File Management Flashcards

1
Q

Default location for System files

A

(Variable: %systemroot%
%windir%)

C:\Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Default location for Fonts

A

C:\Windows\Fonts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Default location for Program files

A

(Variable: %programfiles%)

C:\Program Files
C:\Program Files (x86) on 64-bit systems only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default location for User files (user profiles)

A

(Variable: %userprofile%)

C:\Users\username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Default location for Temporary files (per user)

A

(Variable %temp%
%tmp%)

C:\Users\username\AppData\Local\Temp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What variable identifies the drive letter where Windows is installed?

A

%systemdrive%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the main types of filename systems?

A
  • Long file names supported with FAT32 allows 255 characters including spaces
  • Unicode supported with NTFS allows 255 characters including all characters except for /
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the file extensions for Program files?

A

.exe
.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the file extensions for Batch files?

A

.bat
.sh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the file extensions for System files?

A

.dll (dynamic link library)
.drv (device driver)
.vxd (virtual device driver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the file extensions for Document files?

A

.rtf
.txt
.doc
.wpd
.ppt
.pdf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the file extensions for Image files?

A

.gif
.jpg
.png
.bmp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the file extensions for Audio files?

A

.mp3
.wma

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the file extensions for Windows Installer files?

A

.msi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the file extensions for Compressed files?

A

.zip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the file extensions for Script files?

A

.ps1
.vbs
.py
.js

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should you be aware of when it comes to file extensions?

A

Be aware of the following:

  • Executable files (.exe, .com) are program files that can be run. Batch files (.bat as well as other extensions) also run and execute a series of commands, but typically launch another program to interpret the commands in the batch or script file.
  • A file extension association identifies the program that is used to create a file. When you open a file that has an associated program, the program is launched and the file is opened within the program.
  • When you install an application, file extension associations are created automatically for the file types the application uses.
  • If you try to open a file type that is not associated with a program, you will be prompted to identify the program to use to open the file.
  • By default, Windows hides the extension for files with associations.
  • Use the settings in Folder Options to show file extensions for known file types.
  • To change a program associated with a file extension, use Default Programs in the Control Panel, or edit the properties of the file.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a file attribute?

A

A file attribute is metadata that gives certain qualities to a file after the attribute has been assigned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name and describe the common NTFS file attributes.

A

Read-only (R)

The R attribute marks a file as read-only meaning that the file cannot be altered by subsequent users.

Hidden (H)

The H attribute hides a file within the file system so that it cannot be viewed or accessed by users that do not have access to its specific filename.

System (S)

The S attribute identifies a file as a system file that cannot be deleted.

Archive (A)

The A attribute identifies if a file has been modified since the last backup.

Encrypted

The encrypted attribute encrypts a file.

Compressed

The compression attribute causes a file to be compressed to save space on the hard drive.

A file can either be encrypted or compressed, but not both.

Indexing

The index attribute specifies how a file is indexed. Indexing allows a system to quickly locate files using additional extensions assigned by the user.

Permissions

NTFS permissions control access to folders and files through the Windows operating system.

  • NTFS permissions are available only for files on a partition formatted with NTFS.
  • Each file has an access control list (ACL) that identifies users or groups and the actions they can perform on the file.
  • Permissions are saved as an attribute of the file.
  • Moving NTFS files to another NTFS partition preserves the permissions; moving NTFS files to a non-NTFS partition removes the permissions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What should you be aware of regarding file attributes?

A

Be aware of the following regarding file attributes:

  • The FAT32 file system supports only the following attributes: R, H, S, and A.
  • To change file or folder attributes, edit the properties of the file or folder or use the Attrib command from the command prompt. (You cannot change permissions with the Attrib command.)
  • When you copy files from an NTFS partition to a FAT32 partition, attributes not available under FAT32 do not remain with the file.

Use Folder Options to show protected operating system files, or to show compressed or encrypted files in a different color

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What should you remember when working with the command prompt?

