1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bonufazy [111]
4 years ago
15

In your organization, each department has a folder on a shared drive. Your boss frequently copies the folder to his local comput

er to run reports. You have noticed that the folder for your department keeps disappearing from the shared drive. You discover that the folder isn’t being deleted and often gets moved into a random, nearby folder. You suspect that coworkers in other departments are being careless with their mouse clicks while accessing their own folders on the shared drive and are dragging and dropping your department folder into other folders without noticing. How can you prevent this folder from being moved, but still allow it to be copied? What steps do you take?
Computers and Technology
1 answer:
podryga [215]4 years ago
5 0

Put it in read any mode or zip it

Explanation:

You might be interested in
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
The standard toolbar appears whenever you select text.
Irina-Kira [14]
If you are asking true or false, it  is true.
3 0
4 years ago
The central computer on a network is called the ______. A) boss B) client C) parent D) server
KiRa [710]

Answer: The central computer on a network is called :

A Server.

Explanation: Server is a program that provides services to other programs or devices either on the same computer or over a computer network.

5 0
4 years ago
Read 2 more answers
Which of these is a formatting option that you can use to enhance your text document?
Paha777 [63]
My best guess is the last option (D) tools. Hope it helps
8 0
3 years ago
Read 2 more answers
The actual database of active directory shared resources is stored on one or more computers designated as:
Mila [183]

Solution:

It is done by Native Os X command line tool that can do this.

Active Directory, the data store contains database files and processes that store and manage directory information for users, services, and applications. A copy of the data store runs on each domain controller in the forest. The Active Directory data store is often referred to as the directory.

The ideal environment for the data store includes the following:

A domain controller running an operating system in the Windows Server 2003 family and containing hardware that meets the minimum hardware requirements of the edition of the operating system (Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; or Windows Server 2003, Datacenter Edition)

For environments consisting of multiple domain controllers, the presence of a fully functioning Active Directory replication topology

For environments consisting of multiple domain controllers, the presence of a fully functioning File Replication Service (FRS) topology

A regular backup schedule

Regular monitoring of Active Directory, either through manual review of event logs or through an automated monitoring solution, such as Microsoft Operations Manager (MOM)

This is the required description describes the elements of the Active Directory data store, including its architecture, protocols, interfaces, logical structure, physical structure, processes and interactions, and network ports.


6 0
3 years ago
Other questions:
  • Why would you use a database system instead of traditional file system
    6·1 answer
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • An online company wants to conduct real-time sentiment analysis about its products from its social media channels using SQL.
    12·1 answer
  • A classmate is texting a false rumor around school that another student was arrested for shoplifting. This behavior can be descr
    9·2 answers
  • When choosing a new computer to buy, you need to be aware of what operating it uses.
    12·1 answer
  • A license plate consists of 2 letters followed by 1 digit. How many license plates are possible if the first letter can be any l
    13·1 answer
  • Buying the newest phone as soon as it is released when your current phone works perfectly is not a good idea for all but which o
    10·2 answers
  • Which type of computer is the fastest?
    7·1 answer
  • Can someone please help me with this .
    11·1 answer
  • Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!