In Linux, the three levels of file access are ____, ____, and ____.
A. owner; domain; group
B. owner; group; administrator
C. administrator; owner others
D. owner; group; others
Answer: D
Computer Science & Information Technology
You might also like to view...
In a Word document, use the ________ feature to insert data from an Access table in various formats
A) Paste B) Keep Source Formatting C) Merge Formatting D) Paste Special
Computer Science & Information Technology
Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause?
A. Encryption type B. Channel selection C. Antenna placement D. Signal strength
Computer Science & Information Technology