1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f

ile be compromised in this case? What are the limitations?
Computers and Technology
1 answer:
jeka943 years ago
8 0

Answer:

Archivo: 110100100 (propietario, grupo, otro: rw- r-- r--)

Directorio: 111 011 000 (propietario, grupo, otro: rwx -wx ---)

Explanation:

Directory permissions are critical. Since group members can access directory ('x') and can modify directory ('w'), even though they can't list directory (not 'r'), it means that if a group member knows the name of the file, that person can also delete it because deleting a file requires permission to write to the directory: file permissions are irrelevant (although commands like 'rm' warn you when you don't have write permission to the file directory , that's a courtesy, because it doesn't matter to the system call 'unlink ()').

Therefore, a member of your group (or, more precisely, a member of the group to which the directory belongs) can delete the file if you know its name. They can also read the file if they know its name, and can create a file with the same name if the original is already missing. Based on the file permissions, being able to read the file is not a compromise - you would have denied group read access (and public read access) if that mattered.

You might be interested in
A tool you might use to manipulate an image, such as a photograph, into a seamless repeating texture would be:
nika2105 [10]

I believe the answer is D. I hope I helped :)

7 0
3 years ago
Read 2 more answers
The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
zheka24 [161]

The <u>OSI model</u> describes how data actually moves from an application on one computer to an application on another networked computer.

<h3>What is the OSI model?</h3>

OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems)

<h3>The layers of the OSI model.</h3>

Basically, there are seven (7) layers in the open systems interconnection (OSI) model and these include the following in sequential order;

  • Physical Layer
  • Data link Layer
  • Network Layer
  • Transport Layer
  • Session Layer
  • Presentation Layer
  • Application Layer

In this context, we can infer and logically deduce that the <u>OSI model</u> is typically used to describe and illustrate how data moves from a software application on one computer to a software application located on another networked computer.

Read more on OSI model here: brainly.com/question/26177113

#SPJ1

5 0
2 years ago
Implement one array of the English alphabet (26 characters). a) Create a function, getLetters() to cast and generate the array.
WARRIOR [948]

#include <fstream>

#include <iostream>

#include <iomanip>

#include <cstring>

#include <cstdlib>

using namespace std;

// Function Declarations

void display(char alphabets[],int MAX_SIZE);

void reverse(char alphabets[],int MAX_SIZE);

void swap(char &ch1,char &ch2);

int main() {

 //Declaring constant

const int MAX_SIZE=26;

 

//Declaring a char array

char alphabets[MAX_SIZE];

 

//Populating the array with alphabets

for(int i=0;i<MAX_SIZE;i++)

{

 alphabets[i]=(char)(65+i);

 }

 

 cout<<"Original: ";

 display(alphabets,MAX_SIZE);

 reverse(alphabets,MAX_SIZE);

 cout<<"Reversed: ";

 display(alphabets,MAX_SIZE);

 return 0;

}

//This function will display the array contents

void display(char alphabets[],int MAX_SIZE)

{

 for(int i=0;i<MAX_SIZE;i++)

 {

    cout<<alphabets[i]<<" ";

 }

 cout<<endl;

}

//This function will reverse the array elements

void reverse(char alphabets[],int MAX_SIZE)

{

 int first,last;

 first=0;

 last=MAX_SIZE-1;

 

 while(first<last)

 {

   

    swap(alphabets[first],alphabets[last]);

    first++;

    last--;

   

 }

}

void swap(char &ch1,char &ch2)

{

 char temp;

 temp=ch1;

 ch1=ch2;

 ch2=temp;

6 0
2 years ago
How many currencies do recognize?
klemol [59]
The United Nations currently recognizes 180 currencies that are used in 195 countries across the world the United States dollar is a popular currency and about 66 countries either peg their currency to the US dollar or use it as their currency
3 0
3 years ago
The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.
mario62 [17]

In the case above, To search through this database, they use SQL, a 4GL.

<h3>What is SQL?</h3>

SQL is known to be Structured Query Language (SQL) that is said to be a form of standardized programming language that is employed to manage relational databases and carry out various operations on the data in them.

Note that In the case above, To search through this database, they use SQL, a 4GL network that can help.

Learn more about SQL from

brainly.com/question/25694408

#SPJ1

7 0
2 years ago
Other questions:
  • Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the us
    15·1 answer
  • What does OLE stand for? Object
    8·2 answers
  • How many slides should a presentation include?
    11·2 answers
  • How will you create an email id
    11·1 answer
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • When classified data is sent over an unclassified network, what is this incident called?
    5·1 answer
  • Users of Adobe Reader, created by Adobe Systems Incorporated, are prompted to provide feedback on their experiences with the sof
    7·1 answer
  • Create a program that simulates a race between several vehicles. Design and implement an inheritance hierarchy that includes Veh
    11·1 answer
  • program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are c
    15·1 answer
  • Please help with this coding question
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!