1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research

resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and ntfs permission strategy as follows: 1.share the h:\components folder using the default share name. 2.configure share permissions for the share to give the everyone group allow full control share permissions. 3.configure ntfs permissions for the h:\components folder to give the research resources group allow full control permissions. 4.keep the remaining ntfs permissions. this allows administrators full control and allows all other users to read the folder contents.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
5 0
<span>Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and NTFS permission strategy as follows:
1.share the h:\components folder using the default share name.
2.configure share permissions for the share to give the everyone group allow full control share permissions.
3.configure NTFS permissions for the h:\components folder to give the research resources group allow full control permissions.
4.keep the remaining NTFS permissions. this allows administrators full control and allows all other users to read the folder contents.</span>
You might be interested in
Why should you limit what information is in your digital footprint?
oee [108]

Answer:

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

Explanation:

3 0
3 years ago
Select all the correct answers.
krok68 [10]

Answer:

Higher resolutions in games

Smoother, faster playback

Explanation:

A graphics card is a piece of hardware installed on a computer that that is responsible for rendering the image on the computer's monitor or display screen. Graphics cards come in many varieties with varying features. The CPU will send any graphics related tasks directly to the GPU while it continues to process other tasks. Because graphics cards use a lot of power they need a cooling fan. The cooling fans are noisy so they make the computer sound louder than they were before the graphics card was installed.

7 0
2 years ago
Read 2 more answers
What the repeal of online privacy protections means for you?
kvv77 [185]
Online Privacy is well, our privacy while on the internet. If they have repealed that, then we have no privacy while on the internet. I feel like now a days there is no privacy at all anywhere. Everywhere you go, there are cameras watching you. So for them to take away online privacy is pretty messed up.
7 0
3 years ago
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's softw
V125BC [204]

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

8 0
2 years ago
The readline method reads text until an end of line symbol is encountered, how is an end of line character represented
zhannawk [14.2K]

Answer:

\n

Explanation:

readline() method is used to read one line from a file. It returns that line from the file.    

This line from the file is returned as a string. This string contains a \n at the end which is called a new line character.

So the readline method reads text until an end of line symbol is encountered, and this end of line character is represented by \n.

For example if the file "abc.txt" contains the lines:

Welcome to abc file.

This file is for demonstrating how read line works.

Consider the following code:

f = open("abc.txt", "r")  #opens the file in read mode

print(f.readline()) # read one line from file and displays it

The output is:

Welcome to abc file.    

The readline() method reads one line and the print method displays that line.                        

3 0
3 years ago
Other questions:
  • When using presentation aids A. make the aid available for the audience to look at throughout the speech. B. prepare to give you
    6·1 answer
  • It takes 2 seconds to read or write one block from/to disk and it also takes 1 second of CPU time to merge one block of records.
    10·1 answer
  • Describe the role of the microprocessor in an automatic washing<br> machine (IGCSE)
    10·1 answer
  • Cual es la definición de grouded?​
    7·1 answer
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • What software maintain and increase the efficiency of a computer system?
    12·1 answer
  • Which of these is the fastest transmission medium?
    11·2 answers
  • What do application in productivity suites have in common
    5·1 answer
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • A section at the top of the page that makes it easy for the recipient to respond to a letter is called a(n
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!