1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
13

When using the Common Internet File System (CIFS), which security model will require network users to have a user name and passw

ord to access a specific resource?
Computers and Technology
1 answer:
hjlf3 years ago
4 0

Answer:

User-level Security

Explanation:

User-level security allows the user to access resources on a network using a username and password. User-level security offers higher and greater security than share-level security, which does not require a password to access files.

User-level security allows the database user access and permission to resources.

You might be interested in
You need to give mary only the rights that she needs. This must be accomplished with the least amount of administrative effort
Arte-miy333 [17]

Answer:

Management is not that easy. And at each level of the work environment, we need it. Suppose Mary works under an editor, and as a writer. Then She will be provided by editor a certain set of rights, that she requires to accomplish her work. And the chief editor who heads the editor, and who might be the administrator has nothing to do with this. And thus this will ensure that the chief editor or the administrator can accomplish other works during this time. And this will certainly save time, of the whole team. And its a rule in management, that only those rights are provided, that are required by the worker, and like in case of Mary.

Explanation:

Please check the answer section.

7 0
3 years ago
Filtering removes data from the spreadsheet. A. True B. False
____ [38]
6 is false
7 is false
8 is true
5 0
3 years ago
Read 2 more answers
You need to find out more about the fdisk utility and the commands associated with it before you set up a new Linux system in ad
Ivenika [448]

Answer:

Option A i.e., man fdisk.

Explanation:

If the user wants to finds more regarding the fdisk utility as well as the related instructions until setting up a new Linux system besides those that are currently utilizing. So, the following man fdisk command could be used to finds more regarding fdisk on his current system.

Other commands are not useful for according to the following scenario because they are used in Linux for other purposes.

5 0
4 years ago
let m be a positive integer with n bit binary representation an-1 an-2 ... a1a0 with an-1=1 what are the smallest and largest va
Ahat [919]

Answer:

Explanation:

From the given information:

a_{n-1} , a_{n-2}...a_o in binary is:

a_{n-1}\times 2^{n-1}  + a_{n-2}}\times 2^{n-2}+ ...+a_o

So, the largest number posses all a_{n-1} , a_{n-2}...a_o  nonzero, however, the smallest number has a_{n-2} , a_{n-3}...a_o all zero.

∴

The largest = 11111. . .1 in n times and the smallest = 1000. . .0 in n -1 times

i.e.

(11111111...1)_2 = ( 1 \times 2^{n-1} + 1\times 2^{n-2} + ... + 1 )_{10}

= \dfrac{1(2^n-1)}{2-1}

\mathbf{=2^n -1}

(1000...0)_2 = (1 \times 2^{n-1} + 0 \times 2^{n-2} + 0 \times 2^{n-3} + ... + 0)_{10}

\mathbf {= 2 ^{n-1}}

Hence, the smallest value is \mathbf{2^{n-1}} and the largest value is \mathbf{2^{n}-1}

3 0
3 years ago
Motivational appeals refer to
Lesechka [4]

Answer: D) All of the given options

Explanation:

Motivational appeals refers to the an emotional nature developed to increase individual values. It is a tool of emotions which target the psychological needs. It is a visualization of someone's desire and values and method of satisfying the emotions. Motivational appeals are divided into many categories like motivation and emotions.

3 0
3 years ago
Other questions:
  • Write a C++ program that searches for anagrams in a dictionary. An anagram is a word obtained by scrambling the letters of some
    5·1 answer
  • _ is a model of computing in which computer processing, storage, software, and other services are provided as a shared pool of v
    10·1 answer
  • _ effects determine how slide elements disappear
    11·1 answer
  • The part of the poppet valve that contacts the valve seat is called the?
    10·2 answers
  • Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
    9·1 answer
  • List the step in turning on a computer
    6·1 answer
  • The words that follow a code number in the cpt manual are called the
    12·1 answer
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • 1. You have been contracted to design a system for a smart car. The company installed four laser radars on the car’s corners to
    13·1 answer
  • Which data type is the correct choice to store the names of all the hockey players who have scored 3 or more goals in a single g
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!