A

Remember the following things when working with the command prompt:

  • To view the list of commands you can execute, type help. This will display the entire list of available commands.
  • To see detailed information about a specific command, type the command followed by /?.
  • Adding | more after a command will cause the output to list one screen at a time.
    • Press the Enter key to scroll down a line.
    • Press the Spacebar to scroll down a screen at a time.

You can repeat a command by pressing the Up arrow key at the command prompt. This will cause the most recent command to appear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

“cd” command

A

Use the cd command to work with the current directory. Common switches used with cd are:

  • cd by itself shows the current directory (the current directory is usually shown in the command prompt as well).
  • cd [folder name] changes the current directory to the one specified (if the directory is within the current directory).
  • cd [full path] changes to the directory specified by the path.
  • cd .. changes the current directory to the immediate parent directory (moves up one directory level).

cd /D [file] [path] changes the current drive in addition to changing the directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

“dir” command

A

Use the dir command to display a list of files and subdirectories in a directory. Common switches used with dir are:

  • dir /p pauses output at every page.
  • dir /s displays information in subdirectories.
  • dir /a[xx] displays files with the specified attributes:
    • Options may be combined, such as /arh, to show read-only, hidden files.

Use - to show files without an attribute. For example, dir /a-r shows files that are not read only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

“md; mkdir” command

A

Use the md and mkdir commands to create (make) a directory. Common switches used with md are:

  • md [directory] creates a new directory in the current directory.

md [path] [directory] creates a new directory in the directory specified by the path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

“rd” command

A

Use the rd command to delete (remove) a directory. Common switches used with rd are:

  • rd [directory] removes the specified directory within the current directory.
  • rd [path] [directory] removes the directory specified in the path.
  • rd /s removes subdirectories in addition to files in the current directory.

rd /q will not prompt you before each deletion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

“copy” command

A

Use the copy command to copy files from one location to another. Common switches used with copy are:

  • copy [source] [destination] copies the specified file to the new location.
  • copy [folder] [*.*] [path] [destination] copies all files with extensions in a folder to the new location.
  • copy /a specifies that the file is an ASCII text file.
  • copy /b specifies that the file is a binary file.
  • copy /n copies files using short filenames.
  • copy /y will not prompt you before each overwrite operation.
  • copy /v verifies files after they are copied.

Be aware of the following for how moving (copying) files between partitions affects the file attributes:

  • When copying files from a FAT32 partition to another partition, the file attributes are retained.

When copying files from an NTFS partition to a FAT32 partition, attributes such as encryption and permissions that are not available in FAT32 are removed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

“xcopy” command

A

Use the xcopy command to copy files and directory trees. Common switches used with xcopy are:

  • xcopy /a copies files with the archive attribute set and doesn’t change the attribute.
  • xcopy /m copies files with the archive attribute set and turns off the archive attribute.
  • xcopy /d copies files changed on or after the specified date. If no date is given, it copies only those files whose source time is newer than the destination time.
  • xcopy /p prompts you before creating each destination file.
  • xcopy /s copies directories and subdirectories (except empty ones).
  • xcopy /e copies directories and subdirectories, including empty ones.
  • xcopy /h copies hidden and system files also.
  • xcopy /r overwrites read-only files.
  • xcopy /k copies attributes. Normal xcopy will reset read-only attributes.

xcopy /y overwrites existing files without prompting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

“robocopy” command

A

The robocopy command (short for Robust File Copy) is used to copy entire folder structures between volumes or across a network. The benefit of using robocopy is that all NTFS file permissions and attributes are maintained and interrupted transfers can be resumed. Common switches used with robocopy uses the following are:

  • robocopy [source_folder] [destination] [options] copies entire folder structures to destination.
  • robocopy /s copies subdirectories, excluding empty directories
  • robocopy /e copies subdirectories, including empty directories
  • robocopy /mov moves all specified files and directories, and deletes them from the source when complete
  • robocopy /copyall copies all files attributes and information

RoboCopy is a very powerful copy utility and should be used only if you fully understand how to use it

29
Q

“edit” command

A

Use the edit command to view, create, or modify files. Common switches used with edit are:

  • edit [file] specifies initial files(s) to load. Wildcards and multiple file specs can be given.

edit /r load file(s) in read-only mode

30
Q

“attrib” command

A

Use the attrib command to change or view the attributes of one or more files.

