1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
2 years ago
12

In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following

Linux commands is issued?
A. dir/p
B. ls -l
C. cp -v
D. rm -al
Computers and Technology
1 answer:
Rufina [12.5K]2 years ago
5 0

The correct answer is B: ls -l.

Further Explanation:

In Linux there is a specific command needed to look at the files in a directory. In addition to using the command ls -l, you will need to use < > after the command and insert the name of the file that is being looked for. For example: ls -l <root root 2356 0600 Oct 22 lanyard>.

Each word and character has their own meaning and access information stored in the database. This will also show the users accesses permission to see the file and if needed to write over the file.

Learn more about computer commands at brainly.com/question/13338803

#LearnwithBrainly

You might be interested in
Skinner designed a soundproof apparatus, often equipped with a lever or bar, with which he conducted his experiments in operant
Jlenok [28]

Answer: Skinner box

Explanation: Skinner box is referred as the environment to conduct an experiment to observe the natural behavior of the element in a chamber. The Skinner box is also known as operant conditioning chamber. It is most commonly used for the experiments to be conducted with the animals in the operant conditioning chamber for the research purpose.

It is also soundproof tool and also refereed as the lever box as it contains lever .Thus the answer is Skinner box.

5 0
2 years ago
Which is the best description of the laws governing IT professionals?
Vinvika [58]

Answer: D, Most laws are directed at the information, data, or intellectual property rather than the IT professional.

Explanation:i just took the test

4 0
3 years ago
Marla wants to transfer photos from her digital camera to her computer. She has plugged the camera's cord into the USB port. Wha
QveST [7]
She needs to make sure the camera is on and working, if she doesn't than it wont tranfer
3 0
2 years ago
Read 2 more answers
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
what has become an established maritime commerce Center and one of the largest cities in the United states ​
coldgirl [10]

Easy! That would be the city of San Francisco!

7 0
2 years ago
Other questions:
  • A banker would like to present a spreadsheet as part of a presentation to potential clients. The spreadsheet makes use of severa
    14·1 answer
  • What office application has animations on the home ribbon?
    7·2 answers
  • 1. Problem solving is
    13·1 answer
  • What is <br> central vision
    12·2 answers
  • If you want a user to enter exactly 20 values, which loop would be the best to use?
    9·1 answer
  • What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b
    13·1 answer
  • Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that ca
    11·1 answer
  • (fill in the blank) <br><br> ____ is when data is formatted, transmitted and received in a network.
    13·1 answer
  • Which line of code will eliminate the element “calculator” from an array of supplies?
    13·1 answer
  • Write a while loop that continues to increment uservalue by 5 as long as uservalue is less than 0.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!