1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
3 years ago
5

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The

user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the "archive" attribute enabled.
Computers and Technology
1 answer:
muminat3 years ago
3 0

Answer:

i think it's going to be c

Explanation:

You might be interested in
What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML 2. HTML is a backend technology and CSS i
grin007 [14]

Answer: 3. HTML focuses on a web page's structure and CSS focuses on its presentation.

Explanation: HTML is designed to allow you to add the content and format it correctly. However, CSS's job is to allow for stylizing.

4 0
3 years ago
Defeating authentication follows the method–opportunity–motive paradigm.
sashaice [31]

Answer:

Method:- This is related to hackers technique and way of accessing to copy other data. It also includes the skill, knowledge, tools and other things with which to be able to pull off the attack.

Opportunity:- this is related to how a user gives way to access to the hackers. It includes the time, the chance, and access to accomplish the attack.

Motive:- This may relate to the hacker to destroy the reputation of another or for money. It is reason to want to perform this attack against this system

3 0
3 years ago
Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?
lesya [120]
Is a Microsoft Bing ads certification Exam question.
I think that the correct answer is:
False

Source and more info: <span>https://goo.gl/JUw7Bw</span>
3 0
3 years ago
Choose the word that best completes this sentence. ________ can only grow and multiply within the cells of another living thing,
melomori [17]
The correct answer that would best complete the given statement above would be the word VIRUSES. Here is the complete statement. Viruses can only grow and multiply within the cells of another living thing, but they can remain active on a surface for several hours or days.
4 0
3 years ago
What is equivalent to 5(3x-7)
serg [7]
5(3x - 7)

distribute the 5 to both 3x and -7

15x - 35 is equivalent

hope this helps
8 0
3 years ago
Read 2 more answers
Other questions:
  • Which social networking function came first?
    9·2 answers
  • Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[
    13·1 answer
  • Will upvote all answers
    7·1 answer
  • True or false.the color attribute cannot recognized the hexadecimal code.
    7·2 answers
  • Read the scenario below and then answer the
    14·1 answer
  • You are late in the preparation of the computer graphics for your final report and presentation. You run into a friend who is gr
    13·1 answer
  • . Explain and demonstrate the functionality of timer devices in an embedded system[
    9·1 answer
  • Whois the person start programming​
    13·1 answer
  • One key feature of malware is that it:
    13·1 answer
  • Using the Insert tab, you can convert text into a table and a table into text.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!