  • Use the attrib command by itself to display a list of all files in the current directory.
  • Attributes that can be set or removed are identified by the attribute letter:
    • R = read-only
    • A = archive
    • S = system
    • H = hidden
    • I = not indexed

You cannot encrypt files using the attrib command. Instead, use the cipher command or edit the properties of the file.

  • Use attrib + to add an attribute to a file. For example, the following command sets the R attribute for the myfile.txt file: attrib +r myfile.txt.
  • Use attrib - to remove an attribute from a file. For example, the following command removes the R attribute from a file: attrib -r myfile.txt.

Multiple attributes can be assigned or removed at a time. For example, the following command assigns both R and S attributes to the file: attrib +r +s myfile.txt. You can also change attributes by right-clicking a file and selecting Properties from the menu

31
Q

“del” command

A

Use the del command to delete one or more files on the system. Common switches used with del are:

  • del [file] specifies the file to delete. Wildcards and multiple filenames can be given.

del /p prompts for confirmation before deleting the specified file(s).

32
Q

access control list (ACL)

A

With NTFS permissions, each file and folder has an access control list (ACL). The ACL identifies the users or groups and their level of access to the folder or file

33
Q

Summarizes the NTFS permissions for folders and files

A

Permission

Allowed Actions

Read

View folder details and attributes. View file attributes; open a file.

Write

Change folder or file data and attributes.

List Folder Contents

Includes all Read actions and adds the ability to view a folder’s contents.

Read & Execute

Includes all Read actions and adds the ability to run programs.

Modify

Includes all Read & Execute and Write actions and adds the ability to add or delete files.

Full Control

Includes all other actions and adds the ability to take ownership of and change permissions on the folder.

34
Q

What should you be aware of about NTFS permissions?

A

Be aware of the following facts about NTFS permissions:

  • When possible, assign permissions to groups rather than individual users.
  • Permissions are cumulative. Users gain the sum of all permissions granted to the user account and any groups.
  • Permissions can be allowed or denied. Denied permissions always override allowed permissions. For example, if a user belongs to two groups, and a specific permission is allowed for one group and denied for the other, the permission is denied.
  • In addition to the standard permissions, there are special permissions that offer finer control over the actions that can be performed on the file or the folder.
  • By default, users have Full Control permissions to all files in their user profile. No other users can access files in the user profile.

NTFS permissions control access for logged on users as well as users who access files through a network connection

35
Q

Explain how file ownership affects access and assigning permissions.

A
  • Every object, including files and folders, has an owner.
  • The owner is typically the user who created the file.
  • The owner has full control over the file and can assign permissions to the file.
  • Administrators have the Take Ownership right to all objects. Administrators can assign ownership of a file or folder even if they do not have permissions to access the file.
  • You can reassign ownership of a file or folder to easily give a user all permissions. You might reassign ownership when someone leaves your organization.
  • If you cannot access a file because of insufficient permissions, take ownership of the file and modify the permissions
36
Q

Explain how copying or moving files with NTFS permissions can affect the permissions on the file or folder

A
  • You must have the proper permissions to copy or move a folder or a file:
    • To copy a file or folder, you must have the Read permission to the source file and the Write permission to the destination location.
    • To move a file or folder, you must have Read and Modify permissions to the source file, and the Write permission to the destination location.
  • If you copy or move a file to a non-NTFS partition, all permissions are removed.
  • In all cases, if you copy or move a file to an NTFS partition, it will inherit the permissions assigned to the parent partition and folders.
  • If a file has explicit NTFS permissions assigned to that file:
    • If you copy or move the file to a different NTFS partition, the explicit permissions will be removed.
    • If you move the file to a different folder on the same NTFS partition, the explicit permissions will be kept.
    • If you copy the file to a different folder on the same NTFS partition, the explicit permissions will be removed.

