1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alika [10]
4 years ago
9

Which string displayed using the ls –l command in a Linux terminal indicates that group permissions are set to read and modify?

Computers and Technology
1 answer:
lyudmila [28]4 years ago
7 0

Answer:

The answer is -rw-rw-r--

Explanation:

This is a permission string which refers to read and write (modify) permissions to owner and group only and read only permission for all others.

There are three types of permissions: read (r), write(w), and execute(x).

In the above string, r stands for read and w stands for write permissions. Read (r) permission allows the contents of the file to be viewed.

Write (w) permission allows modification of the contents of that file. It gives permission to edit (e.g. add and remove) files.

The first dash "-" refers to the type of file. The next rw- define the owner’s permission to the file. so the owner has permission to read and write a file only. The next rw- refers to the group permission. The members of the same group have permission to read and write a file only just as the owner. The last r-- means that all other users can only read/ view the file. In the first rw- the "-" means to remove or deny access. This means owner is granted permission read and write the file only but he cannot execute (x) the file contents. 2nd rw- means the same but for group and lastly there are two "--" after r. The first "-" denies write access and second one denies execute access.

You might be interested in
How do you know when energy is moving in a lightbulb circuit?
vagabundo [1.1K]
When energy flows in the Electric Circuit then Light bulb blows and emits light energy and thermal energy. By that sign, we can get an idea that energy is flowing.

Hope this helps!
4 0
3 years ago
. An operating system is: *
Artemon [7]

Answer:

3. System Software

Explanation:

An operating system is a special type of system software. It controls and co-ordinates overall of the computer.

4 0
3 years ago
Question 2 In this question you are asked to calculate probabilties for the discrete uniform and exponential distribution. Make
sasho [114]

Answer:

Hi there! The question is asking to make changes to the H3_Q2.java program however there is no such program attached. Nevertheless, the requirements in the question can be addressed in a new H3_Q2.java program that i've listed below.

Explanation:

We can use the Scanner util in Java for prompting user input. The method nextInt() and nextDouble() allow only values of types "int" and "double" respectively. I have used the "switch" statement to direct the program based on user selection of menu item. The checks are printed with the "System.out.println" command and the program exits in case of error or invalid input. Finally, the calculation of probability simply requires you to replace the comment with the formula for the probability calculation based on the method chosen.

H3_Q2.java

import java.util.Scanner;

public class H3_Q2 {

 public static void main(String args[]) {

   // print main menu for user selection

   System.out.println("Please type 1 to select 'discrete uniform' or 2 to select 'exponential'");

   Scanner scan = new Scanner(System.in);

   int selection = scan.nextInt();

   switch(selection) {

     case 1:

       // discrete uniform

       System.out.println("Please enter a lower bound value a: ");

       int a = scan.nextInt();

       System.out.println("Please enter a upper bound value b: ");

       int b = scan.nextInt();

       System.out.println("Please enter a value x: ");

       int x = scan.nextInt();

       if (b <= a) {

         System.out.println("The upper bound value b should be greater than the lower bound value a");

         System.exit(0);

       }

       if (a > x) {

         System.out.println("The value x should be greater than the lower bound value b");

         System.exit(0);

       }

       if (b < x) {

         System.out.println("The value x should be greater than the lower bound value b");

         System.exit(0);

       }

       break;

     case 2:

       // exponential

       System.out.println("Please enter a lambda value for exponential: ");

       double lambda = scan.nextDouble();

       System.out.println("Please enter a value x: ");

       double d_x = scan.nextDouble();

       if (d_x <= 0.0) {

         System.out.println("The value x should be greater than 0");

         break;

       } else {

         // calculate P(X = x) and P(X ≤ x)

         // result = calculateExponential()

         System.out.println("The calculation for the exponential method given the lambda value " + lambda + " and the value of x " + d_x + " is: ");

       }

       break;

     default:

       System.out.println("Invalid input. Exiting..");

       break;

   }

 }

}

7 0
3 years ago
What is a frame injection attack in a wireless network?
Romashka-Z-Leto [24]

Answer:

A.Un hacker introduce un cadru fals în timpul transmiterii datelor.

Explanation:

3 0
3 years ago
Read 2 more answers
What are some of the risk associated with professional emails
noname [10]

Answer:

the answer is its a lot of riskes you would have to worry about tour email getting haacked into and lossing all of your personal information

Explanation:

5 0
3 years ago
Other questions:
  • Which command displays the status of the ipsec installation?
    7·1 answer
  • What is the purpose of the Occupational Safety and Health Act?
    7·2 answers
  • Banks use _____, which are electronic transmissions of account exchange information over private communications’ networks.
    14·1 answer
  • When designing your navigation, your primary objective should be to include keywords for search engines.
    6·1 answer
  • Xavier buys a computer for $525, which includes taxes. He pays for the computer over a 12-month period by paying $48.13 per mont
    8·2 answers
  • Choose the term that matches the action.
    5·2 answers
  • Unconformities develop when new sedimentary layers accumulate atop old, eroded layers, resulting in a geologic hiatus. Which of
    9·1 answer
  • Do you think it's easier to be mean online than offline? why?
    14·1 answer
  • The most common markup language used with web pages is ___________ Question 4 options: A. HTML B. VRML C. Javascript
    13·2 answers
  • 30 Points!!
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!