Systems Programming

Masters
Assignment
Technology
Pages 4 (1004 words)
Download 0
Please put your answers into the boxes in this document (it is a Microsoft Word document). You may alter the size of the boxes if you wish, but you will probably not need to. Do not add any text outside the boxes. Your answers must be typed. Only answers submitted in this document will be accepted…

Introduction

If you have not completed the work by the due date please hand in whatever you have done.
1. If I am currently in a directory /usr/jbloggs which currently contains just one file called file1 and nothing else. I want to put a copy of the file with the same name in a directory /usr/jbloggs/sub1/sub2 and another copy of the file called file2 in a directory /usr/jbloggs/sub1/sub3/sub4. List the commands you would need to do (in the correct order) to achieve this.
2. Explain what each of the components of the protection string lrwxr-xr-- which is on a file file3 means. Give command(s) to change the file's protection to lrwx--x--- using the alphabetic form of the protection command and a second to change it from that to lrwxrwxr-- using the numeric form of the command.
The first character 'l' denotes a Symbolic link. A symbolic link contains the name of the file to which it is linked. Symbolic links are created with the ownership of the creator and the permissions are of the creator's current umask.
Once created, the symbolic link ownership and permissions will not change, because the mode and ownership of the symbolic link is ignored by the system. Therefore, using CHMOD command, it is possible only to change the permission of the target file but not the link file itself. ...
Download paper
Not exactly what you need?

Related papers

Communication Systems
In this step, the higher frequency of the signal is filtered out to make the conversion of the analog signal easier. When people speak, the energy in their voices is normally between the range of 200 to 300 hertz for the lower limits and 2,700 to 2,800 hertz for upper limits (Tomasi 275).…
Systems Programming
If you have not completed the work by the due date please hand in whatever you have done.…
Object Oriented Programming
OOP is an acronym for Object Oriented Programming. Traditionally, a computer program was seen as a collection of functions or procedures or simply a list of instructions whereas with the advent of Object Oriented programming, each program may be seen as comprising a collection of individual units, or objects, that act on each other. In simpler terms, it is a type of programming in which…
Programming
A constructor is constructed by the class in case it is not written by the programmer. In this case time() is the default constructor which will be used in case time( int hh, int mm, int ss) is not used.…
Information Systems Developement Trends
It is seeking to improve the quality of software by solving the key problems in software developments. However, the radical nature of Extreme Programming seems to be causing cultural and developmental conflicts within the software development community. This paper will discuss the fundamental problems of software development and the advantage and disadvantages of adopting Extreme Programming…
Distributed Systems assessment
Because the number of processes in an MPI computation is normally fixed, processes can use point-to-point communication operations to send a message from one named process to another. These operations can be used to implement local and unstructured communications. A group of processes can call collective communication operations to perform commonly used global operations such as summation and…
Java Programming
Here we have used the access specifier as public which tells us that the class can be accessed anywhere in the program. In the same line we have used the concept of Inheritance, which is the process by which one object acquires the properties of another object. By the use of extends keyword we inherit all the functionality provided in the class JFrame, which is used to create a frame using Swings.…