In all cases, the file will also inherit permissions from its new partition and folder

37
Q

What is a shared folder?

A

A shared folder is a set of files that are made available over the network to other users. Users can access the files through a network connection instead of having to log on locally to the computer

38
Q

How can you share files?

A
  • Manually share a folder
  • Share the Public folder on the network. You can choose to allow all users to read documents, or to read and modify documents in the Public folder.

If the Public folder is not shared, locally logged on users will still have access to the Public folder.

  • Share your own media files. When you choose to share your media files:
    • Network users are given read access to the Pictures, Music, and Videos folders in your user profile.
    • Media is streamed to the other computers, but files cannot be copied.

You can customize which computers have access, as well as the file types which you want to share

39
Q

What are the differenttypes of share permissions and what do they allow?

A

Simple sharing permission

Advanced sharing permission

Allowed actions

Read

Read

Browse the shared folder and its files
Open files in the shared folder and its subfolders
Copy files from the shared folder
Run programs

Read/Write

Change

All Read actions (browse, open files, copy files from the folder, run programs)
Write to files and change file attributes
Create new files and subfolders
Copy files to the shared folder
Delete files or subfolders

Full Control

All Read and Change actions
Configure share permissions

40
Q

What should you be aware of when sharing files?

A

Be aware of the following when sharing files:

  • You must explicitly enable file sharing before network users can access shared folders. When you share a folder for the first time, you are asked whether you want to enable file sharing.
  • To switch between simple and advanced sharing, select Advanced Sharing.
  • Use the following tools to manually share a folder:
    • Shared Folder snap-in in Computer Management
    • Edit the properties for the folder in Windows Explorer

Use the Network and Sharing Center to enable Public folder sharing or media sharing.

  • When you share a folder, you give it a name. The share name is not the same as the folder name, although they can be the same.
  • To access a shared folder on the network,
    • Use the UNC path to the shared folder with the following syntax: \computername\sharename.
    • Use the Network feature to browse the network for the computer and view any shared folders on that computer.
    • Use the net use command to map a drive letter to the shared folder.
      • net use by itself lists the current connected shared folders and drive letters.
      • net use F: \Wrk1\shared2 maps drive letter F: to a specific shared folder.
      • net use * \Wrk1\shared2 maps the next available drive letter to the shared folder.
      • The /persistent:yes switch reconnects the connection at each subsequent logon; /persistent:no makes the mapping temporary
      • net use /? or net use ? lists the valid parameters for the net use command.
  • Adding a dollar sign ($) to the end of a share name creates an administrative share.
    • Administrative shares are not visible when browsing the network. You must use the UNC path to connect to an administrative share.
    • By default, Windows automatically creates an administrative share for every volume, with the share name being the volume letter plus the dollar sign (such as C$).
    • Default administrative shares can be accessed only by a member of the Administrators group. Configure share permissions to control access to administrative shares you create yourself..
  • Your computer must be turned on (and be awake) before users can access the shared folder.
  • Network acts as a built-in network browser showing all networks and shared folders to which the user has access. This same information can be viewed in This PC and File Explorer
41
Q

Describe the “ext2” Linux file system

A

The Second Extended File System (ext2) is one of the oldest Linux file systems still available.

  • ext2 stores data in a standard directory and file hierarchy.
  • The maximum file size supported is 2 TB.
  • An ext2 volume can be up to 4 TB in size.
  • File names can be up to 255 characters long.
  • Linux users, groups, and permissions are supported.

It does not use journaling (which is used in most modern file systems). As a result, ext2 takes a long time to recover if the system shuts down abruptly

42
Q

Describe the “ext3” Linux file system.

