In Linux, the three levels of file access are ____, ____, and ____.

A. owner; domain; group
B. owner; group; administrator
C. administrator; owner others
D. owner; group; others

Answer: D

Computer Science & Information Technology

You might also like to view...

In a Word document, use the ________ feature to insert data from an Access table in various formats

A) Paste B) Keep Source Formatting C) Merge Formatting D) Paste Special

Computer Science & Information Technology

Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause?

A. Encryption type B. Channel selection C. Antenna placement D. Signal strength

Computer Science & Information Technology