1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
4 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]4 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
A team of researchers wants to create a program to analyze the amount of pollution reported in roughly 3,000 counties across the
omeli [17]

The option that is most likely to be a challenge in creating the program is Different counties may organize data in different ways.

<h3>What is Pollution?</h3>

Pollution is known to be a kind of bringing in of harmful materials into an environment.

These harmful things are known as pollutants. Pollutants are known to be natural and artificial that is they are created by human activity, such as trash or runoff produced by factories, etc.

Learn more program from

brainly.com/question/1538272

7 0
2 years ago
Where do you go to view and access important info about your document all in one location
kumpel [21]
The place you go to view and access important info about your document would be in the menu bar.
6 0
3 years ago
Que es informatica????Ayudaaaaaa plis ​
chubhunter [2.5K]

Answer:

La informática, también llamada computación, es una rama de la ciencia encargada de estudiar la administración de métodos, técnicas y procesos con el fin de almacenar, procesar y transmitir información de forma digital

4 0
3 years ago
The __________ utility has the capability to manage users, create and administer user groups, and apply user rights to those use
barxatty [35]
The SECURITY utility has the capability to manage users, create and administer user groups, and apply user rights to those users and groups.
7 0
3 years ago
What is the different thing about search engines and various components?
alexandr1967 [171]

Answer: A search engine normally consists of four components e.g. search interface, crawler (also known as a spider or bot),indexer, and database. The crawler traverses a document collection, deconstructs document text, and assigns surrogates for storage in the search engine index.

Explanation:

6 0
3 years ago
Other questions:
  • Which of the following software is cloud-based? OpenOffice Writer Word 2013 Word Online Word Perfect\
    13·2 answers
  • Which modem settings should be configured on DSL or cable modems?
    14·1 answer
  • Select the components of a search engine.
    13·2 answers
  • A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
    11·2 answers
  • Interview Questions for a game developer help needed
    10·1 answer
  • When replacing a system board in a laptop, which feature is a must?
    10·1 answer
  • Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
    7·1 answer
  • What is hub.pls ans from pic. for computers​
    9·2 answers
  • A(n) ____ tells the compiler or interpreter that the character that follows it has a special purpose.
    14·1 answer
  • Some operating systems add the command interpreter to the kernel .what will be the justification for this design principle?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!