Answer:
The answer to this question is option "d".
Explanation:
In this question option d (A user fills out a form to construct a description of the data desired in a SQL search) is not true. Because SQL stands for Structured Query Language. This is a query language used to communicate with a database and a user fills the form. Which is not possible in the SQL. So the option d is not true.
Answer:
D. He should designate all the files in the shared folder as read-only.
Explanation:
The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.
In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.
By default, he is already the owner of the file, so option B is not the correct answer.
Also making the file executable give other users higher privilege, so option A is also not correct.
Answer:
cryptographic hash collision.
Explanation:
Answer: number 2 is the correct way to do it
Explanation: