Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. He should designate all the files in the shared folder as execute-only. B. He should designate all the files in the shared folder as author only by using the chown command.
C. He should designate all the files in the shared folder as client only by using the chgrp command.
D. He should designate all the files in the shared folder as read-only.
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.
The answer is entrepreneurial and bureaucratic. Organizations
that are large and small can achieve higher sales and other profit by properly
matching their needs with the structure they use to operate. the structure of an organization can help or
hinder its progress toward accomplishing these goals and This are specific set
up of organizations and ways to accomplish different goals.