1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research

resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and ntfs permission strategy as follows: 1.share the h:\components folder using the default share name. 2.configure share permissions for the share to give the everyone group allow full control share permissions. 3.configure ntfs permissions for the h:\components folder to give the research resources group allow full control permissions. 4.keep the remaining ntfs permissions. this allows administrators full control and allows all other users to read the folder contents.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
5 0
<span>Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and NTFS permission strategy as follows:
1.share the h:\components folder using the default share name.
2.configure share permissions for the share to give the everyone group allow full control share permissions.
3.configure NTFS permissions for the h:\components folder to give the research resources group allow full control permissions.
4.keep the remaining NTFS permissions. this allows administrators full control and allows all other users to read the folder contents.</span>
You might be interested in
Please help it's my last question
Yuki888 [10]

Explanation:

here is your answer.. of. different between client / server architecture and peer to peer architecture of the network.

6 0
2 years ago
Read 2 more answers
One of the most common causes of fires in the home and workplace is: a. All of the answer choices b. Arson c. Candle d. Faulty e
solniwko [45]
Electricity is one of the most common causes of fire in homes and workplaces. Electrical accidents appear to be caused by a combination of two factors: 1. Unsafe equipment and/or installation; 2. Workplaces made unsafe by the environment

So the answer would be D)Faulty electricity
8 0
3 years ago
What is the famous saying among computer programmers?
USPshnik [31]
The famous saying is garbage in , garbage out .
3 0
3 years ago
The ________ maps the software architecture created in design to a physical system architecture that executes it. (Points : 3) a
VARVARA [1.3K]

Answer:Deployment diagram

Explanation: Deployment diagram is the diagram that is used for displaying the hardware parts upon which the software architecture works.The main purpose of the diagram is showing the function and operations taking place through the deployment of the software system with the hardware.

These diagrams are made up of the nodes , interface, artifacts and other components. Other given options are incorrect because architectural diagram is for designing of the architecture of a system,sequence diagram is used for the sequential order display of system components and  state chart diagram is the diagram that shows the status of the parts of the operating system.

Therefore, the correct option is deployment diagram.

8 0
3 years ago
A(n) ________
anzhelika [568]

An anaglyph is a graphic image composed of two images, one that is tinted red and the other that is tinted blue. When viewed together these images produce a stereoscopic effect.

Further Explanation:

To explain what an Anaglyph is and the concept it uses to work, I will use a simple demonstration. Place your finger higher up at a shorter distance from your face and close your left eye. You will notice your finger move slightly a bit to the left. The same happens when you close your right eye too.

Basically, Anaglyphs work by laying one images over the other from two angles. One image has a red tint and the other a blue tint. To view an Anaglyph image, you need glasses with the corresponding colors of the image. Note that if the image for the right eye is blue, it can only be filtered out by the red lense and not the blue lense and vice versa.

Learn more about anaglyph by clicking the image below

brainly.com/question/11507732

#LearnWithBrainly

3 0
3 years ago
Other questions:
  • In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the
    12·1 answer
  • The eastern front was longer than other fronts of the war true or false
    7·2 answers
  • A(n) _____ is a type of man-in-the-middle attack where an attacker captures the data that is being transmitted, records it, and
    15·2 answers
  • Suppose that a system uses 32-bit memory words and its memory is built from 16 1M × 16 RAM chips. How large, in words, is the me
    11·1 answer
  • How do I answer a question that was answered incorrectly on Brainly
    10·2 answers
  • Match each role to the corresponding web development task.
    14·1 answer
  • The complete process for learning through repetition is to read, write, say, rest and revisit the information. Please select the
    12·2 answers
  • Write a paragraph about ICT in personal life?
    12·1 answer
  • A serial schedule:
    8·1 answer
  • 3.8 LAB: Read values into a list
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!