1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ira Lisetskai [31]
3 years ago
5

You decide to share the annual report for your company from your computer. You decide that the data will be stored in its own pa

rtition, so you create a 20 MB logical partition for the report. If a user signs in to your computer locally, that user must have read-only access to the files. What file system would you select for the partition? What security settings would you use to achieve the desired results?
Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
8 0

Answer:

  • The required functionality can be provided by both NTFS and FAT.
  • NTFS will provide a sophisticated security features as the partition is so small but the NTFS files will consume a lot of disk space.
  • FAT on the other hand will not use much space but talking about security features, the read only feature can be granted by FAT. The folder can be shared and restricted for required user only giving the read-only right to the user. This feature is equally voted for NTFS and FAT
  • So FAT therefore will provide a normal functionality whereas NTFS would perform perfectly. Ignoring the consumption of disk space by NTFS.

You might be interested in
What defines "print media"? It is media that includes words and text rather than video, such as many blogs. It is media that is
uranmaximum [27]

Answer:

"It is media that is distributed in paper form, such as magazines and newspapers."

3 0
3 years ago
If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?
Sonbull [250]

The transmission that is more efficient is the full duplex transmission.

<h3>What is database?</h3>

A database simply means an organized collection of a structured information in a computer program.

In this case, when a company uses multimedia applications in addition to normal file and database sharing, the efficient transmission is the full duplex transmission.

Learn more about database on:

brainly.com/question/26096799

#SPJ12

3 0
2 years ago
A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve
MAVERICK [17]

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

8 0
3 years ago
Read 2 more answers
Easy coding question, please help.
borishaifa [10]

Answers:

What is the index of the last element in the array? stArr1.length()-1

This prints the names in order. How would I print every other value? Change line 4 to: index = index +2

Change line 7 to: i < names.length

5 0
3 years ago
What single awk command can be used to display all the login names and their associated numerical user IDs
Luden [163]

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

8 0
3 years ago
Other questions:
  • What is one important feature of an aup? 1. a list of all available courses. 2. a clear out line of the consequences of violatin
    12·2 answers
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
    7·1 answer
  • If a Web page is not copyright protected, then it is ethical to cut and paste sections of the page into your speech without citi
    12·1 answer
  • A symbolic link is also known as a soft link and is depicted by an @ symbol appearing at the beginning of the filename when view
    7·1 answer
  • Joe always misspelled the word calendar what function corrects the word
    12·2 answers
  • QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Mana
    6·1 answer
  • Name two materials that we can burn in order to get energy from biomass
    9·1 answer
  • Answer for 5,6,7 any one know plz
    8·1 answer
  • Help me please with this
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!