1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
4 years ago
7

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f

older on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. ​He should designate all the files in the shared folder as execute-only.
B. ​He should designate all the files in the shared folder as author only by using the chown command.
C. ​He should designate all the files in the shared folder as client only by using the chgrp command.
D. ​He should designate all the files in the shared folder as read-only.
Computers and Technology
1 answer:
kumpel [21]4 years ago
8 0

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

You might be interested in
What are the possible consequences of invasion of privacy?
Sergio039 [100]
Jail time since you can be considered a spy or a perv. Whatever you aim is of course.
7 0
3 years ago
Next
DIA [1.3K]

Answer:

integrity

is acting consistently according to one's values and principles.

3 0
2 years ago
What does it mean to design,<br> implement, and maintain computer<br> systems?
docker41 [41]

Answer:

Let's take an example of the embedded system, which is a perfect example of this question as a computer system. Suppose we want the embedded system to record the details related to soil of agricultural land. We will take an IoT device which will be a sensor that can register soil properties, and get connected to the computer system through the internet. And we design an embedded system that registers these values and then copy them like somewhere in DB space on Amazon cloud or Google cloud. And finally display on some LCD or a big projector, or whatever, and like we design. Thus we have designed, and now when we install this on agriculture land, we implement it, and since check regular for correct performance, we maintain this embedded or a mini-computer system as well. This is what design, implement and maintain computer systems mean.

Explanation:

Please check the answer section.

8 0
3 years ago
Which file types have .exe and .omg as their extensions?
Tatiana [17]
I know that Windows computer files use the extension exe.

3 0
3 years ago
D. A................ usually contains detailed comments about something in the text.
kondaur [170]

Answer: Foot note

Explanation:

The option that contains detailed comments about something in the text is simply referred to as the foot note.

A footnote is simply refered to as the note that is at the bottom of a particular page which gives more information about a particular thing.

Therefore, based on the options given, the answer is B.

7 0
3 years ago
Other questions:
  • If Mark is developing a website to be optimized for mobile devices, what would be the top-level domain?
    10·1 answer
  • 1. A video card on a modem motherboard would run best in which type of slot?
    10·1 answer
  • Finding your style in photography is about ___
    10·2 answers
  • Choose the sentences that describe techniques of formatting text.
    12·1 answer
  • What statement would you use to assign the value 32 to the variable cheeses?
    14·1 answer
  • When working in excel online, which of the following is considered a conditional formula?
    8·2 answers
  • Matching: match each step with its correct sequence number. This question tests whether you know the order in which a CPU perfor
    14·1 answer
  • All organizations with a router at the boundary between the organization’s internal networks and the external service provider w
    11·1 answer
  • Life without internet points
    7·2 answers
  • ________ software consists of operating systems, utilities, device drivers, and language translators.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!