1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
4 years ago
9

Which smb share option should you enable if you don't want users to see files they don't have at least read permission to?

Computers and Technology
1 answer:
BigorU [14]4 years ago
5 0
Enable all of them. have a nice day


You might be interested in
Pick the correct statements regarding cell references.
shusha [124]

Statement two and three is correct.

Statement 1 is incorrect. A relative reference changes when a formula is copied to another cell while Absolute references remain constant. However, it is safe to say that an absolute address can be preceded by a $ sign before both the row and the column values. It is designated by the addition of a dollar sign either before the column reference, the row reference, or both. Statement C is also correct. A mixed reference is a combination of relative and absolute reference and the formula (= A1 + $B$2) is an example of a mixed cell reference.

7 0
4 years ago
Read 2 more answers
The following characteristics are common to the majority of cloud environments, except: 1. on-demand usage 2. resiliency measure
irga5000 [103]

Answer: 4. Availblitliy is not a major characteristic.

Explanation:

-Manufacturing organization can provide additional computing resources without going through the cloud service provider.

-Multi-tenancy allows multiple customers to share the same applications/the same physical infrastructure while retaining privacy and security over their information.

-Cloud computing resources usage is metered and organizations pay accordingly for what they have used.

-Elasticity is a landmark of cloud computing and it implies that organizations can rapidly provision and de-provision any of the cloud computing resources.

4 0
4 years ago
What permissions are needed in order to use a work online that is in the public domain?
Maurinko [17]
<h2 /><h2>⇒Written  \: permission  \: from \\  the  \: creator</h2>

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

5 0
3 years ago
You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. Yo
-BARSIC- [3]

Answer:

b. Same SSID, different channel

Explanation:

The Service Set Identifier (SSID) is a sequence that is included in all of the sets in a wirless network and helps identify them as part of the network. Because both points connec to the same network they need the same SSID.

7 0
3 years ago
Which feature is needed to make enterprise application migrate to private cloud ?
den301095 [7]

The answer is C: Enablement of application as SaaS.

A cloud can provide IT infrastructure network services like storage and servers. Once an application has been identified as a potential candidate for cloud migration, it is important to consider what type of cloud environment; PaaS, SaaS, or IaaS. In this case, SaaS will be considered. SaaS host business application and makes them available to clients online. It removes the need for enterprises to run applications on their own.

8 0
3 years ago
Read 2 more answers
Other questions:
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • What is the name of the process that is used to establish whether or not a user’s identity is legitimate?
    7·1 answer
  • The process of bringing data or a file from one program to another is called
    13·2 answers
  • gAssume that you are writing a program to merge two files named FallStudents and SpringStudents. Each file contains a list of st
    15·1 answer
  • Based on current and upcoming gaming technologies, what changes do you expect to see in the next generation of gaming consoles?
    6·1 answer
  • The Recycle Bin exists as a metaphor for throwing files away, but it also allows a user to retrieve and restore files. Once the
    7·1 answer
  • To minimize the invasion of privacy, _____.a.organizations should not modify data once it is entered into an information systemb
    14·1 answer
  • What are the two types of formulas in excel
    9·1 answer
  • How does design influence the product's function?
    5·1 answer
  • You are working on a ticket for a user who cannot access the Internet from their PC. After troubleshooting, how do you confirm t
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!