1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
4 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]4 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
It is possible to play older console games such as those written for the nintendo game boy or sega genesis on a personal compute
timurjin [86]
Emulator««««that is the answer
5 0
3 years ago
Mark each statement as true or false: a. PATA hard drives are older and slower than SATA hard drives. b. SATA1 is about 10 times
deff fn [24]

Answer:

The answer to this question can be described as follows:

a) True

b) False

c) False

d) False

e) False

f) True

Explanation:

In option a,  PATA device is used to connect the hard drives into systems.  Its title suggests, depends on parallel transmitting technology, contrasted to the compulsive-signaling tools.

In option b, SATA1 is a first-generation device, and SATA3 third generation, that's why it is wrong.

In option c and option d, both were wrong because RAID 0 and RAID 5 are Cloud computing software for storing data.

In option e, An internal SATA data cable with an eSATA port can not be used as an additional connection is provided by the eSATA port.

In option f, It is true because there are 7 pins in internal SATA.

6 0
3 years ago
Which of the main value components are contained in the value proposition "SportsAde offers serious athletes a great-tasting way
Elina [12.6K]

Answer:

Explanation:unique difference/benefits

- "a great-tasting way to stay hydrated during exercise" this is the benefit statement

2. product/service category or concept is

- the drink

3. target market

- "serious athletes" is the target market

4. offering name or brand is

- SportsAde

5 0
4 years ago
For what purpose do the hackers create the zombies army?
enyata [817]

Answer:

A. DDoS Attacks

Explanation:

A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks

E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers

Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks

While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines

A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone

5 0
3 years ago
Given the declaration
STALIN [3.7K]

Answer:

False

Explanation:

There's only one component of the array list which is list[0] which has value 50

7 0
3 years ago
Other questions:
  • Conduct online research to determine specific conflict-resolution and management techniques and skills that would be beneficial
    5·1 answer
  • "As a ____ database management system, Access is particularly powerful because you can enter data once and then retrieve informa
    6·1 answer
  • Which evaluation factor will be most important when choosing technology for the company
    5·1 answer
  • Discuss a situation in which you might want to use a floating-point number with a fractional part for a loop control variable. W
    5·1 answer
  • The entire presentation can be seen at a time in __________
    5·1 answer
  • 1.<br> The correct way to use a seat belt is
    8·1 answer
  • Consider the following statements: struct supplierType { string name; int supplierID; }; struct paintType { supplierType supplie
    13·1 answer
  • Write a class called TextProcessor that implements the methods listed below. Your implementation may use the charAt() and length
    14·1 answer
  • What are the benefits of a relationship in RDBMS <br>​
    14·1 answer
  • A computer is defined by 4 specific criteri. Select all 4.*
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!