1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jet001 [13]
3 years ago
11

In your organization, each department has a folder on a shared drive. Your boss frequently copies the folder to his local comput

er to run reports. You have noticed that the folder for your department keeps disappearing from the shared drive. You discover that the folder isn't being deleted and often gets moved into a random, nearby folder. You suspect that coworkers in other departments are being careless with their mouse clicks while accessing their own folders on the shared drive and are dragging and dropping your department folder into other folders without noticing. How can you prevent this folder from being moved, but still allow it to be copied? What steps do you take?
Computers and Technology
2 answers:
Elden [556K]3 years ago
8 0

Answer:

Use the Properties box of the folder to disable inheritance on the folder. Then, for all users except Administrators and SYSTEM users, open the Permission Entry for the folder. Click Show advanced permissions and remove the check mark for Delete. Apply changes and close all windows

Explanation:

In a situation where a folder is been moved, it is been deleted from its original or main location and when the ability of the users is been removed to delete the folder, the users are allowed to copy but not move the folder.

Therefore to set these permissions, the Properties box of the folder should be use to disable inheritance on the folder. Then, for all users except Administrators and SYSTEM users, Permission Entry for the folder should be open then go ahead and Click Show advanced permissions and remove the check mark for Delete. Apply changes and close all windows.

sweet [91]3 years ago
6 0

Answer:

You can possibly make it so that your co workers can not move folders. Ask your boss if he/she can make everyone content managers. This will make it so no one can move folders.

You might be interested in
Choose all of the items that represent functions of the operating system kernel.
babunello [35]

Answer: its all of them

Explanation: I took Assignment over this

6 0
3 years ago
Read 2 more answers
What is up with the bots? They are so annoying.
Yuki888 [10]

Answer:

very very very annoying

6 0
3 years ago
Read 2 more answers
The statistically multiplexed wan technology that is specifically designed to carry multiple kinds of traffic (data and voice is
Flura [38]
To manage and organise multiple kinds of traffic, the wide area network statistically multiplexed technology that could be used would be the ATM. Also known as the asynchronous transfer mode, this type of connection using fixed cells in encoding data with regards to the situational traffic.
5 0
3 years ago
What file type starts at offset 0 with a hexidecimal value of ffd8?​?
kiruha [24]
The answer is jpeg.  It is <span>file type that starts at offset 0 with a hexidecimal value of ffd8?.  JPEG stands for </span>Joint Photographic Experts Group.  It is a popular image file format,  commonly used by digital cameras to store photos<span>. The format also supports different levels of compression, which makes it ideal for web graphics.</span>
5 0
4 years ago
The most fundamental components of storage that users interact with are the:
Levart [38]
<span>A file can contain the instructions of a computer program or the data that you care to store.

so the answer is =  file
</span>
8 0
4 years ago
Other questions:
  • A ____ is a copy that is kept in case values need to be restored to their original state.
    5·1 answer
  • In cell R9, enter a formula using the AVERAGEIF function to determine the average number of years of experience for lifeguards.
    12·1 answer
  • What is the process called if you are erasing data on your hard drive from a MAC
    12·1 answer
  • Which is an example of a tertiary source?
    13·1 answer
  • You rub two red balloons against a wool scarf. What do you think will happen if you place the balloons near each other. Justify
    5·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • Assume the availability of an existing class, ICalculator, that models an integer arithmetic calculator and contains:an instance
    12·1 answer
  • History timeline: who developed what elements first Windows OS and Apple OS?
    13·2 answers
  • Write the definition of a function named swapints that is passed two int variables. The function returns nothing but exchanges t
    8·1 answer
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!