1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research

resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and ntfs permission strategy as follows: 1.share the h:\components folder using the default share name. 2.configure share permissions for the share to give the everyone group allow full control share permissions. 3.configure ntfs permissions for the h:\components folder to give the research resources group allow full control permissions. 4.keep the remaining ntfs permissions. this allows administrators full control and allows all other users to read the folder contents.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
5 0
<span>Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and NTFS permission strategy as follows:
1.share the h:\components folder using the default share name.
2.configure share permissions for the share to give the everyone group allow full control share permissions.
3.configure NTFS permissions for the h:\components folder to give the research resources group allow full control permissions.
4.keep the remaining NTFS permissions. this allows administrators full control and allows all other users to read the folder contents.</span>
You might be interested in
Use the drop-down menus to complete the statements about using section breaks in a document
krok68 [10]

Answer:

layout, next page, continuous

Explanation:

just took it

7 0
3 years ago
Write the document type declaration markup statement for an HTML5 file. Be sure to include the appropriate opening and closing b
GREYUIT [131]

Answer:

<!DOCTYPE html>

Explanation:

<!DOCTYPE html> is used in the HTML5. It is the document type declaration markup statement for an HTML5 file.

4 0
3 years ago
What are the four conditions to help determine whether a website is a good source for information?
Ratling [72]

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

3 0
2 years ago
What's exactly the difference between "Library" and "Framework" ? ​
Mariana [72]
Answer:

The key difference between a library and a framework is “Inversion of Control”. When you call a method from a library, you are in control. But with a framework, the control is inverted:the framework calls you

Explanation:

A library performs specific, well-defined operations.

A framework is a skeleton where the application defines the "meat" of the operation by filling out the skeleton. The skeleton still has code to link up the parts but the most important work is done by the application.

Examples of libraries: Network protocols, compression, image manipulation, string utilities, regular expression evaluation, math. Operations are self-contained.

Examples of frameworks: Web application system, Plug-in manager, GUI system. The framework defines the concept but the application defines the fundamental functionality that end-users care about.
8 0
3 years ago
1. Type a statement that reads a user-entered integer into variable numUsers. Assume scnr already exists.
ASHA 777 [7]

Answer:

Question 1:

int numUsers = scnr.nextInt();

Question 2:

public class OutputExample {

public static void main (String [] args) {

int numCars = 99;

Scannerscnr=new Scanner(System.in);

numCars=scnr.nextInt();

System.out.println("There are "+numCars+" cars");

return;

}

}

Question 3:

import java.util.Scanner;

public class Errors {

public static void main(String [] args) {

int userNum = 5;

System.out.println ("Predictions are hard. ");

System.out.print("Especially ");

System.out.print("about the future.");

System.out.println("Num is: "+userNum);

return;

}

}

Explanation:

In Question 1, the statement int numUsers = scnr.nextInt();  reads a new integer value from the keyboard and assigns it to the variable numUsers.

In question 2, Concatenation is used to format the print output.

In question 3, care is taken to fix each of the syntax errors (missing double quotes, semi-colon, concatenation)

3 0
3 years ago
Other questions:
  • What are the pros and cons of editorial anonymity?
    13·1 answer
  • How many parameters go into the function sum, and how many return values come out of the function sum? function sum(first, secon
    6·1 answer
  • An item such as a smart card is an example of the _______ form of authentication.
    10·1 answer
  • What are personal skills?
    5·1 answer
  • How would you convert an integer value to a float value in Python?
    10·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • The HTTP protocol operates at which layer?
    7·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • Which of the following statements is true for DMA: (only one correct answer) A. In DMA, Processor checks status until the operat
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!