Symbolic notation uses criteria such as categories and operators to change
file permissions. For example, chmod u+x file1 gives the owner execute
permission for the file1 file. Numeric nota
CISC-202 A. Tom Hasani
Step 6: The text in the first three lines changes to a lighter font and is italic.
Step 9: A star is added to the left of lines 5 and 10.
Step 10: The insertion point moves to the previous bookmark, w
Step 8: tiff-3.8.2-145.4.1.i586, which means Tiff is installed (version 3.8.2, release
145.4.1, architecture i586).
Step 10: The freshen option doesnt work because Tiff is no longer installed. To
check, use rpm -q tiff.
CISC202_AH_ C8-RQ & CP
2. A, C, D
11. A router is needed for two computers to communicate over different
12. Its used to determine which part of an IP address is used for the network ID
CISC202_AH_C7 RQ & CP
Every user must be assigned to at least one group. A users primary group is
the default group the user is assigned to when the account is first created and
is the group owner of all files the user creates. S
Step 2: Answers will vary.
Step 3: TCP is a connection protocol responsible for keeping track of the packets and
reassembling them into a single file after theyve arrived. UDP is similar to TCP in
that it uses IP to ge
Step 4: A tar file; 10240.
Step 5: Yes.
Step 7: Yes, the three files should be back, and the tar file should still be there
because the tar utility doesnt overwrite files. Instead, it makes a copy of the file and
Step 8: No, the user doesnt have execute permission.
Step 9: Symbolic
Step 10: Your current directory is.
You're changing to your parent directory, which is.
You're moving b
CISC 202.NO1 A. Tom Hasani
1. The main purpose is to create a file that can be used by another program. For
instance, text files can contain HTML for a Web browser to display or source
code that a compiler can process. Another p
Activity 7-1: Creating Users
Step 3: No. Only the root user can view the /etc/shadow file.
Step 5: The password aging controls are as follows:
# Password aging controls (used by useradd):
# PASS_MAX_DAYS Maximum number of days a
CISC202_AH_C9-RQ & CP
1. a, b,c, d
2. a, c
3. d, b, or c
a. Name: The name describing the packaged software. RPM uses the
package file's contents during installation, which means this name can
CISC202.N01_AH_C6-RQ & CP
A snapshot file is used with the -listed-incremental option for the tar
utility. This option specifies which files have been added to the archive. The
tar utility checks the snapshot file, and if