1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ann [662]
4 years ago
5

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The

user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the "archive" attribute enabled.
Computers and Technology
1 answer:
muminat4 years ago
3 0

Answer:

i think it's going to be c

Explanation:

You might be interested in
Convert 128 GB into KB​
goblinko [34]

Answer:

1,073,741,274  KB

Explanation:

Use an unit convertor or an calculator.

8 0
3 years ago
Read 2 more answers
Which sequence of slides would be followed in a linear slideshow? A. slide 4 -> slide 5 -> slide 6 -> slide 7 B. slide
Nina [5.8K]

i dont understand your qeution to be able to answer it

8 0
3 years ago
Read 2 more answers
_________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
sergij07 [2.7K]

Answer:

DOS, Denail of Service Attacks

Explanation:

5 0
2 years ago
Careers on the largest declining industries list will see an increase in the number of employees in their workforce.
IrinaK [193]

The answer is False.

The word "declining" means going down. So, in this case, the employees would go down or leave.

7 0
3 years ago
ANo _____ works by using the Internet to relay communications; it maintains privacy through security procedures and tunneling pr
dybincka [34]

Answer: virtual private network

Explanation:

A virtual private network, is normally refered to as a VPN is simply referred to as an encrypted connection which is done over the Internet. We should note that it usually take solace from a particular device to th network.

The function of the encrypted connection is to assist in the transmission of sensitive data. It works by using the Internet to relay communications and it maintains privacy through security procedures.

8 0
3 years ago
Other questions:
  • Andrea wants to to install a new internet connection . she eants to use the fastest one she can find . what are the maximum spee
    14·1 answer
  • PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte
    8·1 answer
  • If you only use part of a quotation, it is not necessary to include a citation
    6·1 answer
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • What is TCP/IP?
    13·1 answer
  • Diagnosing is solving the problem, and trouble shooting is figuring out what the problem is.
    15·1 answer
  • A user complains because the social media apps on his mobile device always note his location. The user is worried about privacy,
    14·1 answer
  • Which term describes the second core IPSec security protocol; it can perform authentication to provide integrity protection, alt
    13·1 answer
  • when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
    14·1 answer
  • Which is the most correct option regarding subnet masks?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!