1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zigmanuir [339]
3 years ago
15

We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to

read or write to files. The account SmithS has Read permissions on the Share and SmithS is a member of the Domain Users group that has FC on the Share. What NTFS permission applied to the Domain Users group will allow these tasks to be performed without allowing more access than necessary?
Computers and Technology
1 answer:
igomit [66]3 years ago
8 0

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

You might be interested in
A_ is an object makerfirst program second object third class fourth method ​
liberstina [14]

Answer:

you will use the components object animator whether sjetchware or HTML

5 0
3 years ago
Imagine that a you and a friend are exercising together at a gym. Your friend suddenly trips and falls, and it is clear that he
ladessa [460]

Answer:

The sprain happened when the friend fell and the ligaments (in the ankle)  stretched, twisted or possibly tore. Sprain is manifested by pain, swelling, bruising and inability to move.

Explanation:

Here the appropriate steps to stabilize the injury:

1.       Call for help.

2.       Rest the injured area to avoid further damage.

3.       Put ice ( for 15 to 20 minutes) to help limit the swelling.

4.       Apply compression bandage to prevent more swelling.

5.       Elevate the injured ankle above the heart to limit swelling.

Hope this helps UvU

4 0
2 years ago
A full system backup is the same as an incremental backup. T/F
V125BC [204]
False. A full system backup will back up all of the files within a hard drive.
4 0
3 years ago
You should structure the blank first before you search for a relevant picture
serious [3.7K]

Answer: true

Explanation:

3 0
3 years ago
Read 2 more answers
Write any five difference between second generation and fourth generation of computer<br><br>​
katrin [286]

Second Generation Computer

1.It was established in 1956-1964.

2.The main component is Transistor.

3.ex=CDC 3600

Fourth Generation Computer

1.It was established from 1917-2010

2.The main component is VLSI

3.ex=Star 1000.

If you refer to Computer Book then you will be getting more information please Generation of Computer.

8 0
2 years ago
Other questions:
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • Caroline has been asked to find a standard to guide her company’s choices in implementing information security management system
    13·1 answer
  • You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need
    13·1 answer
  • We never need to use a forward declaration when invoking a public subprogram. true or false?
    15·1 answer
  • "Write an iterative function iterPower(base, exp) that calculates the exponential baseexp by simply using successive multiplicat
    10·1 answer
  • Ava calls tech support because she is unable to send information that a customer has requested. The tech support person tells he
    6·1 answer
  • Alright, so I have a wireless mouse that uses a dongle (it's not Bluetooth nor wired). But recently I realized that none of the
    12·1 answer
  • Write down the difference between Application Software and
    15·1 answer
  • RUNTIME ORGANIZATION AND DATA LAYOUT.​
    8·1 answer
  • Read the following characteristic:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!