1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
15

A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there

fore aren't secure. Why is this?
Question 6 options:

A. There is no way to enforce security on a USB.

B. The USB stick is formatted with FAT 32.

C. The USB stick is formatted with FAT 64.

D. The USB stick is formatted with NTFS
Computers and Technology
2 answers:
Delicious77 [7]3 years ago
7 0
It is (D) because FAT 32 is the most secure option that is why it is most popular
belka [17]3 years ago
5 0

Answer:

The USB stick is formatted with NTFS ( D )

Explanation:

NTFS ( new technology file system ) is file system developed by Microsoft   starting with windows NT 3.1. NTFS is a more sophisticated and improved file system over the previous system like the file allocation table ( FAT ) and high performance file system ( HPFS )

It also has additional extensions that ensures more elaborate  security system based on access control lists and  file system journaling.

the more elaborate security system might be the reason why the user can't get the permissions associated withe the file.

You might be interested in
Which of the following is a principle that can improve the efficiency of I/O?
natulia [17]

Answer:

C)

Explanation:

One principle that can improve the efficiency of I/O would be to move processing primitives into hardware. Primitives are a semantic value representing something else such as words or numbers within the programming language. By moving them into hardware they system is able to read them at a much faster speed making the I/O more efficient.

5 0
3 years ago
Read 2 more answers
What are the two major types of sas steps?
QveST [7]

The two major SAS steps are data and proc.

SAS programming structure is based on two essential steps, Data and Proc.

1. The DATA step:

This involves collecting and uploading the essential data to the program memory. It is used to update, modify and edit the data in case of any errors once it has been added to a dataset. New datasets can be created from existing ones by updating, editing, and/or merging them. at the end of this step, SAS data sets are created.

2. The PROC step:

This step processes and analyses the data collected into datasets in the previous step. it is used to perform specific functions on the data. at the end of the proc step, a result or report is produced.

In a SAS code, each line of code should begin either with a DATA or PROC step.

<u>While the other options are incorrect because: </u>

<u />

  • Analysis: analysis is done in the PROC step.
  • Content: Data or content is collected in the DATA step.
  • Stat: a stat function acquires the status information regarding a specific file. Functions are performed on the datasets in the PROC step.
  • Run: This command is used to execute a code.
  • Import: Datasets are created by importing data from other datasets and outside.
  • Print: the report produced at the end of the PROC step can be printed as a hard copy.

You can learn more about SAS at

brainly.com/question/13615203

#SPJ4

8 0
2 years ago
1.Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet
konstantin123 [22]

Answer:

16 subnets and 14 hosts assignable IP addresses.

Explanation:

Computer networking is the interconnection and intercommunication of computer devices. These computer devices can be connected using cables or wirelessly. All devices in a network must have an IP address.

Subnetting a network is a process of preventing the waste of IP addresses for the purpose of security and cost. IP4 addresses are 32 bits in size (4 octets) and the host and subnet size is dependant on the host and network bit configuration.

The IP address 200.245.10.150/28 is a class A network address but subnetted to borrow four bits from the fourth octet to produce 16 subnets (2 ^ 4 bits borrowed) and 14 host IP addresses (2^ 4 bits remaining in the fourth octet - 2, which is the network and broadcast addresses).

3 0
3 years ago
Choose the types of education and iss professional is most likely to have
shutvik [7]

Answer:

A and D

Explanation:

Just took it on edgenuity

8 0
3 years ago
The coding system that has just two characters is called:
cupoosta [38]

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

6 0
3 years ago
Read 2 more answers
Other questions:
  • Careful driving requires appropriate reaction time, both simple and complex. Braking and then shifting gears, followed by signal
    10·2 answers
  • What is an implicit benefit to Monetary Policy?
    6·1 answer
  • What does utp stand for?
    11·2 answers
  • A U.S. social security number consists of a string of 9 digits, such as "444422333". Declare a char array named ssn suitable for
    5·1 answer
  • What is NOT an issue associated with tag management systems? There is no automation available for tag management systems. Managi
    5·1 answer
  • A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016)
    10·1 answer
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • Which PlayStation was the first to allow connection between it and computer network
    12·1 answer
  • 20
    14·1 answer
  • State three advantages of using a printer​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!