rw-rw b.rwxrw-r--c. -- -r--rw d.-- --wx--xWhen a shell creates a new process to execute a command, how does itknow that file is executable? If it is executable, how does it distinguishbetween a shell script and a file produced by a compilation? What is correctsequence for checking the above cases?1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working directory 3. If the working directory is /home/max with a subdirectory named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. 4. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users…