Question
a.
the group’s head
b.
the file’s owner
c.
the file’s permissions
d.
all of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. In UNIX, exactly which operations can be executed by group members and other users is definable by :
Similar Questions
Discover Related MCQs
Q. A process _____ lower the priority of another process, if both are owned by the same owner.
View solution
Q. In distributed file system, ______ directories are visible from the local machine.
View solution
Q. In the world wide web, a ____ is needed to gain access to the remote files, and seperate operations are used to transfer files.
View solution
Q. Anonymous access allows a user to transfer files :
View solution
Q. The machine containing the files is the _______ and the machine wanting to access the files is the ______
View solution
Q. Distributed naming services/Distributed information systems have been devised to :
View solution
Q. Domain name system provides :
View solution
Q. To recover from failures in the network operations, ______ information maybe maintained.
View solution
Q. The series of accesses between the open and close operations is a :
View solution
Q. Reliability of files can be increased by :
View solution
Q. Protection is only provided at the _____ level.
View solution
Q. The main problem with access control lists is :
View solution
Q. Many systems recognize three classifications of users in connection with each file (to condense the access control list) :
View solution
Q. All users in a group get _______ access to a file.
View solution
Q. Universe consists of :
View solution
Q. In UNIX, groups can be created and modified by :
View solution
Q. To control access the three bits used in UNIX are represented by :
View solution
Q. If each access to a file is controlled by a password, then the disadvantage is that :
View solution
Q. In a multilevel directory structure :
View solution
Q. In UNIX, the directory protection is handled _________ to the file protection.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!