1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nadusha1986 [10]
2 years ago
8

You are responsible for creating a shared file system to support a new branch office. The manager has requested shared locations

for branch staff to access the files. An area is required for all staff to access common forms and notices. Staff members are required to have read-only access to this location, but the manager requires full access to all content. A different area is required for all staff to share files without restrictions. The last area required is for the manager’s private files, and only the manager has access to this location. A second manager will be hired in the next month to share the current manager’s duties for job training. Both managers will require the same access throughout the file system. Only the IT administrator should have the ability to change file and folder permission settings for any area. Network permissions are not a concern, because they will be configured appropriately based on the NTFS permissions that you select.
Computers and Technology
1 answer:
devlian [24]2 years ago
3 0

The groups that I would create to simplify permission assignment are:

  • Full Control group,
  • Change group,
  • Read group.
  • Domain Admins group
  • Users

<h3>What are the folders?</h3>
  • Administrator Manager Folder,
  • Staff Folder,
  • Common Folder Manager, etc.

The file-level permission settings that I would use to achieve the desired results are:

  • read
  • write
  • execute

<h3>What is file permission settings?</h3>

If a person wants to set permissions in any organization's system, the person need to specify what places that the users are allowed to do in or within a folder, e.g. save and delete files or make a new folder.

The  standard permissions settings (are known to be:

  • Full Control
  • Modify
  • Read & Execute
  • List Folder Contents
  • Read, or Write.

Hence, The groups that I would create to simplify permission assignment are:

  • Full Control group,
  • Change group,
  • Read group.
  • Domain Admins group
  • Users

Learn more about  IT administrator from

brainly.com/question/21852416

#SPJ1

See complete question below

What groups would you create to simplify permission assignment? What folder structure and corresponding file-level permission settings would you use to achieve the desired results?

You might be interested in
What can you add to your presentation from the insert ribbon toolba?
stiks02 [169]

Answer:

anything you want

Explanation:

there are a lot of adons for powerpoint

7 0
3 years ago
Which of the following statements is true of intrapreneurs
chubhunter [2.5K]

<u>Answer is:</u>

They take risks, but not with their own investments.

<u>Explanation:</u>

Intrapreneurship is the act of behaving like an entrepreneur while working within a large organization. Intrapreneurship is known as the practice of a corporate management style that integrates risk-taking and innovation approaches, as well as the reward and motivational techniques, that are more traditionally thought of as being the province of entrepreneurship.


<u>Example:</u>

One of the most well-known examples of intrapreneurship is the "Skunk Works" group at Lockheed Martin. The group was originally named after a reference in a cartoon, and was first brought together in 1943 to build the P-80 fighter jet. Because the project was to eventually become a part of the war effort, the project was internally protected and secretive. Kelly Johnson, later famous for Kelly's 14 rules of intrapreneurship, was the director of this group.

4 0
4 years ago
An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
Nataliya [291]

Answer:

D1= 60 HOSTS

network address - 200.120.80.64/26

subnet mask -255.255.255.192/26

D2 = 90 HOSTS

network address - 200.120.80.0/25

subnet mask -255.255.255.128/25

D3 = 90 HOSTS

network address - 200.120.80.128/25

subnet mask -255.255.255.128/25

5 0
4 years ago
Describe how a user would interact with a smart-phone to do various tasks.Consider inputs and outputs.
xz_007 [3.2K]

A smart-phone is also referred to as a mobile device and it can be defined as a small, portable, programmable-electronic device that is designed and developed for sending (transmission) and receiving data (messages) over a network. Thus, a smart-phone must be designed as a hand-held device with communication capabilities.

Basically, the components that make up a smart-phone can be classified into two (2) main categories and these include:

1. <u>Input:</u> it comprises mouthpiece, keyboard, light sensor, etc.

2. <u>Output:</u> it comprises screen, speaker, earpiece, etc.

In this context, an end user would interact with a smart-phone in the following ways to perform (do) various tasks:

  • By using a keyboard to type a text and then sending it to another person.
  • By using a mouthpiece as an input for voice (audio) messages when making call.
  • The screen of a smart-phone displays the necessary information to an end user.
  • When playing a digital music file the speaker produces the output as sound.

Read more on smart-phone here: brainly.com/question/4922532

7 0
3 years ago
What was the first carbonated drink to be introduced in the US?
adelina 88 [10]
Taco bell...........................................................................................................................................................................

6 0
3 years ago
Other questions:
  • An operating system is an example of which of the following
    13·1 answer
  • Which us electronic company was the pioneer in home video game consoles?
    13·1 answer
  • All employees of E.C. Hoxy are required to pass through a gate and present their photo identification cards to the guard before
    10·1 answer
  • In general, WAN-specific standards identify specific security requirements for WAN devices. For example, the ___________________
    10·1 answer
  • How to use command prompt​
    14·1 answer
  • To carry computer data over the long haul, wans need to have a(n) ________ in multiple towns and cities.
    10·1 answer
  • Why should you avoid the use of sarcasm, clichés, and idioms in business letters?
    11·2 answers
  • You wish to use a file system that creates a record or log of to-be-committed changes in the system so that if the system crashe
    14·1 answer
  • What is the web of trust
    7·2 answers
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!