1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka943 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they thi
PolarNik [594]

This process that would be considered in the above scenario is Data mining.

<h3>What is data mining?</h3>

Data mining is known to be the act or method of knowing more about data via;

  • Leaning raw data.
  • Finding patterns.
  • Forming models.
  • Testing those models.

Note that  It is a method that uses statistics, machine learning, and database systems and it will be good tool to be used in the scenario above.

Learn more about Data mining from

brainly.com/question/14776357

4 0
2 years ago
John travels a lot and he needs to access his documents and services on the go. Which of these technologies allows his to access
kirza4 [7]

<u>Answer:</u>

<u>Cloud computing</u><em> allow the user to access software or any document from the remote place.</em>

<u>Explanation:</u>

Let us understand what does the word cloud actually means. In simple terms, we get rain from cloud, but we don’t know actually which cloud burst to give rain.

In a similar way, <em>the cloud computing is the concept of storing files in multiple servers and multiple location</em> and it provide access when the <em>client needs the source. </em>

Cloud computing enable user to work on <em>software online</em> or to download document or <em>edit / create documents online</em>. Certain services are <em>free and few other are paid.</em>

6 0
3 years ago
Despite the rise of messaging apps and other forms of social media, these efforts are focused on consumer efforts, with corporat
miss Akunina [59]

Answer:

False

Explanation:

In our current market, we can find some messaging apps and social media designed for corporation organization setting. One example of messaging apps widely used in corporate world is Slack. The Slack enable user to set up different communication channel with their colleagues and flexibly set their working status.

FB also releases a corporate version of social media which is Workplace. The main attracting point is the contents are ad-free and you can expect to see company update or department news from the nesfeed.

4 0
3 years ago
Special numeric has three digits and holds a property that it is exactly equal to summation of cubes from each digit. For exampl
Vera_Pavlovna [14]

Answer:

The following code is written in C programming language:

#include <stdio.h>     //header file

 

int main()       //main method

{

   int n, t, digit1, digit2, digit3;      // set integer variables

    // print message

   printf("Print all Special integer numbers between 100 and 999:\n");

   n = 100;      //initialize value in variable "n"    

   while (n <= 999)      //set while loop

   {

       digit1 = n - ((n / 10) * 10);

       digit2 = (n / 10) - ((n / 100) * 10);

       digit3 = (n / 100) - ((n / 1000) * 10);

       t = (digit1 * digit1 * digit1) + (digit2 * digit2 * digit2) + (digit3 * digit3 * digit3);

       if (t == n)      //set if statement

       {

           printf("\n Special integer number is: %d", t);     //print an output

       }

       n++;

   }

}

Output:

Print all Special integer numbers between 100 and 999:

Special integer number is: 153

Special integer number is: 370

Special integer number is: 371

Special integer number is: 407

Explanation:

Here, we set the header file "stdio.h".

Then, we define integer type "main()" function.

Then, we set five integer type variable "n", "t", "digit1", "digit2", "digit3".

Then, we the print message by print() method and initialize a value to variable "n" to 100.

Then, we set the while loop which starts from 100 and stops at 999 and if the condition is true than code inside the loop is execute either loop is terminated.

Then, we set the if statement and pass the condition, if the condition is true the output would be print either if the condition is false the if statement is terminated.

8 0
3 years ago
Disadvantages of Batch<br>operation system​
jok3333 [9.3K]

Answer:

Disadvantages of Batch Operating System:

  1. The computer operators should be well known with batch systems.
  2. Batch systems are hard to debug.
  3. It is sometime costly.
  4. The other jobs will have to wait for an unknown time if any job fails.
8 0
3 years ago
Other questions:
  • If you have machines doing jobs, fewer staff are needed, therefore costs are
    5·2 answers
  • The clear emergence of a leader and the development of group norms and cohesiveness are the key indicators of the ________ stage
    6·1 answer
  • Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
    12·2 answers
  • What are the four stages a customer goes through when buying a product?
    7·2 answers
  • What other options are there besides jail for 16 year old that commit a crime?
    8·2 answers
  • Match letters from column B to Column A by looking at the picture above.
    11·1 answer
  • LAB: Plant information (ArrayList) Given a base Plant class and a derived Flower class, complete main() to create an ArrayList c
    6·1 answer
  • 2) A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long
    7·1 answer
  • The printer prints 16 pages every minute. How many pages are printed in 6 minutes?
    14·2 answers
  • Give an essay on a way I can be a better person. If not correct I will refund. Best answer gets brainiest. Detailed, 5 sentience
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!