1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
13

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw

ord to access a specific resource?
Computers and Technology
1 answer:
hjlf3 years ago
4 0

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

You might be interested in
It keeps saying “something is going wrong oops!” when i click on my brainly notifications what do I do
AveGali [126]

Answer:

check your app permissions it may be blocking them or try resetting the app

4 0
3 years ago
Ryan is looking to buy a new HDTV set. He knows from friends that LCD set screens reflect less light than plasma set screens, bu
lbvjy [14]

Answer: Cognitive

Explanation:

 According to the question, the Ryan shows cognitive attitude towards the HDTV. The cognitive component basically refers to the three main components that are:

  • Thoughts
  • Beliefs
  • Attributes

The cognitive component is one of the type of attitude which basically consist of various types of thoughts, knowledge and the beliefs towards the any type of object. It is one of the belief and opinion of the attitude.  

3 0
3 years ago
Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be,
dolphi86 [110]

Answer:

Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.

Explanation:

please mark this answer as brainliest

7 0
3 years ago
Why does the IPv6 format use letters and numbers?
Iteru [2.4K]

Answer:

c is the response hope it helps

7 0
3 years ago
What are the advantages and disadvantages of using wireless communications? What are the advantages and disadvantages of using w
Nimfa-mama [501]

Answer:

<u>Advantages of wireless communication:-</u>

  • Flexibility in transferring the message through communication for which the sender and receiver can be in any place.
  • Speed of the communication is accurate and fast
  • Due to no wiring , the cost of the wireless communication is less.

<u>Disadvantages of wireless communication:-</u>

  • The security is less as the data can be accessed by unauthorized sources at times.
  • The setting up of wireless communication complex and expensive.

<u>Advantages of wired communication:-</u>

  • Simple configuration
  • Higher bandwidth is present in the cable
  • High reliability

<u>Disadvantages of wired communication:-</u>

  • Mobility is present for communication
  • Installation requires lot of time due to cabling
  • Requires extra devices for covering large areas for communication

Wireless communication is more preferable than wired communication in the conditions like communication connection that should face low damage and longer life which is not present in cable connection as they break or get disrupted.The flexibility of moving while communication is required by most people so, they use wireless communication .

8 0
3 years ago
Other questions:
  • (If the link is not working, search for "Veritasium Levitating Barbecue". At approximately the 2 minute mark, the screen shows 8
    9·1 answer
  • Which type of computer operating system would be best for a large corporation?
    7·2 answers
  • Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia"). Assume also that stdin is a v
    9·1 answer
  • Unwanted email sent to large groups of people who did not request the communication is called _____
    12·1 answer
  • Which of these might be an example of an advertiser's target group?
    12·2 answers
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • What is the difference between php and html?​
    13·2 answers
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
  • Tom is not sure how to code contents such as title and meta elements. These are coded as ____ elements.
    8·2 answers
  • Are tigers and goldfish related
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!