LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN: 9781337569798
Author: ECKERT
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 9RQ
Program Description Answer
If a user notices a “+” symbol appended to the mode of a file in the home directory, this specifies that there exist many additional entries within ACL that can be viewed with the use of “getfacl” command.
Hence, the correct answer is option “D”.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
How do change the code so that one or more command-line arguments are accepted as well as outputting a message when no command-line arguments are provided by the user? The expected behavior is that the program should print the files, in order, to standard output, effectively concatenating the contents of the supplied files.
Code:
public class MyCat {
/**
* Entry point for the application. Exactly zero or one command-line arguments are expected.
* If a filename is given as an argument, then the program should print the contents of that
* file to standard output. If a single dash (i.e., "-") is given as an argument, then
* the program should print the contents of standard input.
*
* @param args the command-line arguments
*/
public static void main(String[] args) {
try {
String filename = args[0];
String newArg = args[1];
Scanner input = null;
if (filename.equals("-")) {…
Suppose we want to change the permissions of a file named newfile.
a) What user(s) can change the permissions of newfile?
b) How do we view what permissions are currently in place for that file?
c) What are the base file and directory permissions in most Debian Linux systems?
d) What permissions does the preconfigured umask set for new files and directories?
Shell programming in Linux and Unix:
Experiment with changing your PS1 and PS2 prompt so it is set to what you want once you log in. You can also add to your PATH variable and set a CDPATH.
A. What file should you modify in your home directory to do this task?
B. What command(s) will change the prompts and what command(s) will have that change take effect once you log in?
Chapter 4 Solutions
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Ch. 4 - A symbolic link is also known as a soft link and...Ch. 4 - Prob. 2RQCh. 4 - There is no real difference between the “S” and...Ch. 4 - The default permissions given by the system prior...Ch. 4 - What must a user do to run cp or mv interactively...Ch. 4 - The root user utilizes the chgrp command to give...Ch. 4 - After typing the ls F command, you see the...Ch. 4 - After typing the command umask 731, the...Ch. 4 - Prob. 9RQCh. 4 - When you change the data in a file that is...
Ch. 4 - Prob. 11RQCh. 4 - Which of the following commands will change the...Ch. 4 - What does the /var directory contain? a. various...Ch. 4 - What does the mv command do? (Choose all that...Ch. 4 - A file has the following permissions: r--- -x-w-....Ch. 4 - The which command _________.
can only be used to...Ch. 4 - Hard links need to reside on the same filesystem...Ch. 4 - When applied to a directory, the SGID special...Ch. 4 - Which command do you use to rename files and...Ch. 4 - Prob. 20RQCh. 4 - Given the following output from the is command,...Ch. 4 - Only the root user can modify a file that has the...
Knowledge Booster
Similar questions
- Write the command that can be used to answer the following questions. (Hint: Try eachout on the system to check your results.)a. Find all files on the system that have the word “test” as part of their filename.b. Search the PATH variable for the pathname to the awk command.c. Find all files in the /usr directory and subdirectories that are larger than 50 kilobytesin size.d. Find all files in the /usr directory and subdirectories that are less than 70 kilobytesin size.e. Find all files in the / directory and subdirectories that are symbolic links.f. Find all files in the /var directory and subdirectories that were accessed less than60 minutes ago.g. Find all files in the /var directory and subdirectories that were accessed less than sixdays ago.h. Find all files in the /home directory and subdirectories that are empty.i. Find all files in the /etc directory and subdirectories that are owned by the groupbin.arrow_forward1.Why is it not advisable to use root as the default login? 2.What three sections are relevant to a file’s access permissions and how are they related to the three permission types. Explain how the access permissions and permission types are changed using the chmod command. 3.Which command can you run on your machine to determine whether the system is a 32-bit or 64-bit machine? Provide a screenshot of the command and the output.arrow_forwardWrite two scripts called encryption and decryption. Test both scripts by encrypting a file called file1 and save the result in file2. Then use file2 as the input to the decryption script and check if the output is the same as file1. May I get help with this in bash shell please?arrow_forward
- You work for a small company that keeps the following information about its clients:• first name• last name• a 5-digit user code assigned by your company.The information is stored in a file clients.txt with the information for each client on one line(last name first), with commas between the parts. For exampleJones, Sally,00345Lin ,Nenya,00548Fule,A,00000Smythe , Mary Ann , 00012Your job is to create a program assign usernames for a login system.First: write a function named get_parts(string) that will that will receive as its arguments astring with the client data for one client, for example “Lin ,Nenya,00548”, and return theseparate first name, last name, and client code. You should remove any extra whitespace from thebeginning and newlines from the end of the parts.You’ll need to use some of the string methods that we covered in this lessonYou can test your function by with a main() that is just the function call with the argument typed in.Second: write a function make_user(param)…arrow_forwardIn question 4 above, your friend is having problems finding the bootmgr file and asks for your help. What is your best response? a. Use diskpart commands to “unhide” and locate the file. b. Use the File Explorer options applet to unhide the hidden bootmgr file. c. Explain to your friend that performing a startup repair is a better option. d. Explain to your friend that he can use the bootrec command to fix the bootmgr file without having to copy another file to the computer.arrow_forwardGiven the following output from the is command, how many files are linked with file1? one two three fourarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,CompTIA Linux+ Guide to Linux Certification (Mind...Computer ScienceISBN:9781305107168Author:Jason EckertPublisher:Cengage LearningLINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.Computer ScienceISBN:9781337569798Author:ECKERTPublisher:CENGAGE L
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
CompTIA Linux+ Guide to Linux Certification (Mind...
Computer Science
ISBN:9781305107168
Author:Jason Eckert
Publisher:Cengage Learning
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Computer Science
ISBN:9781337569798
Author:ECKERT
Publisher:CENGAGE L