1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
4 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]4 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
What is not an example of a job skill
ikadub [295]

Being dishonest, irresponsible and unpunctual.Answer:

Explanation:

8 0
2 years ago
Read 2 more answers
Which factors have increased the need for the latest cybersecurity technologies?
coldgirl [10]

The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.

<h3>What are the cybersecurity?</h3>

Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.

Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.

Read more about the cybersecurity technologies:

brainly.com/question/26260220

#SPJ1

7 0
2 years ago
Maria wants to create an image for a Web page. Maria should use _____. help me
Inessa [10]
Graphics software
Hope it helps
8 0
3 years ago
Read 2 more answers
Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
Vedmedyk [2.9K]

Answer:

Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the prototype (activity 2), and test the prototype (activity 3). activity 1 is the predecessor for activity 2 and activity 2 is the predecessor for activity 3. if the prototype fails testing, bill must redesign the prototype; therefore, activity 3 is a predecessor for activity 1. this is an example of

b. looping

Explanation:

  • The given example is of looping because each activity is leading to another activity on the completion of some conditions.
  • The answer a is not valid as it is not just an example of conditional statements rather it is a loop which will keep moving until unless reached a situation to end it.
  • The option c, d an e are not right options for the given example.
4 0
3 years ago
To display the entire entry for a calculated field, select the column in the Field row, right-click to display the shortcut menu
matrenka [14]
Then click zoom :))))))<span />
3 0
3 years ago
Other questions:
  • Which group allows you to add notes to your presentation?Ella has finished drafting her presentation. What should she do next?
    15·2 answers
  • Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
    15·1 answer
  • (Complete the Problem-Solving discussion in Word for Programming Challenge 2 on page 404. Your Problem-Solving discussion should
    13·1 answer
  • The main purpose of a constructor is to initialize the data members at the moment that an object is created. true or false?
    8·1 answer
  • Determine the “answer” to the formula according to the spreadsheet below:<br><br> =A3 + B4 + D2.
    15·1 answer
  • How do you delete answers on Brain.ly?
    11·2 answers
  • after pouring concentrated disinfectant on larger drops or pools of blood how much contact time should be allowed before attempt
    8·2 answers
  • Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of
    10·1 answer
  • What is a dbms in full
    15·1 answer
  • How to turn off life360 without parents knowing on iphone
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!