1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
8

You have created shared folders for all your companies departments and assigned the appropriate permissions. everyone can access

the shares as planned, but now you find that an extraordinary amount of disk space is being used on the server. what can you do to limit how much users can store on your servers?
Computers and Technology
1 answer:
larisa86 [58]3 years ago
8 0
I would suggest the use of a disk quota.

Using a disk quota would limit the available space that users could have used to store data. The New Technology File system (NTFS) has several features like disk quotas to see which users are uploading the most space.  The windows interface Open Computer Management is also another option that limits the number of users of a shared folder.



You might be interested in
An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS
RoseWind [281]

Answer:

The correct option is B: platform as a service (PaaS)

Explanation:

Platform as a service (PaaS) is regarded as a computing model in the cloud and ensures delivery of both software and hardware tools via a third-party provider. Tools delivered are mostly those that are needed for the development of application and are mostly delivers via the internet to its users. Software and hardware tools are usually hosted in the infrastructure of the PaaS provider host and thus this removes the burden on developers of having to install a physical software or hardware in the development or running of a new application.

7 0
2 years ago
Satellite images are based on data obtained by ____________ (gps/landsat) satellites.
skelet666 [1.2K]
<span>Satellite images are based on data obtained by landsat satellites. </span>
8 0
3 years ago
Which is a connectionless protocol in the transport layer? What are the small chunks of data called?
xeze [42]

Answer:

User Datagram Protocol (UDP) , transport-layer segment.

Explanation:

The User Datagram Protocol is popularly known as UDP. It is defined as the communication protocol which is used across the internet for any time sensitive transmission like the DNS lookup or the video playback.

The UDP provides a unreliable and connectionless service to a invoking application.

The transport layers on sending side converts the application $\text{layer }$ messages which it $\text{receives}$ from the $\text{sending application process}$ into a transport layer segment called as the transport layer segments. This is achieved by breaking down the application messages into a smaller chunks and then adding the transport layer header into each chunk so as to create a transport layer segment.

6 0
3 years ago
Read 2 more answers
To achieve the maximum confidentiality and integrity found in a completely secure information system would require that the syst
fgiga [73]

Answer:

The answer is "Option a".

Explanation:

Privacy is a set of rules, which limiting access to the data, and integrity ensures impartiality, accuracy, and reliability is assured to ensure, which authorized persons can have secure access to the data.

The system needs no access for everyone to achieve its secrecy and integrity contained in a completely safe data system, that's why the given statement is "true".

5 0
3 years ago
Computer has brought radical change in every field​
tigry1 [53]

Answer:

Yes it has brought change in every field

Explanation:

3 0
2 years ago
Other questions:
  • The ____ shortcut keys remove character formatting. (points : 2) ctrl 0 (zero) ctrl i ctrl spacebar ctrl u
    8·2 answers
  • Electronic files created on a computer using programs such as word software are considered to be
    15·1 answer
  • Your friend’s parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
    10·2 answers
  • Write a complete Java method that returns an integer. The method declares a Scanner object, then prompts the user for a series o
    12·1 answer
  • Which wireless communication is typically limited to six feet of distance?
    6·1 answer
  • Your organization network diagram is shown in the figure below. Your company has the class C address range of 199.11.33.0. You n
    8·1 answer
  • Reading a news release about a product is an example of <br> research.
    9·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • What happen if there is no authentication??
    10·2 answers
  • Who has more Tanks? Russia or USA? You get ti right and you get BRAINLIEST
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!