1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
14

Why are you unable to modify the budget file, when you have the allow full control ntfs permission? 70-410?

Computers and Technology
2 answers:
statuscvo [17]3 years ago
6 0

Answer:

The main reason for not modifying the budget file if you have full control ntfs permission because <u>I previously set a share permission that is limited to me only</u>.

Further Explanation:

I am unable to modify the Budget file since Student account only have the read permission and the administrator account has full access control to modify the Budget file. Also, I still have read permission and part of the Domain user group in share permission. For modify the Budget file on the computer, share permissions do not apply when accessing a file on the local drive.  

The below Figure 1 shows the sharing permission for different work group:

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Senior Secondary School
  • Subject: Computers and Technology
  • Chapter: Basics of Computer

Keyword:

Budget file, unable, modify, all full access control. Ntfs, permission, read permission, write permission, local drive, work group, domain user group, share permission, limited, file

Serggg [28]3 years ago
3 0

Reason is because from this machine, I only have READ permissions and still in the Domains users. I should have full access in the share permission “Student” becomes a part of the Domain Users group in share permission. In this group, only READ permission is allowed.

 

You might be interested in
Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
Paladinen [302]

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the step by step solution to the question above above.

5 0
3 years ago
Which of the following must be configured in certain applications to help ensure data aggregation and data isolation are impleme
Hitman42 [59]

Answer: (B) Log forwarding and (F) Zones

Explanation:

 According to the given question, the log forwarding and the zones are the  applications that are configured for ensuring the data isolation and aggregation that are implemented on the various types of critical devices and the applications.

  • The log forwarding is one of the type of application that are used for correlated the various types of events from the multiple resources from the one Forti-analyzer to the another unit.
  • The zones is one of the type of virtual system that are used in multiple resources.

Therefore, Option (B) and (F) is correct.

5 0
3 years ago
the easiest and cheapest time to alter the information system is in the ________ phase of the sdlc. a. requirements analysis b.
nignag [31]
I would think its the "<span>requirements analysis" phase.

Because the </span>requirements analysis<span>,</span><span> is the process of determining user expectations for a new or modified product.</span>
7 0
4 years ago
Hurry please
Yanka [14]

Answer:

to get the client to imagine

Explanation:

3 0
3 years ago
Can both mediated interpersonal communication and mass communication has an ability to reach huge number of recipients or audien
mars1129 [50]

Answer:

Explanation:

Somewhat

7 0
3 years ago
Other questions:
  • This is a text message that is stored on a user's computer by a Web server that helps trace the user's browsing habits. a. Scrip
    14·1 answer
  • Implement RandMultipByVal function, which gets one integervariable as its argument
    12·1 answer
  • How does an individual's access to a wide range of online services affects their ability to operate safely in the digital world.
    5·1 answer
  • What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?
    13·1 answer
  • Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
    10·1 answer
  • Why do software managers have to be generalists with a range of skills, rather than simply technical specialists?
    14·1 answer
  • What are the routes through with Virus transmitted into computer<br>system?​
    15·1 answer
  • Please help with question
    14·1 answer
  • Who is famous for his three laws of robotics?
    9·1 answer
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!