1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to

read or write to files. The account SmithS has Read permissions on the Share and SmithS is a member of the Domain Users group that has FC on the Share. What NTFS permission applied to the Domain Users group will allow these tasks to be performed without allowing more access than necessary?
Computers and Technology
1 answer:
igomit [66]3 years ago
8 0

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

You might be interested in
When you start a new blank document, you begin typing at the
Serhud [2]
C. The insertion poin
6 0
3 years ago
If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp
ANTONII [103]

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

4 0
3 years ago
Object-oriented systems have three general types of cohesion: _____, _____, and _____. A. method, class, inheritance B. method,
Verdich [7]

Answer:

D. method, class, generalization/specialization

Explanation:

The Cohesion is said to be the level to what an element of a module is related to others. Generally, the cohesion can be understood as an internal adhesive that holds together the modules. If the software is good then it is going to have high cohesion. Method and class are type of cohesion, as they hold the modules together. And generalization/specialization also is a general type of cohesion as generalization tracks the common features among the class, and binds them into one superclass. However, the specialization means creating subclasses out of the classes, and which is the meaning of the specialization. In an ideal situation, there should be high cohesion or single responsibility. However, in the case of inheritance, there can be multiple responsibilities. And hence composition like a generalization, specialization, association, aggregation are used to make use of the composition for reuse rather than inheritance. Have you seen language supporting multiple inheritances. You will never see it though there is some way. And its never allowed to ensure high cohesion. And hence three general types of cohesion are method, class and generalization/specialization. And this is option D.

4 0
3 years ago
In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 18
Vika [28.1K]

Answer:

280

Explanation:

Average = (240 + 315 + 290 + 180 + 375) ÷ 5

= 1400 ÷ 5

= 280

Cheers

3 0
3 years ago
7.
shusha [124]

Answer:

The answer is "4".

Explanation:

In this code, on line number 4, it will give the error message, and its correct solution can be defined as follows:

In this code, a variable "score" is declared, that holds a value that is 0, and in the next step, a method "onEvent" is declared that uses a method, and in the if block, it checks the "score" value that is less than 5 and it will print the message.

8 0
3 years ago
Other questions:
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • 2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
    6·1 answer
  • _______ allow(s) you to apply colorful, eye catching designs to a presentation all at once. A. Themes B. Slide orientation C. Th
    10·2 answers
  • Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact tha
    5·1 answer
  • NOTE: in mathematics, division by zero is undefined. So, in C , division by zero is always an error. Given a int variable named
    10·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, p
    10·1 answer
  • Arrays are described as immutable because they are two dimensional. are arranged sequentially. can be reordered. cannot be chang
    13·1 answer
  • Application software can run without the presence of system software true or false ​
    5·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!