Consider a file called in /importantfiles/csdata on a UNIX system The directory /importantfiles has permissions 777....
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider a file called in /importantfiles/csdata on a UNIX system The directory /importantfiles has permissions 777. It is owned by user dan and has group csfaculty Within this directory, file csdata has permissions 644. It is owned by user dan and has group csfaculty User eve is not in group csfaculty. Suppose eve attempts to delete the file /importantfiles/csdata. O Eve can delete the file because she does have write permissions on the directory containing the file. Eve cannot delete the file because she does not have write permissions on the file. O Eve cannot delete the file because she does not have delete permissions on the directory containing the file. O Eve can delete the file because she does have write permissions on the file. Consider a file called in /importantfiles/csdata on a UNIX system The directory /importantfiles has permissions 777. It is owned by user dan and has group csfaculty Within this directory, file csdata has permissions 644. It is owned by user dan and has group csfaculty User eve is not in group csfaculty. Suppose eve attempts to delete the file /importantfiles/csdata. O Eve can delete the file because she does have write permissions on the directory containing the file. Eve cannot delete the file because she does not have write permissions on the file. O Eve cannot delete the file because she does not have delete permissions on the directory containing the file. O Eve can delete the file because she does have write permissions on the file. Consider a file called in /importantfiles/csdata on a UNIX system The directory /importantfiles has permissions 777. It is owned by user dan and has group csfaculty Within this directory, file csdata has permissions 644. It is owned by user dan and has group csfaculty User eve is not in group csfaculty. Suppose eve attempts to delete the file /importantfiles/csdata. O Eve can delete the file because she does have write permissions on the directory containing the file. Eve cannot delete the file because she does not have write permissions on the file. O Eve cannot delete the file because she does not have delete permissions on the directory containing the file. O Eve can delete the file because she does have write permissions on the file. Consider a file called in /importantfiles/csdata on a UNIX system The directory /importantfiles has permissions 777. It is owned by user dan and has group csfaculty Within this directory, file csdata has permissions 644. It is owned by user dan and has group csfaculty User eve is not in group csfaculty. Suppose eve attempts to delete the file /importantfiles/csdata. O Eve can delete the file because she does have write permissions on the directory containing the file. Eve cannot delete the file because she does not have write permissions on the file. O Eve cannot delete the file because she does not have delete permissions on the directory containing the file. O Eve can delete the file because she does have write permissions on the file.
Expert Answer:
Answer rating: 100% (QA)
The detailed answer for the above question is provided below Answer The correct answer is c Eve cannot delete the file because she does not have delete permissions on the directory containing the file ... View the full answer
Related Book For
Posted Date:
Students also viewed these operating system questions
-
acmillan Learning 2 lb, 1 lb, 4 lb, 3 lb, 4 lb, 1 lb, 2 lb, 3 lb For this question, refer to this bin-packing task. Pack the following weights into bins holding no more than 5 lb: Find the number of...
-
What is the cost of preferred stock? Explain.
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
In January 2014, Vanowski Corporation was organized and authorized to issue 2,000,000 shares of no-par common stock and 50,000 shares of 5 percent, $50 par value, noncumulative preferred stock. The...
-
How do international issues affect the role of the management accountant?
-
Present the counterarguments to your opinion: a) Present the strongest counterarguments to your opinion that it is/is not a problem. b) Evaluate the strengths and weaknesses of both sides. c) To...
-
Information systems auditors should be most concerned about management's decision to undertake outsourcing of the information systems function when: a. A long-term contract with the outsourcing...
-
Everybody knew Ed McAlister was a brilliant businessman. He had taken a small garbage collection company in Kentucky and built it up to be one of the largest and most profitable waste management...
-
In July 2015, investigators established that Toshiba, a 140-year-old pillar of the Japanese business community, had inflated earnings by at least $1.2 billion during the period from 2008 through...
-
Department Bonus If the Dept is 6007, enter 900, if it is 4305, enter 600, if it is 4312, enter 350, otherwise enter 200. Copy the function down for the employees. Calculate the total Department...
-
where x1 + x2 = 1 and y1 + y2 = 1 1. In the lecture we have considered the situation of constant discount rates (u; = 8x) where 8 = 82 = 8 and time does not matter much, i.e. S Now consider a...
-
Explain briefly the following A) Programmed I/O B) Interrupt mode I/O C) Direct memory access (DMA)
-
Dylan is interested in determining how customers consider his firm's dietary products compared with its competitors. He begins surveying customers and asking them to state what they think about the...
-
Smee Inc. produces all-natural organic peanut butter. The peanut butter is sold in 12-ounce jars. The sales budget for the first four months of the year is as follows: January February March April...
-
Find the range, mean, and standard deviation for the data set. 18, 22, 18, 19, 21, 21, 22, 20, 21, 19
-
Design a 2-bit counter that counts the following counting sequence, using a T flip-flop and a JK flip-flop. Use the T flip-flop for MSB and the JK flip-flop for LSB for each count value. Also, there...
-
12. Consider the following classical model of a closed economy: Ys = AL1/2 yd C+I+G C I 2000 300+0.7Y-0.7T Ys = yd = Y 10,000r W/P = MPL (Ld) L = 22500 L = La A = 30 G= 1000 T=1500 a. What value of...
-
On July 1, 2011, Flashlight Corporation sold equipment it had recently purchased to an unaffiliated company for $480,000. The equipment had a book value on Flashlights books of $390,000 and a...
-
Suppose a new process in a system arrives at an average of six processes per minute and each such process requires an average of 8 seconds of service time. Estimate the fraction of time the CPU is...
-
Does the hardware process described in Section 6.2 have a process descriptor? Does the initial process have a process descriptor? Explain your answers.
-
Convert each number into a hexadecimal (base 16) representation, then evaluate the expressions in hexadecimal. a. 10101111 + 00101010 b. 11101011 10101010 c. 10111011 x 00001011 d. 01001000 /...
-
Define the terms working capital, current ratio, and acid-test ratio (or quick ratio).
-
Billy Tushoes recently received an offer to join the accounting firm of Tick and Check LLP. Billy would prefer to work for Foot and Balance LLP but has not received an offer from the firm the day...
-
Telecommunications, Inc., is a U.S. company, a global leader in information technology, and it specializes in building data network systems. The company is a major player in the industry, although it...
Study smarter with the SolutionInn App