1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research

resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and ntfs permission strategy as follows: 1.share the h:\components folder using the default share name. 2.configure share permissions for the share to give the everyone group allow full control share permissions. 3.configure ntfs permissions for the h:\components folder to give the research resources group allow full control permissions. 4.keep the remaining ntfs permissions. this allows administrators full control and allows all other users to read the folder contents.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
5 0
<span>Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and NTFS permission strategy as follows:
1.share the h:\components folder using the default share name.
2.configure share permissions for the share to give the everyone group allow full control share permissions.
3.configure NTFS permissions for the h:\components folder to give the research resources group allow full control permissions.
4.keep the remaining NTFS permissions. this allows administrators full control and allows all other users to read the folder contents.</span>
You might be interested in
Contemporary Information Systems are interfacing with customers andsuppliers using:A. Electronic commerceB. CRMC. SCMD. all of t
ch4aika [34]

Answer:

D. all of the above

Explanation:

Contemporary Information Systems are interfacing with customers andsuppliers using, electronic commerce, CRM, and SCM.

7 0
3 years ago
Assign decoded_tweet with user_tweet, replacing any occurrence of 'TTYL' with 'talk to you later'. Sample output with input: 'Go
nekit [7.7K]

Answer:

I am going to use the Python programming language to answer this. The source code is given below:

print("Enter your tweet here")

user_tweet = input()

decoded_tweet = user_tweet.replace('TTYL', 'talk to you later')

print("This is the decoded tweet: ")

print(decoded_tweet)

Explanation:

In the program the replace() module was used to replace 'TTYL' with 'talk to you later.'

Attached is the screenshot of the output.

8 0
3 years ago
Read 2 more answers
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second,
Marina86 [1]

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.

3 0
3 years ago
Marlene is using context clues to better understand the book she is reading. After reading around unfamiliar words and checking
Zigmanuir [339]

Answer: The correct answer is to look up the unfamiliar words in a dictionary or online.

Explanation: When using context clues to better understand reading, Marlene will first read around the unfamiliar words, looking for clues before and after the unfamiliar words. If she still does not know the meaning of an unfamiliar word her next step is to look up the word in a dictionary or online.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Tom only thinks about his own gain and does not care about the team objectives. What quality is he demonstrating? A. resourceful
    9·1 answer
  • What piece of software tells the operating system how to use a specific hardware device?
    14·1 answer
  • Who would use a CLI? (Command Line Interface)
    9·1 answer
  • Can I use some Company's name in my Research Project. For example, my research is based on E-commerce security and i wanna use A
    14·1 answer
  • You are given the task of reading in n numbers and then printing them out in sorted order. Suppose you have access to a balanced
    12·1 answer
  • Given a string variable s that has already been declared, write some code that repeatedly reads a value from standard input into
    12·1 answer
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • 5 efectos del desarrollo tecnológico en el medio ambiente
    14·1 answer
  • What is another term used for next generation firewalls
    12·1 answer
  • Providing captions and transcripts for videos on your website is a way of ensuring what?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!