1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
7

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o

ver the network?•Share permission (Share tab)-Sales group: Full Control•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Writea. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.b. Members of the Sales group will be able to edit content and delete files.c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
3 0

Answer:

Members of the Sales group will be able to edit content and delete files.

Explanation:

NTFS (New Technology File System) is the standard file system for Microsoft Windows NT and later operating systems; NTFS permissions are used to manage access to data stored in NTFS file systems.

Share permissions manage access to folders shared over a network; they don’t apply to users who log on locally.

The share permission is applicable in this question.

On the security tab, where the sales group have read & execute, modify and write permission will allow the sales group users to

1. Modify: allows you to read, write, modify, and execute files in the folder, and change attributes of the folder or files within

2. Read and Execute: will allow you to display the folder's contents and display the data, attributes, owner, and permissions for files within the folder, and run files within the folder

You might be interested in
What are two reasons a network administrator would use cdp.
Ulleksa [173]

Answer:

To obtain VLAN information from directly connected switches. To determine the status of network services on a remote device. To determine the status of the routing protocols between directly connected routers .

Explanation:

6 0
2 years ago
When should you create an outline?
DIA [1.3K]

Answer:

hope you like it

Explanation:

Writing an outline can take place at any time during the writing process. Although it is most commonly used before beginning to write or doing research, this process can also take place during or after writing your paper to make sure your points are organized and make sense.

An outline is a first step for writing: a general, unfinished plan that you will use as a guideline in writing, not a finished product ready to publish. You should use it when you prepare to write a rough draft, before you started writing.

8 0
3 years ago
After you create an array variable, you still need to ____ memory space.
Svetllana [295]
This is a little tricky. I would say reserve. It would help to know what programming language and class this is for because a lot of times when you create an array variable the memory is put onto the stack and you as the programmer do not reserve memory space. Now on the other hand, if you are programming in C and you want to create an array variable and put it on the heap then you would reserve memory space on the heap.
6 0
4 years ago
PLZ HELP IM DOING 2 other 100 work and I’m running out of time for school 1. Imagine you are a screenplay writer Discuss some po
Alexus [3.1K]
My mans this is to long to read ); I got u tho lemme pick
5 0
3 years ago
Which tab should you click if you want to access the Show All Comments option in a worksheet?
Lostsunrise [7]

Answer: Review

Because you want to review the comments

3 0
3 years ago
Read 2 more answers
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • According to a recent study, more than 75 percent of teens between the ages of twelve and seventeen in the United States have a
    11·2 answers
  • What is the troubleshooting process?
    5·1 answer
  • In a Windows environment, __________ is a powerful tool that enables security administrators to share user and group definitions
    10·1 answer
  • The invention of the transistor was important to the development of computers because
    14·1 answer
  • What is the best definition of a network?
    14·2 answers
  • First person to make me laugh will get brainliest.​
    10·2 answers
  • What is a method that deletes an item from a list using the item’s value?
    11·1 answer
  • Jamie plans to sell his pottery designs through his website. If he also wants to launch a mobile app to reach more people, which
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!