1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AveGali [126]
3 years ago
7

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o

ver the network?•Share permission (Share tab)-Sales group: Full Control•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Writea. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.b. Members of the Sales group will be able to edit content and delete files.c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
Computers and Technology
1 answer:
katen-ka-za [31]3 years ago
3 0

Answer:

Members of the Sales group will be able to edit content and delete files.

Explanation:

NTFS (New Technology File System) is the standard file system for Microsoft Windows NT and later operating systems; NTFS permissions are used to manage access to data stored in NTFS file systems.

Share permissions manage access to folders shared over a network; they don’t apply to users who log on locally.

The share permission is applicable in this question.

On the security tab, where the sales group have read & execute, modify and write permission will allow the sales group users to

1. Modify: allows you to read, write, modify, and execute files in the folder, and change attributes of the folder or files within

2. Read and Execute: will allow you to display the folder's contents and display the data, attributes, owner, and permissions for files within the folder, and run files within the folder

You might be interested in
You found an image on the Creative Commons that you would like to use. How do you give credit to the author? *
Archy [21]
You need to write the author’s name
7 0
3 years ago
Read 2 more answers
A high-angle shot is the same thing as a bird’s-eye shot. True False
mariarad [96]
I believe that is false, but note I could be wrong.
7 0
3 years ago
Read 2 more answers
Select the correct answer.
Korvikt [17]

Answer:

Wireless Internet Access

3 0
3 years ago
Read 2 more answers
Which internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same
Temka [501]

NIC Ports use which RJ connector? RJ-45 internetworking device makes computers that are connected to separate segments appear and behave as if they're on the same segment.

There's a lot of confusion out there about which NIC ports use which RJ connectors. RJ-45 internetworking devices make computers that are connected to separate segments appear and behave as if they're on the same segment. So, which one do you use?

The answer is actually quite simple. If you're connecting two computers together, you'll need to use an RJ-45 cable. If you're connecting a computer to a modem or router, you'll need to use an RJ-11 cable.

RJ-45 cables are actually quite common and can be found at most electronics stores. If you're not sure which one you need, just ask a sales associate for help.

Learn more on internetworking device here:

brainly.com/question/28342757

#SPJ4

3 0
2 years ago
Gipsi was browsing an online shopping site when a program got downloaded onto her system without her knowledge. The next day she
madam [21]

Answer:

B. adware

Explanation:

An adware refers to programs that show advertisements on your computer in different forms like a pop up or a banner display. This type of software install itself on your computer without your permission and it can also redirect your searches and gather information. According to this, the program on Gipsi's system is an adware.

7 0
3 years ago
Other questions:
  • Which remarketing audiences can be defined in google analytics? (select all that apply)?
    10·1 answer
  • A hub transmits all incoming messages to all of its ports except the port where the messages came in. A switch usually sends mes
    14·2 answers
  • Which of the below statements describes the nature of HTML elements - check as many as apply
    6·1 answer
  • If you need to set up direct deposit, which information from your check would you likely need?
    14·1 answer
  • 14. What is the simplest way to permanently get rid of an unwanted file?
    9·1 answer
  • List two advantages and two disadvantages of Satellite Based<br> Augmentation Systems
    8·1 answer
  • Compound conditions require a computer to sense whether multiple conditions are true or false.
    9·1 answer
  • Does trend in computing important for organization management?​
    8·1 answer
  • Which option should you select to ignore all tracked changes in a document? To ignore all tracked changes in a document, you sho
    14·1 answer
  • Match each method of communication with its intended purpose.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!