1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
11

Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research

resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and ntfs permission strategy as follows: 1.share the h:\components folder using the default share name. 2.configure share permissions for the share to give the everyone group allow full control share permissions. 3.configure ntfs permissions for the h:\components folder to give the research resources group allow full control permissions. 4.keep the remaining ntfs permissions. this allows administrators full control and allows all other users to read the folder contents.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
5 0
<span>Store programming components in the shared folder. you want to secure the data in the folder as follows: members of the research resources group should have full control over the folder. all other users should be able to view the contents of the folder. permissions should apply to both network access through the share and local access. your task in this lab is to implement a combined share and NTFS permission strategy as follows:
1.share the h:\components folder using the default share name.
2.configure share permissions for the share to give the everyone group allow full control share permissions.
3.configure NTFS permissions for the h:\components folder to give the research resources group allow full control permissions.
4.keep the remaining NTFS permissions. this allows administrators full control and allows all other users to read the folder contents.</span>
You might be interested in
Microsoft word's spell checker?
vekshin1
The answer to the given picture is - Microsoft word's spell checker only recognizes very common words. Microsoft word has it's own dictionary which will be compared to the texts on your document. If they see an unfamiliar word they will underline it with red. Anyways you can add your own words and names to the custom dictionary.
8 0
3 years ago
45 points pls help
Artemon [7]

Answer:

Repetition.

Explanation:

hope it helps u

can u mark me as brainliest

8 0
3 years ago
Read 2 more answers
You are a network technician for a small network. Your ITAdmin workstation just stopped communicating with all other computers i
Lelu [443]

Answer:

Ping the other workstations from the IT Admin workstation to confirm that connection has been lost, check the status of the network interface card in the workstation with command ifconfig in the terminal, then reset the connection using ifdown and ifup commands. If the problem is not resolved, check the cable connection.

Explanation:

Ping is an ICMP echo message sent by a network host to another to check for connectivity. If they are connected, the other workstation responds with an ICMP response message.

The ifconfig in Linux systems displays the network adapters and their individual IP configurations. If there is no connection even after the network is reset, then the cable connectors could be the problem.

8 0
3 years ago
Which organization plays a key role in development of global health informatics?
tensa zangetsu [6.8K]

Answer:

International Medical Informatics Association (IMIA)

Explanation:

In respect of the question which askabout the organization who play an important role in regards to the development of global health informatics is International Medical Informatics Association (IMIA).

International Medical Informatics Association (IMIA) which is an interni association which are independent which works toward expanding and sustaining of global Biomedical and Health Informatics community and give maximum support to international initiative which are geared towards providing adequate and standardized health for each and everyone in the world at large.

3 0
3 years ago
Lenders always accept applications for credit
LenKa [72]
The correct answer to the question that is being stated above is FALSE.

The statement is false because lenders do not always accept applications for credit. Lenders always consider credit history of the applicant. If the applicant has a good credit history background, then he qualifies.
3 0
3 years ago
Other questions:
  • Binary search requires that data to search be in order. true or false
    5·1 answer
  • Explain why the game of economics has no winner
    8·1 answer
  • HELP 11 pointsw to the person who helps me
    11·2 answers
  • Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
    7·1 answer
  • What kind of app or technology would you like to create?  Why ? <br><br><br>​
    11·1 answer
  • When using a presentation software you can change the size of the text to...? Increase Font size, Decrease font size, increase t
    15·2 answers
  • What type of program is Microsoft® Excel®?
    9·2 answers
  • Answer if you know Javascript, html, css, python, and Ruby.
    12·1 answer
  • What is the full form of the OS?​
    15·2 answers
  • The use of technology to observe a user's actions often without the user's knowledge is known as:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!