1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
3 years ago
14

Why are you unable to modify the budget file, when you have the allow full control ntfs permission? 70-410?

Computers and Technology
2 answers:
statuscvo [17]3 years ago
6 0

Answer:

The main reason for not modifying the budget file if you have full control ntfs permission because <u>I previously set a share permission that is limited to me only</u>.

Further Explanation:

I am unable to modify the Budget file since Student account only have the read permission and the administrator account has full access control to modify the Budget file. Also, I still have read permission and part of the Domain user group in share permission. For modify the Budget file on the computer, share permissions do not apply when accessing a file on the local drive.  

The below Figure 1 shows the sharing permission for different work group:

Learn more:

1. A company that allows you to license software monthly to use online is an example of ? brainly.com/question/10410011

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

3. The shape of our galaxy was determined ‘on the inside looking out' by surveying the milky way using ____________ telescopes. brainly.com/question/7866623  

4. List 3 characteristics of the ideal encryption scheme. brainly.com/question/3000161

Answer details:

  • Grade: Senior Secondary School
  • Subject: Computers and Technology
  • Chapter: Basics of Computer

Keyword:

Budget file, unable, modify, all full access control. Ntfs, permission, read permission, write permission, local drive, work group, domain user group, share permission, limited, file

Serggg [28]3 years ago
3 0

Reason is because from this machine, I only have READ permissions and still in the Domains users. I should have full access in the share permission “Student” becomes a part of the Domain Users group in share permission. In this group, only READ permission is allowed.

 

You might be interested in
A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn t been tampered
BARSIC [14]
The answer is A) digital signature
8 0
3 years ago
Im lonnnelllly........................who want to date
blsea [12.9K]
Hey just a word of advice I hope you find someone lovely and someone who’ll enjoy you for you. Don’t look for people on apps like this I made many mistakes and it’s not smart. Have a good day. I get the feeling of loneliness and it sucks
8 0
2 years ago
Complete this assignment in Python 3.x. Make sure you have downloaded the software, and it is installed correctly.
Masja [62]

Answer:

The program code is completed below

Explanation:

Program Code:

"""

  Your Name

  Course Name, Section (example: ENTD200 B002 Spr15)

  Instructor name

  Week #

  Date completed

"""

months = ["January ", "February", "March", "April", "May", "June", "July"

, "August", "September", "October", "November", "December"]

for i in range(0,12):

print("Month",i+1, "is" , months[i])

6 0
3 years ago
Which of the following is a method which can be used to delete a page from a publication?
Alexandra [31]
Selecting the page and pressing the backspace key
3 0
3 years ago
Do you think it's better for a young designer to use free, open-source art programs or to pay for commercial programs? Explain y
Alex787 [66]

Answer:

The young designer should use free open-source art programs for his designs. The designer can create new tools and get and update a verse collection of design tools in the software.

Explanation:

An open-source program is a software or application whose source code is available for changes, upgrade and sharing within the public.

Rather than in closed-source software where all upgrades and changes are made only by the tech-company with the license, and the expensive nature of the purchase, the open-source code programs are mostly free with a general public license.  

5 0
3 years ago
Other questions:
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • What type of device is built into a tablet computer and can send data over radio waves to another device such as a laser printer
    10·1 answer
  • Search engines that search other search engines are called
    12·2 answers
  • Dora electronically transferred $591.68 from her checking account to Matt's checking account. In what column of the check regist
    14·2 answers
  • How can i promote netiquette??​
    10·1 answer
  • During the Cold War, defense contractors were required to shield sensitive computing systems and prevent electronic eavesdroppin
    14·1 answer
  • a rule that states each foreign key value must match a primary key value in the other relation is called the
    5·1 answer
  • .<br>1.<br>CPU<br>f. ALU<br>. CU<br>h. CRT<br>g. LED<br>​
    15·1 answer
  • Un producto tecnológico puede ser tangible o intangible?
    6·1 answer
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!