1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kvv77 [185]
4 years ago
14

What would be the result of running the command chown :root file1.txt

Computers and Technology
1 answer:
REY [17]4 years ago
8 0

Answer:

b. This would set the group ownership of file1 to root.

Explanation:

Linux allows user to have his own files and regulate the ability of other users to access them. The <em>chown</em> command allows you to use the appropriate utility to change the owner of a file or directory.

The basic command syntax is as follows:

# chown [options] <owner name: owner group name> <file or directory name>

For example, if you want to give a user <em>root</em> opportunity to use the <em>file1.txt</em> file as he wishes, you can use the following command:

# chown root file1.txt

In addition to changing the owner of a file, the group of its owners or both can be changed at the same time. Use a colon to separate the username and user group name (without the space character):

# chown user2:group2 file1.txt

As a result, the user with the name <em>user2</em> will become the owner of the <em>file1.txt</em> and its group will become <em>group2</em>.

In your case omitting username

# chown :root file1.txt

will change owner group only.

You might be interested in
The _______ command was developed by nicholas harbour of the defense computer forensics laboratory.
Lena [83]
Hi! The answer is dcfldd
3 0
3 years ago
Shortest Remaining Time First is the best preemptive scheduling algorithm that can be implemented in an Operating System.
Ierofanga [76]

Answer:

a

Explanation:

Yes, true.

Shortest Remaining Time First, also popularly referred to by the acronym SRTF, is a type of scheduling algorithm, used in operating systems. Other times it's not called by its name nor its acronym, it is called the preemptive version of SJF scheduling algorithm. The SJF scheduling algorithm is another type of scheduling algorithm.

The Shortest Remaining Time First has been touted by many to be faster than the SJF

7 0
3 years ago
The values of the member variables of objectOne are being copied into the corresponding member variables of objectThree. This in
djyliett [7]

Answer:

member wise Initialization.

Explanation:

Member wise initialization is used for the following cases:-

  1. When you have constant member in your class.
  2. When you have Reference member in your class.
  3. When you have a very large member in your class.
  4. When you have a member with no default constructor.

Member wise initialization is uses initialization and the direct initialization uses assignment.

8 0
4 years ago
Billy needs to type a bibliography/reference page for the report that he just typed. Which paragraph format should he use?
Olin [163]
He should use a MLA format

3 0
3 years ago
In MS Excel, a function is written as =FUNCTION_NAME(_____________________).​
otez555 [7]

Explanation:

A function is a predefined formula that performs calculations using specific values in a particular order. All spreadsheet programs include common functions that can be used for quickly finding the sum, average, count, maximum value, and minimum value for a range of cells. In order to use functions correctly, you'll need to understand the different parts of a function and how to create arguments to calculate values and cell references.

6 0
3 years ago
Other questions:
  • If you want to prioritize downloads of your mobile app instead of visits to your mobile site, you should: a) add a sitelink exte
    10·1 answer
  • In the windows firewall, any rules preceded by a __________ checkmark have not been enabled. black gray green red
    13·1 answer
  • the header, in an academic report, typically contains the author’s name and the current page number true or false
    6·1 answer
  • (word excel)
    15·1 answer
  • Write a method that returns the sum of all the elements of an array of ints that have an odd index.
    5·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • Explain steps in creating a main document for from letter. <br>​
    5·1 answer
  • What is payload?
    8·1 answer
  • What term is used to describe selecting and viewing information in a database?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!