1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
15

A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there

fore aren't secure. Why is this?
Question 6 options:

A. There is no way to enforce security on a USB.

B. The USB stick is formatted with FAT 32.

C. The USB stick is formatted with FAT 64.

D. The USB stick is formatted with NTFS
Computers and Technology
2 answers:
Delicious77 [7]3 years ago
7 0
It is (D) because FAT 32 is the most secure option that is why it is most popular
belka [17]3 years ago
5 0

Answer:

The USB stick is formatted with NTFS ( D )

Explanation:

NTFS ( new technology file system ) is file system developed by Microsoft   starting with windows NT 3.1. NTFS is a more sophisticated and improved file system over the previous system like the file allocation table ( FAT ) and high performance file system ( HPFS )

It also has additional extensions that ensures more elaborate  security system based on access control lists and  file system journaling.

the more elaborate security system might be the reason why the user can't get the permissions associated withe the file.

You might be interested in
Which of the following is equivalent to (p&gt;=q)? <br> i) P q iv) !p Where are genius people?:)
Elena L [17]

Answer:

Explanation:

This is unsolvable if you have no variable substitutes

4 0
3 years ago
What is an border in html
kompoz [17]

Borders can be applied to most HTML elements within the body. To make a border around an element, all you need is border-style . The values can be solid , dotted , dashed , double , groove , ridge , inset and outset . border-width sets the width of the border, most commonly using pixels as a value.

8 0
3 years ago
The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predica
baherus [9]

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

5 0
3 years ago
What type of program would you use to create a personal budget?
Rina8888 [55]

Answer:

Using a spreadsheet would be the best program for creating a personal budget.

Explanation:

With a spreadsheet, you can enter formulas to add or subtract from your budget, plus you can create charts and graphs as well.

8 0
2 years ago
Groups to which we belong are defined late in our development true or false
Anna71 [15]
The answer is false......
7 0
3 years ago
Other questions:
  • A line of text that has an equal number of characters on either side of the horizontal center of the page is called____.
    14·1 answer
  • To change the print orientation from portrait to landscape, tap or click the ____ button on the print preview tab.
    15·1 answer
  • "assignment is to create a program that will read a value from an array, and then place this value in another array with the loc
    10·1 answer
  • Computers that belong to the same domain can access a common security database of user and computer account information. This ty
    5·1 answer
  • What image format should be used to keep the file size manageable​
    14·1 answer
  • Which of the following is an example of a content management system (CMS)?
    12·2 answers
  • What was your learning target for today
    9·2 answers
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • Greenpeace used "Mister Splashy Pants" to:
    6·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!