1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
14

Why are you unable to modify the budget file, when you have the allow full control ntfs permission? 70-410?

Computers and Technology
2 answers:
statuscvo [17]3 years ago
6 0

Answer:

The main reason for not modifying the budget file if you have full control ntfs permission because <u>I previously set a share permission that is limited to me only</u>.

Further Explanation:

I am unable to modify the Budget file since Student account only have the read permission and the administrator account has full access control to modify the Budget file. Also, I still have read permission and part of the Domain user group in share permission. For modify the Budget file on the computer, share permissions do not apply when accessing a file on the local drive.  

The below Figure 1 shows the sharing permission for different work group:

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Senior Secondary School
  • Subject: Computers and Technology
  • Chapter: Basics of Computer

Keyword:

Budget file, unable, modify, all full access control. Ntfs, permission, read permission, write permission, local drive, work group, domain user group, share permission, limited, file

Serggg [28]3 years ago
3 0

Reason is because from this machine, I only have READ permissions and still in the Domains users. I should have full access in the share permission “Student” becomes a part of the Domain Users group in share permission. In this group, only READ permission is allowed.

 

You might be interested in
A/An is a series of instructions or commands that a computer follows; used to create software
miss Akunina [59]
Program or algorithm

They are synonymy's  
8 0
3 years ago
Read 2 more answers
Complete the statement below with the correct term.
Lilit [14]

Answer:

<em>Every </em><em>couple</em><em> </em><em>of </em><em>month </em><em>or </em><em>whatever </em><em>you </em><em>give </em><em>it </em><em>to </em><em>someone</em><em> </em><em>else</em>

8 0
2 years ago
Riodic Table
Ksenya-84 [330]

Answer:

riodic Table

A museum wants to store their valuable documents in cases that contain a gas that will protect the documents.

She should not choose one of the other gases because they are too

The museum director should choose

Explanation:

I didn't understand

8 0
3 years ago
In a social networking site your personal information is listed under your?
abruzzese [7]
Profile? Perhaps... If you go on social media sites like Facebook it's typically on your profile, right?
3 0
4 years ago
Read 2 more answers
PLEASE HELP!!! History abounds with instances in which the work of scientists and artists were affected by the political, religi
Masteriza [31]
Social Media affects them
7 0
3 years ago
Other questions:
  • Uses computers resources from multiple locations to solve ​
    13·2 answers
  • Explain how the principles underlying agile methods lead to accelerated development and deployment of software.
    6·1 answer
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • Explain what occurs when you synchronize computer and mobile devices.
    5·1 answer
  • A network administrator has been creating a baseline of network performance. During this process, he realizes that one router is
    14·1 answer
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    11·1 answer
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • In the ____________________ approach, the project is initiated by upper-level managers who issue policy, procedures and processe
    8·1 answer
  • Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
    10·1 answer
  • A machine that converts energy to useful work.
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!