1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
4 years ago
5

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The

user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the "archive" attribute enabled.
Computers and Technology
1 answer:
muminat4 years ago
3 0

Answer:

i think it's going to be c

Explanation:

You might be interested in
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a nu
sdas [7]

Answer:

Except more than one token can exist on a token ring network

Explanation:

The token ring is the LAN(Local Area Network) in which the computer systems are connected with each other computers in the form of topologies. In the token ring networks more than one logic tokens from one host to another host.

The token ring has entirely taken over by the Ethernet because it is cheaper and better in price and performance.

3 0
4 years ago
Write a C program to read the values of a 6 x 6 2D array from a file, and then produce an output file that contains the transpos
kvv77 [185]

Answer:

Explanation:

#include <stdio.h>

int main()

{

   int arr[5][5], trans [5][5], i, j;

   // Entering elements to the matrix

   printf("\nEnter matrix elements:\n");

   for (i = 0; i < 6; ++i)

       for (j = 0; j < 6; ++j) {

           printf("Enter element a%d%d: ", i + 1, j + 1);

           scanf("%d", &arr[i][j]);

       }

 

   printf("\nThe given input matrix is: \n");

   for (i = 0; i < 6; ++i)

       for (j = 0; j < 6; ++j) {

           printf("%d  ", arr[i][j]);

           if (j == 5)

               printf("\n");

       }

   // Transpose

   for (i = 0; i < 6; ++i)

       for (j = 0; j < 6; ++j) {

           trans[j][i] = a[i][j];

       }

   printf("\nThe output transpose of the matrix:\n");

   for (i = 0; i < 6; ++i)

       for (j = 0; j < 6; ++j) {

           printf("%d  ", trans[i][j]);

           if (j == 5)

               printf("\n");

       }

   return 0;

}

7 0
3 years ago
Running fewer applications at once is a way to resolve which type of bottleneck?
vichka [17]
The answer is <span>memory.  </span>Running fewer applications at once is a way to resolve the bottleneck in <span>memory.  </span>Run fewer programs at the same time and restarting a PC regularly, is a good way to clear out its memory.
6 0
3 years ago
In saving a Visual Basic project properly , which of the following: two components part are involved ?
alina1380 [7]

Answer:

C) Project and Form

Explanation:

In saving a Visual Basic project properly, the following: two components part that is involved are:

1. Project - this is the project file that will be saved in the computer's memory. On the toolbar of a Visual Basic Editor, there is a "Save Project File" icon, which will be clicked to save a Project file.

2. File - the is the Visual Basic Editor's user interface. Just like "window" in Microsoft Office, it is the space used in writing or building the project file.

4 0
3 years ago
must understand both art and engineering. a. industrial designer b. environmental designer c. interior designer d. graphic desig
enot [183]
It's d. Graphic designer because they design things on the computer with code
7 0
3 years ago
Other questions:
  • When you hear or see the warning signal of any emergency vehicle, you should ________________.?
    14·1 answer
  • A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of ba
    5·1 answer
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • At the ________ level of an organization, functional managers focus on monitoring and controlling operational-level activities a
    14·2 answers
  • How has information technology made piracy possible
    14·1 answer
  • Susan is in charge of the inventory reports for her company.She will need to find specific inventory items as well as project in
    9·1 answer
  • What does the computer receive when you press a key on a laptop keyboard?
    8·1 answer
  • Only now _______ why you didn't tell me.​
    14·2 answers
  • . An operating system is: *
    14·1 answer
  • Which terms would be found in search for "Mo*”? Check all that apply.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!