Which of the following UNIX command can be used in symbolic mode to grant the following permissions to Name.txt file. Owner –Read,write and execute , group -remove execute , Others-only read O a. chmod -u=rwx, g-x, o=r Name.txt O b. chmod -u=rwx, g-rw+X, o=rw Name.txt O c. chmod -u=r, g-rw+x ,o=rw Name.txt O d. chmod -u=rw, g-rw ,o=rw Name.txt
Q: Which of the following commandsshould be run following the installationof a shared library to update…
A: Please find the answer below :
Q: What does . in a pathname represent? In which type of pathname does it normally specified?
A: Represents current directory and is normally specified relative pathname
Q: You have modified the /etc/aliases file to include a new e-mail alias. However, when yousend e-mail…
A: Modifying the alias file After the modification to the file, then the command for new alterations…
Q: QUESTION 48 Which of the following umask settings will result in new files receiving the default…
A: Answer (a):- 0177
Q: Which of the following commands will change the user ownership and group ownershipof file1 to user1…
A: "chown" command: In Linux operating system, "chown" command is used to change the group ownership…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: The given questions are multiple choice selected question so I can explain in detail below step.
Q: Using the "at" @ command, schedule the commands below to run at 11:30pm, three days from when you…
A: at command in linux is used to schedule a job to execute on perticular time.at command to run a…
Q: ich one of the following tool deletes your files/data permanently. a. Change Directory b. SDelete c.…
A: Given: Which one of the following tool deletes your files/data permanently.
Q: You are given the command with arguments provided below. After a shift command is executed in…
A: Shift is a built-in command in bash which after getting executed, shifts/move the command line…
Q: What are the permission of file01 after executing this command? chmod 777 file01 الاجابات…
A: chmod 777 file01 will give read, write, and execute permissions to everyone. 7 means rwx so for
Q: Write down a Unix command that will update the security permissions on a file named file1.txt such…
A: The solution to the given problem is below.
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: Answer the above question are as follows
Q: SECTION B below. Write Linux commands to complete the actions below bin tmp usr var etc home opt bin…
A: Our bounded restrictions are to answer the first three subparts only. - The question is to…
Q: BELOW MCQ GIVEN ANSWER CAN BE MORE THAN ONE OPTION. PLEASE PROVIDE CORRECT ANSWERS.…
A: ANSWER C
Q: After typing the command umask 731, the permissions on all subsequently created filesand directories…
A: Permissions: In Linux operating system, the permissions are written in the format where, The…
Q: Iba is modifying the basic NTFS permissions for a folder. She wants to enable the permission that is…
A: This mcq is based on NTFS permissions.
Q: Q2: Write the command to launch a streaming job for a python mapper.py and reducer.py if you know…
A: import sys # Input takes from standard input for myline in sys.stdin: # Remove whitespace…
Q: Which of the following commands locates the current directory in the directory hierarchy? wcd pwd…
A: Step 1 The correct answer is given in the below step with an explanation.
Q: Linux Quiz (Accurate answers please!) Write the command to create a directory
A: Given: Write the Linux commands.
Q: Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod…
A: a) mkdir -p dir1/dir2 -p will create the parent directory as necessary. if dir1 or dir2 doesn't exit…
Q: Question 7 Let us assume that we run the following command in the bash shell: ps ef grep 1909 The…
A: The following can be concluded from the given PID and PPID: Option 2 is True because the ppid of…
Q: To create the file, use the tar command with the -cf switches to create a new archive file. Use -z…
A: In this question we have to perform a lab task in which we need to compress a directory in a root…
Q: Which file systems themselves automatically check the integrity of the file system and recover…
A: Here, I have to choose options for the above questions.
Q: Use the mkdir command to add a directory named test2 in your home directory. Use one command to…
A: Answer: The code line for this in UBUNTU are: # Create a new directory test2 in your home directory…
Q: Which command is used to feed the contents of a text file to the stdin of another command with a…
A: cat command can be used to concatenate files and redirect output in terminal or files.
