1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]3 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
What method parses its string argument to determine whether the string can be converted to a number?
den301095 [7]
The correct answer is: Tryparse method
6 0
3 years ago
Which is a feature of a correlated subquery? a. The outer subquery executes independent of the inner subquery. b. The outer subq
Mama L [17]

Answer:

b. The outer subquery initiates the process of execution in a subquery.

B is correct.

Explanation:

The important feature of a correlated subquery is: It must be executed repeatedly because it depends on the value from the outer SELECT, and must execute once for every value that the outer SELECT produces.

3 0
3 years ago
Busca información (nombre, potencia y situación) de los parques eólicos de la Comunidad Valenciana. con más de 40 MW de potencia
Colt1911 [192]
I need this answer too can someone please help us out with the right answer ?!

Explanation:
6 0
2 years ago
What is the intellectual property
Ede4ka [16]

Answer:

B- intangible ideas

Explanation:

The B. intangible ideas are the correct option certainly. By intangible items we mean Ideas, knowledge, talent, data, trade secret, and intellectual property is also a part of it like the trademarks, patents, and copyrights. And hence intellectual property is a kind of the B. intangible idea. Thus, B is the correct option.

7 0
3 years ago
What is the difference between print and nonprint sources?
UkoKoshka [18]
The answer is (B) print sources consist mostly of text; non-print sources consist mostly of images and sounds.

If we would think in Layman’s, we would describe print sources as ink and non-print sources as light or electronic. Therefore, print sources are publications printed on papers and distributed as books, magazines, newsletters, journals and many more. On the other hand, non-print sources are mediums that use electronics energy for the end user to access content. Examples of non-print media include, television, internet, and radio.






5 0
3 years ago
Other questions:
  • What operating system was most commonly used by early personal computers? Apple Mac MS-DOS Windows
    6·2 answers
  • In a student​ database, a row that describes the top​ student, including his or her​ lastname, firstname, and​ studentnumber, is
    9·1 answer
  • An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
    5·1 answer
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • Complexities of communication are organized into successive layers of protocols: lower-level layers are more specific to medium,
    8·1 answer
  • Which one of these tasks is part of the pre-production phase of game development?
    5·2 answers
  • You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top
    8·1 answer
  • If the user enters any operator symbol other than , -, *, or /, then an UnknownOperatorException is thrown and the user is allow
    8·1 answer
  • Select the correct answer from each drop-down menu.
    10·2 answers
  • Question #5
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!