1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]3 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
) The order of messages on a sequence diagram goes from _____. (Points : 6)
Alla [95]

Answer:

Top to bottom

Explanation:

A sequence diagram shows the sequence or the order in which the interaction between components takes place.

It places them in order of the occurrence of the events or interactions between the components or objects thus arranging these from top to bottom.

The sequence diagram shows the way an object in a system functions and the order it follows.

3 0
3 years ago
A slide show is another name for a PowerPoint presentation. <br> a. True<br> b. False
ruslelena [56]
It is true because a powepoint is a projecter

8 0
3 years ago
Read 2 more answers
Why are businesses willing to provide more goods at higher prices
irina1246 [14]
It depends on what kinda "goods" your talking about clothes they don't have a choice cause material costs a lot overall it's their way of getting a lot of money because some people do fall for the prices and their is a lot of competition around some businesses
5 0
3 years ago
Why not to use settimeout in angular.
barxatty [35]

Answer:

start with what you know

Explanation:

you can learn alot

4 0
2 years ago
Drag each tile to the correct box.
SVEN [57.7K]

  • Learning : For performing any task you need to learn from the basiscs .
  • planning : planning is the main part . unless and until you dont know how to design and what to design , what will you design ?
  • Designing : After laying a layer of well set up plane u need to look up , and break your head in physically implying it .
  • Devaloped : This place is where you detect flaws in your system , work with that and makes it even better .
  • Testing and delevering : The product is designed , U just need to test and delever it to consumers .
6 0
3 years ago
Other questions:
  • JavaScript uses which property to change the current content of HTML elements?
    6·1 answer
  • i will be doing an interview to someone so plz comment down below something random and you will automatically enter
    11·1 answer
  • I need someone to help. This is the links I found and I'm going through the same thing. I live in small town where they think I'
    14·1 answer
  • Define
    15·1 answer
  • Write a function called count_occurrences that takes two strings. The second string should only be one character long. The funct
    13·1 answer
  • Easy coding question, please help.
    13·1 answer
  • How do you change your name on brainly after you have made an account​
    5·1 answer
  • A device that filters data traffic at a network boundary​
    14·1 answer
  • Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
    7·1 answer
  • Gps has fostered many benefits in our society, but have also added some risks. What is a risk of gps?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!