Q: In JSLinux ,which of the following UNIX command can be used in absolute mode that grant the…
A: The correct answer is chmod 611 Read.txt i.e., option c. Chmod 611 (chmod a+rwx,u-x,g-rw,o-rw)…
Q: what would the new umask value be? Files: rw-rw---- Directories: rwxrwx--x
A: UMASK in Linux or Unix systems is known as User Mask or it is also called as User file creation…
Q: What is the output of the following shell command? 180 080 0:0 0:0 0: cat data.csv | awk -F (print…
A: Answer:- Correct Option is b. the number of lines in the file data.csv
Q: Which of the following commands checks a file system for errors? a. cd b. ping C. cls d. chkdsk
A: Hello Student. Warm welcome from my side. Hope you are doing great. Here's your answer.
Q: Which of the following is the default permission set for the /root directory? O a. drwxrwxrwx O b.…
A: The default permission for the root directory is as follows:
Q: which command is used to modify password of user الاجابات pwd passwd useradd userdel…
A: Please give positive ratings for my efforts. Thanks. ANSWER 1) passwd is used to modify the…
Q: 9. Which of the following commands displays user id in its output? A. Is B. help C. date D. Is -1…
A: 9) ls id command is command which can print real and effective User ID (UID) and Group ID (GID)…
Q: Which file contains full and incremental back-up information for use with the dump/restore…
A: File containing full and incremental back up information The /etc/dumpdates contains tracking of…
Q: A user belongs to a group that has all permissions on a file named linux.txt, but the user, as the…
A: Linux supports a multiuser environment, i.e. more than one user can perform their tasks…
Q: oduces an exhaustive list of all the files and their perm
A: Introduction: Below describe the command produces an exhaustive list of all the files and their…
Q: Which command will change working directory from /usr/users/joe to /usr Group of answer choices cd…
A: Command will change working directory from /usr/users/joe to /usr is cd directory. As cd command is…
Q: Which command is used to list the contents of the current working directory including the hidden…
A: Hidden File in Linux: The easiest way to show hidden files on Linux is to use the ls command with…
Q: a. Write a command to install the package ABCD by using rpm. b. Write a command…
A: Note: Since we only answer up to 3 sub-parts, we’ll answer the first 3. Please resubmit the question…
Q: Which of the following commands or sequences of commands will rename a file x to file y in a Unix…
A: In this question we have to answer some of the following UNIX system based questions. Let's answer…
Q: Which command is used for removing/deleting files in UNIX?
A: Which command is used for removing/deleting files in UNIX? rmdir rm cd cp…
Q: do the following: ● Write a suitable command to a user cron job, will run "backup.sh" script at 8 am…
A: rite a shell script named “myscript.sh” to do the following:● Write a suitable command to a user…
Q: Use the diagram below for reference. You can assume you are logged in as the user "msaul" and are…
A: According to the information given:- We have to show the absolute path name on the basis of…
Q: Which of the following Linux commands can you use to make the following script executable? Assume…
A: The chmod Command in Linux stands for Change Mode in LINUX, which is a function to change / modify /…
Q: linux / unix shell 1.1 What is the meaning of the following command: “chmod go+rw files.txt 1.2…
A: It is defined as a computer program designed to be run by the Unix/Linux shell which could be one of…
Q: The command chmod 317 file1 would produce which of the following lines in thels command?a.…
A: Answer is given below,
Q: Unix MCQ: Q. Which of the following is used with access call for checking the owner’s…
A: Q. Which of the following is used with access call for checking the owner’s permissions? a) R_OK b)…
Q: MD5 hash can be applied to which of the following data streams?
