LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN: 9781337569798
Author: ECKERT
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 9RQ
Program Description Answer
If a user notices a “+” symbol appended to the mode of a file in the home directory, this specifies that there exist many additional entries within ACL that can be viewed with the use of “getfacl” command.
Hence, the correct answer is option “D”.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Add a command to this chapter’s case study program that allows the user to view the contents of a file in the current working directory. When the command is selected, the program should display a list of filenames and a prompt for the name of the file to be viewed.
Be sure to include error recovery in the program. If the user enters a filename that does not exist they should be prompted to enter a filename that does exist.
UNIX ASSIGNMENT - IXQuestion 8 : Rename all the files within a folder with suffix “CS_” i.e. suppose a folder has two files file_a.txt and file_b.pdf than they both should be renamed from a single command to CS_a.txt and CS_b.pdf
Task1:
Create a directory say, "Linux user" and it contains three files (e.g.; A, B, C). Change the directory
permission first for "user", “group", “others", “all" then change the permission of files residing
in the same folder/directory.
Chapter 4 Solutions
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Ch. 4 - A symbolic link is also known as a soft link and...Ch. 4 - Prob. 2RQCh. 4 - There is no real difference between the “S” and...Ch. 4 - The default permissions given by the system prior...Ch. 4 - What must a user do to run cp or mv interactively...Ch. 4 - The root user utilizes the chgrp command to give...Ch. 4 - After typing the ls F command, you see the...Ch. 4 - After typing the command umask 731, the...Ch. 4 - Prob. 9RQCh. 4 - When you change the data in a file that is...
Ch. 4 - Prob. 11RQCh. 4 - Which of the following commands will change the...Ch. 4 - What does the /var directory contain? a. various...Ch. 4 - What does the mv command do? (Choose all that...Ch. 4 - A file has the following permissions: r--- -x-w-....Ch. 4 - The which command _________.
can only be used to...Ch. 4 - Hard links need to reside on the same filesystem...Ch. 4 - When applied to a directory, the SGID special...Ch. 4 - Which command do you use to rename files and...Ch. 4 - Prob. 20RQCh. 4 - Given the following output from the is command,...Ch. 4 - Only the root user can modify a file that has the...
Knowledge Booster
Similar questions
- You are in the same group as Sam, Tom, Bill, and so on. The permissions field on a file you own named answer is ----r-----. Who can read the file?arrow_forwardcommand for running this Python Spark source code filearrow_forwardThe delivery drones have a internal reporting and logging system thatrecords events and issues during flights. These logfiles contain the last 1000events/messages as well as their status codes.The Logfile FormatBy default, the logfiles are all called ‘logfile.txt’. Each logfile is exactly 1000 lineslong.Each entry in the file consists of 4 fields:1. a line number (starting at 0)2. a POSIX timestamp3. a message/event type4. an event descriptionEach field (line number, timestamp etc.) is separated by a space, except for thedescription which ends with a full stop.Log events come in three different types: NOTIFY, WARNING, and ERROR. Task 1: Display Because the logfiles are so big, we would only like to display a certain number oflines at a time. We prompt the user to choose start and end line numbers andprint all the lines from start to end (inclusive).The input constraints are as follows: 0 start end 999You can safely assume that the inputs will fall within that…arrow_forward
- You will develop a client side and a Servlet program that will work with a database. 1. The client (front end) should have a title "NJIT Credit Union", centered. 2. The client should have a background color. 3. The client should have a text field with label 'UserID' where user will enter userID (integer) and a Submit button with text "Submit". 4. An unsuccessful authentication should have a message printed on the screen, in red, stating that "Your authentication has failed, please try again.” (no pop up message). At this point the text field should get cleared and ready to accept a new input. Your program should not exit. 5. A successful authentication should be followed by a message on the screen, in green, stating that "Your authentication is successful" (no pop up message). 6. There should be two other text boxes with label "Deposit" and "Withdraw" where user will enter an amount (you should accommodate for decimals). These two text boxes should only be enabled after successful…arrow_forwardshell scriptingarrow_forwardName of Experiment: Permissions in Ubuntu Change the permissions Permissions can be changed with `chmod` command. Suppose you want to change the permission for a particular file or a folder, the first approach is through `chmod` command. Changing Ownership and Group Change the ownership of a file/directory Example: chown user filename Provide screenshot of you workarrow_forward
