This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Provide one set of results for the submission. 1. What group are you in? What group is your peer in? How did you find this out? 2. For each subdirectory, report your experimental results in a table like the following (8 subdirectories, all 8 files): testdir1 Which permission bits apply? Explain. Permission setting on the directory: ______________________ From the “mydirectory”: Can you cd to the testdir1 directory? Yes no Can you list the contents of the testdir1 directory? Yes no testfile1.htm : permissions for “other”: _____________ list the file view the contents of the file Modify the contents of the file Delete the file Yes no Yes no Yes no Yes no Comments: // continue on… 3. Provide the commands to launch, edit (add text, copy/paste text, delete text), save, and exit the pico, emacs, and vi editors....
View Full Document
This note was uploaded on 12/12/2009 for the course CS 3375 taught by Professor Kendracooper during the Fall '08 term at University of Texas at Dallas, Richardson.
- Fall '08