Page 168 - DCAP602_NETWORK_OPERATING_SYSTEMS_I
P. 168

Network Operating Systems-I




                    notes          9.4 keywords

                                   Group List: It is a list of user names of users who are members of the group.

                                   ls  command:  It  is  used  to  view  lists  of  files  in  any  directory  to  which  a  user  has  execute
                                   permission.

                                   9.5 self assessment

                                   Fill in the blanks:
                                   1.   The ...................... for /etc/passwd are by default set so that it is world readable, that is, so
                                       that it can be read by any user on the system.
                                   2.   User ID is the user’s unique numeric ...................... number, which is used by the system for
                                       access control.
                                   3.   In Linux systems, every user must be a member of at least one group, which is identified
                                       by the ...................... of the user’s entry in /etc/passwd.

                                   4.   etc/group is a ...................... which defines the groups to which users belong under Linux
                                       and UNIX operating system.
                                   5.   Processes run ...................... in Linux and you can kill or suspend different processes using
                                       various commands.
                                   6.   The ...................... directory is always the directory that you are put in when you login.
                                   7.   All the programs that run under Linux are called as ......................
                                   8.   …………………..specifies the user’s principal group identification number.

                                   9.   Unix file system permissions are organized into three classes, user, …………, and others.
                                   10.   Setting a particular parameter is as simple as typing VARIABLE=………………..
                                   11.   The last entry in the PATH command is a …………………..
                                   12.   The …………….command is used to view lists of files in any directory to which a user has
                                       execute permission
                                   13.   The /etc/shadow file is readable only by the …………….account and is therefore less of a
                                       security risk.

                                   14.   The default shell on Linux is………………, whose absolute path is /bin/bash.
                                   15.   Each line in /etc/passwd represents a ……………user.

                                   9.6 review Questions

                                   1.   In your opinion, what are the permissions for /etc/passwd so that it is world readable?
                                   2.   Do you think that the /etc/group file contains the database that lists every group on your
                                       computer and its corresponding GID? State your view with reasons.
                                   3.   User ID is the user’s unique numeric identification number, which is used by the system for
                                       access control. Comment

                                   4.   Examine the concept of Environment Variables
                                   5.   What are the most commonly used ls flags?
                                   6.   Elucidate the file system commands used to hold users’ information.




          162                              LoveLy professionaL university
   163   164   165   166   167   168   169   170   171   172   173