- 4. Fast in java coding please. Thank you File Encryption is the science of writing contents of a file in a secret code. Yourencryption program should work like a filter, reading the content of one file,modifying the data into a code, and then writing the coded contents out to a secondfile. The second file will be a version of the first file, but written in secretcode. Write a program to demonstrate the above working with binary files.arrow_forwardAssuming the file "File.txt" exists, where must it be located for this code snippet to work without error? ifstream in_file; in_file.open ("File.txt"); In system RAM On the hard drive or flash drive In the same folder (directory) as the source code (.cpp) All of thesearrow_forwardUse python language for a program that modifies and sorts the content of a specific csv file based on the inputted column name. The program should ask Enter filename: Enter column name to be sorted: Additionally, the csv file must be modified and no additional csv files must be created. The application will catch and display an error message "the file does not exist" if the csv file does not exist. *if possibe, do not use pandas*arrow_forward
- Instructions Add a command to this chapter’s case study program that allows the user to view the contents of a file in the current working directory. When the command is selected, the program should display a list of filenames and a prompt for the name of the file to be viewed. Be sure to include error recovery in the program. If the user enters a filename that does not exist they should be prompted to enter a filename that does exist. An example of the program input and output is shown below: /root/sandbox 1 List the current directory 2 Move up 3 Move down 4 Number of files in the directory 5 Size of the directory in bytes 6 Search for a file name 7 View the contents of a file 8 Quit the program Enter a number: 7 Files in /root/sandbox: filesys.py example.txt Enter a file name from these names: example.txt THIS IS CONTENT OF AN EXAMPLE FILE. /root/sandbox 1 List the current directory 2 Move up 3 Move down 4 Number of files in the directory 5 Size of the directory in bytes 6…arrow_forwardFile encryption is the science of writing the contents of a file in a secret code. Your encryption program should work like a filter, reading the contents of one file, modifying the data into a code, and then writing the coded contents out to a second file. The second file will bea version of the first file, but written in a secret code.Although there are complex encryption techniques, you should come up with a simple one of your own. For example, you could read the first file one character at a time, and add 10 to the character code of each character before it is written to the second file. Write a program that decrypts the file produced by the program in above.The decryption program should read the contents of the coded file, restore the data to its original state, and write it to another file.arrow_forwardPlz helparrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Microsoft Visual C#Computer ScienceISBN:9781337102100Author:Joyce, Farrell.Publisher:Cengage Learning,EBK JAVA PROGRAMMINGComputer ScienceISBN:9781337671385Author:FARRELLPublisher:CENGAGE LEARNING - CONSIGNMENTProgramming with Microsoft Visual Basic 2017Computer ScienceISBN:9781337102124Author:Diane ZakPublisher:Cengage Learning
- Programming Logic & Design ComprehensiveComputer ScienceISBN:9781337669405Author:FARRELLPublisher:CengageC++ Programming: From Problem Analysis to Program...Computer ScienceISBN:9781337102087Author:D. S. MalikPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Microsoft Visual C#
Computer Science
ISBN:9781337102100
Author:Joyce, Farrell.
Publisher:Cengage Learning,
EBK JAVA PROGRAMMING
Computer Science
ISBN:9781337671385
Author:FARRELL
Publisher:CENGAGE LEARNING - CONSIGNMENT
Programming with Microsoft Visual Basic 2017
Computer Science
ISBN:9781337102124
Author:Diane Zak
Publisher:Cengage Learning
Programming Logic & Design Comprehensive
Computer Science
ISBN:9781337669405
Author:FARRELL
Publisher:Cengage
C++ Programming: From Problem Analysis to Program...
Computer Science
ISBN:9781337102087
Author:D. S. Malik
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L