1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
4 years ago
14

What would be the result of running the command chown :root file1.txt

Computers and Technology
1 answer:
REY [17]4 years ago
8 0

Answer:

b. This would set the group ownership of file1 to root.

Explanation:

Linux allows user to have his own files and regulate the ability of other users to access them. The <em>chown</em> command allows you to use the appropriate utility to change the owner of a file or directory.

The basic command syntax is as follows:

# chown [options] <owner name: owner group name> <file or directory name>

For example, if you want to give a user <em>root</em> opportunity to use the <em>file1.txt</em> file as he wishes, you can use the following command:

# chown root file1.txt

In addition to changing the owner of a file, the group of its owners or both can be changed at the same time. Use a colon to separate the username and user group name (without the space character):

# chown user2:group2 file1.txt

As a result, the user with the name <em>user2</em> will become the owner of the <em>file1.txt</em> and its group will become <em>group2</em>.

In your case omitting username

# chown :root file1.txt

will change owner group only.

You might be interested in
Most students overestimate their skill level and abilities to take open book tests.
leonid [27]
True...the assumption being that the student believes he/she will be able to locate the answer within the text rapidly, but they underestimate the fact that "application" of the content/question is primarily what the instructor is looking for, and will require critical thinking skills to apply the book content to the the question; not just "find the answer". 
3 0
3 years ago
Read 2 more answers
How much are the prelab, inlab, and postlab parts worth?prelab:% inlab:%postlab%
Semmy [17]

Each lab consists of a PreLab, InLab, and a PostLab. PreLabs are worth 20%, InLab 50%, and PostLabs 30% of the final lab grade. the fifth submission is worth 40%.

<h3>What is prelab?</h3>
  • Pre-lab assignments are tasks or homework that students complete before arriving in class for the lab period.
  • Pre-lab assignments motivate students to prepare for the lab and help them connect conceptual understanding with an experiment.
<h3>What is inlab?</h3>
  • With inLab CAD Software, you design digital dentures and partial frameworks as well as splints, impression trays, and telescopes.
<h3>What is postlab?</h3>
  • Postlab is a Mac app that lets you collaborate on Final Cut Pro X libraries and Premiere Pro projects.
  • Postlab enables editors to share files, track and save changes, and make sure no more than one person is working on the same library or project simultaneously.

To learn more about it, refer

to brainly.com/question/22654163

#SPJ4

5 0
1 year ago
If you want to develop an Android app, you need to become a registered developer with which platform?
Orlov [11]
C is the correct answer
3 0
3 years ago
Explain synchronized plug firing.
eimsori [14]
HEY THERE!!

In a camera, flash synchronization is defined as synchronizing the firing of a photographic flash with the opening of the shutter admitting light to photographic film or electronic image sensor. It is often shortened to flash sync  or flash synch.


HOPE IT HELPS
6 0
3 years ago
What are the four principal services provided by S/MIME?
konstantin123 [22]

Answer:

Explanation:

Secure/Multipurpose Internet Mail Extensions, is a technology that permits you to encrypt your emails. S/MIME is based on asymmetric cryptography to protect your emails from unauthorized access. It also allows you to digitally sign your emails to verify you as the legitimate sender of the message, making it an effective weapon against many phishing attacks.

The four principal services presented by S/mime includes ;

Authentication, Non-repudiation of origin utilizing digital signatures, Message Integrity and message Privacy.

3 0
3 years ago
Other questions:
  • Once in debt, ________ is your companion every minute of the day and night, you cannot shun it or slip away from it . . . and wh
    10·1 answer
  • To create a query string, you add a ____ immediately after a url, followed by the query string.
    15·1 answer
  • LAB: Formatted output: Hello World! Write a program that outputs "Hello World!" For ALL labs, end with newline (unless otherwise
    10·1 answer
  • A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the
    13·2 answers
  • You need to secure your wireless network. which security protocol would be the best choice
    10·1 answer
  • Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of
    6·1 answer
  • A diagram of a flow chart to find the average of 10 numbers​
    7·1 answer
  • "Businesses around the world all need access to the same data, so there needs to be one type of information system that is desig
    13·1 answer
  • Which statement describes the Direction option for animations and transitions?
    5·2 answers
  • Name the default Package of java<br>​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!