1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to

read or write to files. The account SmithS has Read permissions on the Share and SmithS is a member of the Domain Users group that has FC on the Share. What NTFS permission applied to the Domain Users group will allow these tasks to be performed without allowing more access than necessary?
Computers and Technology
1 answer:
igomit [66]3 years ago
8 0

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

You might be interested in
Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
xz_007 [3.2K]

Answer:

First, you need to start the OSPF process by executing the command:

<em>Router (config)# router ospf {process-ID#}</em>

Then, you have to instruct the router to advertise the networks that are directly linked to it by entering this network command with the area ID number for that network:

Router (config-router)# network {192.168.10.0} {255.255.255.0} area {0}

8 0
3 years ago
What attracts attention and adds spatial depth to a two-dimensional design.
Harlamova29_29 [7]

Answer:

Hi,

<u>Visual weight</u> attracts attention and adds spatial depth to a two-dimension design.

Explanation:

Visual weight is a measure of the force a piece of art exerts on a viewer/ observer.When a piece of art attracts the eye more, we say the visual weight of that element is higher.Visual weight is measured by observing some features like size, color, position, orientation, shape and texture.

A large art piece will have more visual weight than a small art piece.Warm color such as red has more visual weight more than cool color such as yellow because warm colors tend to occupy the foreground in art pieces.Elements in an art piece that occupy the foreground have more visual weight than those occupying the background.Diminishing the size of an object on the art piece can help you attain spatial depth.

Best of Luck.

6 0
3 years ago
The condition known as __________ occurs when you try to store an integer that is bigger than the maximum allowed by the number
Gnoma [55]

The condition known as <u>overflow</u> occurs when you try to store an integer that is bigger than the maximum allowed by the number of bits you have.

<h3>What is a buffer?</h3>

In Computer science, a buffer can be defined as a temporary area set aside on a computer system for the storage of data. This ultimately implies that, a buffer reside in the random access memory (RAM) of a computer system.

In the event that a computer system process or software program places more data (much more than what was originally intended to be allocated for data storage) in a buffer, the extra data overflows.

In this context, we can infer and logically deduce that when a value is assigned to an integer that is too big or large for the computer to represent, it is a condition referred to as an overflow.

Read more on overflow here: brainly.com/question/26143242

#SPJ1

4 0
1 year ago
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
In Microsoft Windows, which of the following typically happens by default when a file is "double-clicked"
Elenna [48]
Depending on the type of file, it normally runs or opens.
4 0
3 years ago
Read 2 more answers
Other questions:
  • It is a function that ends the connection to the database.
    9·2 answers
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • A Layer 2 switch configuration places all its physical ports into VLAN 2. The IP addressing plan shows that address 172.16.2.250
    7·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Can I change my username?
    6·1 answer
  • When creating a shape in Word, what are some available options? Check all that apply. adding text to the shape changing the size
    6·1 answer
  • Please help me I need a help
    13·1 answer
  • About C header files of C programming
    8·1 answer
  • Explain impact of modern technology on human life​
    5·1 answer
  • A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!