1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xeze [42]
3 years ago
10

You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to

view, selecting Properties, and clicking the:
Computers and Technology
1 answer:
NikAS [45]3 years ago
3 0

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

You might be interested in
Provide examples of how you can use a computerized
Alexus [3.1K]
File management systems are vital! For example, when you are developing a website, having a good file management system is critical for successful development.

Each file needs a corresponding folder where it can belong. When you are working on developing a website, you will be extracting files in your code from a certain directory. It's because of a good file management system that this is possible! =)
3 0
3 years ago
Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
Tresset [83]

Answer:

B. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

Explanation:

6 0
3 years ago
Carlos wrote a check for $44.92 to pay his gas bill. He’ll use the check register to record his transaction. What will be his ne
Finger [1]

Answer:

-44.92

Explanation:

If he has no money hell be in the hole

8 0
3 years ago
What is the process called that determines how bits are represented on the medium?
Bad White [126]
The process that determines how bits are represented on the medium is called encoding. It is the process of converting a certain data into a particular format that is required for a certain processing need like program execution, data transmission or file conversion.
3 0
3 years ago
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection
emmasim [6.3K]

Answer: ECC memory

Explanation:Error-correcting code(ECC) memory is used for the detection as well as correction of the internal storage data in the operating system. It is the memory code that cannot tolerated any type of the corruption in the data storage.

The ECC memory is usually found in the fields like financial computing, scientific etc.It is a reliable memory and provides high protection.Thus the technician should put the ECC memory in the workstation.

7 0
3 years ago
Other questions:
  • Which skill refers to the ability to visualize and implement possible business solutions to problems?
    6·1 answer
  • What letter names the drive where windows most commonly stores data and files
    13·1 answer
  • Suppose there is a class AirConditioner. The class supports the following behaviors: turning the air conditioner on and off. The
    8·1 answer
  • Please check my answer! (Java)
    8·1 answer
  • Can Anybody Answer This
    8·1 answer
  • Create a Python script that takes two parameters to do the following:-
    9·1 answer
  • At which layer of the osi model would a logical address be added during encapsulation?
    7·1 answer
  • True or false windows 98 and windows xp are examples of an operating system?
    12·1 answer
  • A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.
    15·1 answer
  • What are the task performed by window media player<br> ​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!