A

The Third Extended File System (ext3) is an updated version of ext2 that supports journaling. Before committing a transaction to a storage device, the ext3 file system records the transaction to the journal and marks it as incomplete. After the disk transaction is complete, the file system marks the transaction as complete in the journal. By doing this, ext3 can keep track of the most recent file transactions and whether or not they were completed. This allows ext3 to recover much more quickly than ext2 in the event of an unclean system shutdown

43
Q

Describe the “ReiserFS” file system

A

The Reiser file system (ReiserFS) is an alternative to the ext3 file system. Like ext3, Reiser uses journaling to make crash recovery very fast. However, Reiser is a completely different file system from ext2 and ext3, using a dramatically different internal structure. ReiserFS supports a maximum file size of 8 TB and maximum volume size of 16 TB. In addition, the structure of Reiser allows it to perform much faster than ext2 or ext3

44
Q

Describe the “ext4” Linux file system

A

ext4 is the fourth generation file system in the ext file system family. ext4 includes all of the features found with ext2 and ext3, with the addition of the following features:

  • Support for file sizes up to 16 TB and disk sizes up to 1 exabyte (EB)
  • Allows for up to four billion files in the file system
  • Uses checksums to verify the integrity of the journal file itself

Checksums help improve the overall reliability of the system because the journal file is the most heavily used file of the disk

45
Q

Describe the “swap” Linux file system

A

A swap file system is used as virtual memory (the portion of the hard disk used to temporarily store portions of main memory) by the operating system.

A recommended practice is to make the swap file size between 1 and 1.5 times the amount of memory on the computer

46
Q

Describe the “CDfs” Linux file system

A

CDfs is a virtual Linux file system that provides access to individual data and audio tracks on compact discs (CDs). A compact disc mounted with the “CDfs” driver appears as a collection of files, each representing a single track

47
Q

Describe the “NFS” Linux file system

A

Network File System (NFS) is a distributed file system protocol that allows a user on a client computer to access files over a computer network much like local storage is accessed

48
Q

Describe the “NTFS” Linux file system

A

Microsoft operating systems use NTFS (New Technology File System). Linux provides limited support for NTFS

49
Q

Describe the VFAT Linux file system

A

VFAT is a FAT32 file system for Linux and does not support journaling. VFAT includes long name support. Support for VFAT must be compiled into the kernel for the system to recognize the VFAT format

50
Q

Describe the XFS Linux file system

A

The XFS file system was developed for the Silicon Graphics IRIX operating system. An XFS file system is proficient at handling large files, offers smooth data transfers, and provides journaling. It also can reside on a regular disk partition or on a logical volume

51
Q

Describe the “Btrfs” Linux file system

A

Btrfs is a Linux file system that uses a copy-on-write file system. Using copy-on-write technology, Btrfs provides several key features not found in earlier file systems:

  • Storage pools - Instead of using traditional disk partitions, Btrfs allows you to create storage pools from the storage devices in your system. From the storage pool, you can then allocate space to specific storage volumes. Instead of mounting partitions, you mount storage volumes at mount points in the file system.

Snapshots - The snapshot functionality provided by Btrfs protects data. It can be configured to take snapshots of your data at specified intervals and save it on separate media. If a file ever gets lost or corrupted, you can restore a previous version of the file from a snapshot

52
Q

“pwd” shell command

A

Displays the current directory on the screen

53
Q

“ls” shell command

A

Displays a list of files and subdirectories that exist within a directory. Some options commonly used with the ls command include the following:

  • -a displays all files, including hidden files.
  • -l displays a detailed (long) listing of directory contents including ownership, permissions, modification dates, and file sizes.

-R displays the contents of the directory as well as all of its subdirectories

54
Q

“cd” shell command

A

Changes directories in the file system. For example, to change to the /home directory in the file system, you would enter cd /home at the shell prompt

55
Q

“cp” shell command

A

Copies files and directories from one location in the file system to another. For example, to copy the widget.odt file to the /home/rtracy directory, you would enter cp widget.odt /home/rtracy at the shell prompt.