A: MD5 hash can be applied to which of the following data streams? .ppt file .doc…
Q: Write Linux command for each question. Please use one single command to do following process. Q4:…
A: Q4) mv myfile.txt file.txt | mv file.txt /ET506 here mv also known as move command will…
Q: Which option of rm command is used to remove a non- empty directory? A) -t B) -i C) -a D) -r
A: 1) rm stands for remove. rm command is used to remove objects such as files, directories, symbolic…
Step by step
Solved in 3 steps
- 25السؤال What are the permission of file01 after executing this command? chmod 777 file01 الاجابات rwxr--rwx rwxrwxr-- rwxr-xrwx rwxrwxrwxUsing the image below, complete the linux/unix exercise. a. What is the single Linux command to copy img1.png into the img directory and name it carousel_img1.png ? b. Assuming you are in the web/ directory, what is the Linux command to make index.html read/write/executable for the owner, read/write for the group, and read only for the world? c. Assuming you are in the web/ directory, what is the Linux command to remove write permissions for the world from about.html ?Which of the following commands will change the user ownership and group ownershipof file1 to user1 and root, respectively?a. chown user1:root file1b. chown user1 : root file1c. This cannot be done because user and group ownership properties of a file must bemodified separately.d. chown root:user1file1e. chown root : user1file1
- After typing the ls –F command, you see the following line in the output: -rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1What does this mean?* a. User1 has read and write, members of the root group have read and execute, and all others have read permissions to the file. b. Members of the root group have read and write, user1 has read and execute, and all others have read permissions to the file. c. All users have read and write, members of the root group have read and execute, and user1 has read permissions to the file. d. User1 has read and write, all others have read and execute, and members of the root group have read permissions to the file.After typing the ls –F command, you see the following line in the output:-rw-r-xr- - 1 user1 root 0 Apr 29 15:40 file1What does this mean?a. User1 has read and write, members of the root group have read and execute, and allothers have read permissions to the file.b. Members of the root group have read and write, user1 has read and execute, and allothers have read permissions to the file.c. All users have read and write, members of the root group have read and execute,and user1 has read permissions to the file.d. User1 has read and write, all others have read and execute, and members of theroot group have read permissions to the file.Which command outputs a lengthy list of the filenames included in your current directory, together with the permissions that have been set for each individual file?
- Explain what these commands do: a) mkdir -p dir1/dir2 b) head filename c) tail filename d) chmod +w *.py e) grep -n ‘^[D-H]’ filename f) rm -rf dir1 How likely would you use the -f flag with the rm utility in the last command? Is it a safe way to manipulate directories?Given the following ls -l output: drw-r-xr-x. 2 root accounting_grp 4096 Jan 28 19:0 accounting/ What is the access permission for the ‘accounting’ folder (directory)? Write the command to change the access permission of the accounting folder (directory), so that the owner can read and execute, and the group and everybody else (world) can only read the file.Question 5 Given a file that appears on "ls -l" as follows... -rw-r--r--. 1 montclair MSU 39 Jan 16 20:15 test.txt ..after issuing the command, "chmod 754 test.txt", what would the new permissions look like? Group of answer choices: a. -rwxr-xr--. b. -rw-------. c. -rwxr-xr-x. d. -rwxr--r-x. Full explain this question and text typing work only thanks
- Write the command that can be used to perform the following: Back up the contents of the /var directory (which contains symbolically linked files) to the second nonrewinding SCSI tape device on the system using the tar utility. Append the file /etc/inittab to the archive created in Exercise 2a. Create a tarball called /stuff.tar.gz that contains all files in the /root/stuff directory. Use the cpio utility to back up all files in the /var directory (which contains symbolically linked files) to the first rewinding IDE tape device that has a block size of 5KB. Perform a full filesystem backup of the /var filesystem using the dump utility and record the event in the /etc/dumpdates file. Create an image of the /dev/sdb4 filesystem to the /sdb4.img file. View the contents of the archives created in Exercises 2a, 2c, 2d, and 2e. Extract the contents of the archives created in Exercises 2a and 2c to the /root directory. Extract the contents of the archives created in…The command chmod 317 file1 would produce which of the following lines in thels command?a. --w-r--rwx 1 user1 root 0 Apr 29 15:40 file1b. --wx--xrwx 1 user1 root 0 Apr 29 15:40 file1c. -rwxrw-r-x 1 user1 root 0 Apr 29 15:40 file1d. --w-rw-r-e 1 user1 root 0 Apr 29 15:40 file1Per guidance from your instructor, in a terminal run the following commands: Check the version of OpenSSL by running: openssl version. Create a text file named txt with any text as its contents. Encrypt this file using AES: openssl enc -aes-256-cbc -salt -in test.txt -out test.enc Encrypt this file using AES and Base64 Encode: Same as above but add –a option and use the output enc file as the input into the decrypt. Why would you Base64 encode a file? Decrypt both of the files. Download or locate 2 image files (shown as pic1.png and pic2.png below). Create MD5 Hash on Pic 1 by running: openssl dgst –md5 pic1.png Create MD5 Hash on Pic 2 by running: openssl dgst –md5 pic2.png What is steganography? How could hashing be used to prevent steganography? Create a password by running: openssl passwd [Your Text Here] Take a screenshot of the demonstration.