To copy an entire directory structure, include the -R option, which specifies that the directory contents be recursively copied

56
Q

“mv” shell command

A

Moves files and directories from one location in the file system to another. For example, to move the widget.odt file to the /home/rtracy directory, you would enter mv widget.odt /home/rtracy at the shell prompt

57
Q

“rm” shell command

A

Deletes files and directories from the file system. For example, to delete the widget.odt file, you would enter rm widget.odt at the shell prompt

58
Q

“cat” shell command

A

Displays the contents of a text file on the screen. For example, to view the contents of the widget.txt file, you would enter cat widget.txt at the shell prompt

59
Q

“less” shell command

A

Displays the contents of a text file on the screen, pausing the output one screen at a time. For example, to view the contents of the widget.txt file one page at a time, you would enter less widget.txt at the shell prompt

60
Q

“head” shell command

A

Displays the first few lines of a text file on the screen. For example, to view the first lines of the widget.txt file, you would enter head widget.txt at the shell prompt

61
Q

“tail” shell command

A

Displays the last few lines of a text file on the screen. For example, to view the last lines of the widget.txt file, you would enter tail widget.txt at the shell prompt.

The -f option can be used with tail to monitor a file for changes. If new content is added to the end of the file (such as a log file), the new lines will be displayed on the screen

62
Q

“vi” shell command

A

Edits the contents of a text file. The vi command uses four different operating modes:

  • Command mode
  • Command-line mode
  • Insert mode
  • Replace mode

For example, to edit the contents of the widget.txt file, you would enter vi widget.txt at the shell prompt. You would then press the Ins key to enter Insert mode and make the necessary changes to the file. When done editing the file, you would press the Esc key to enter Command mode. The you would press the : key to enter command-line mode where you would enter exit to save your changes and exit the vi editor

63
Q

“su” shell command

A

Allows you to switch user accounts.

su - (su with a space and a hyphen) is used to switch to the root user with the home directory and environment variables assigned to the root user

64
Q

“chown” shell command

A

Changes the user or group that owns a file or directory. For example, to change the owner of the widget.txt file to the ksanders user, you would enter chown ksanders widget.txt

65
Q

“chgrp” shell command

A

Changes the group that owns a file or directory. For example, to change the group that owns the widget.txt file to the RandD group, you would enter chgrp RandD widget.txt.

66
Q

“chmod” shell command

A

Changes the permissions assigned to three file system entities:

  • Owner: This is the user account that has been assigned to be the file or directory’s owner. Permissions assigned to the owner apply only to that user account.
  • Group: This is the group that has been assigned ownership of the file or directory. Permissions assigned to the group apply to all user accounts that are members of that group.
  • Others: Identifies all other users who have successfully authenticated to the system. Permissions assigned to this entity apply to these user accounts.

Files and folders in the Linux file system can be assigned one or more of the following permissions:

  • Read: Allows a file to be opened and viewed. Allows the contents of a directory to be listed. This permission is represented by a numeric value of 4.
  • Write: Allows a file to be changed. Allows files to be added or deleted from a directory. This permission is represented by a numeric value of 2.
  • Execute: Allows an executable file to be run. Allows a directory to be entered. This permission is represented by a numeric value of 1.

There are several different ways the chmod command can be used to modify the permissions assigned to a file or directory:

  • Enter chmod entity=permissions filename. Substitute u for Owner, g for Group, and o for Others in the entity portion of the command. Substitute r, w, and/or x for the permissions portion of the command.
  • Enter chmod entity+/-permission filename. Substitute u for Owner, g for Group, and o for Others in the entity portion of the command. Substitute r, w, and/or x for the permissions portion of the command.
  • Enter chmod 3-digit_numeric_permission filename. The first digit assigns permissions to Owner, the second to Group, and the third to Others.
67
Q

“dd” shell command

A

Copies file system data using records. It can copy files, directories, partitions, or even entire hard disks. For example to copy a disk partition to a file on a removable USB drive, you would enter dd if=/dev/sdb1 of=/media/usb/partition.bak

68
Q

shutdown” shell command

A

The shutdown command brings the system down or reboots the system in a secure manner. The syntax of the shutdown command is shutdown +m -h|-r message. The options for the shutdown command include:

  • +m specifies when to perform the shutdown operation. The amount of time is specified in minutes.
  • -h instructs the system to shut down and power down.
  • -r instructs the system to reboot after the shutdown.

message specifies a message that is sent to all users that accompanies the standard shutdown notification