1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share

?
Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
7 0

Answer:

share level security model not required password for file share

Explanation:

The Common Internet File System ( CIFS ) formerly name is ( SMB ) a server message block    

it is develop by IBM and Intel for message based protocol

and there are 2 type authentication that are share level and user level

and in share level connection not required authentication

so its share level security model not required password for file share

 

You might be interested in
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
3 years ago
A web application starts when a client sends _______ to a server?
vovangra [49]
A web application starts when a client sends a request to a server
6 0
3 years ago
Into which of these files would you paste copied information to create an integrated document? A. Mailing list B. Source C. Data
viva [34]

it would be b.mailing list


5 0
3 years ago
Read 2 more answers
Which programming scenario would most likely involve this array block?<br><br>SOMEONE PLEASE HELPPP​
attashe74 [19]

Answer:

answer is D

Explanation:

as the block returns the number of array members, the most likely scenario is the last one.

7 0
2 years ago
Modern ancestor of the typewriter
Rashid [163]
I would think Microsoft Word would be the answer. It does everything a typewriter can.
4 0
2 years ago
Read 2 more answers
Other questions:
  • Select the correct answer. Which sentence best describe an effective management strategy? A. Conceal game-related clippings prio
    12·2 answers
  • There are several vehicles in a parking lot. Some of them are motorcycles
    8·2 answers
  • Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
    5·2 answers
  • Open source software is copyrighted software that is distributed at no cost for a trial period.
    11·1 answer
  • A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company s centra
    9·1 answer
  • ______ is a type of computer software that is installed into devices such as printers, print servers, and various types of commu
    5·1 answer
  • In linear​ programming, what are restrictions that limit the degree to which a manager can pursue an​ objective?
    15·1 answer
  • Write a programme with C++ language wich print the biggest number in between three numbers , whith INT
    14·1 answer
  • Project: Math Tutor Program with Error Handling
    9·2 answers
  • Which is the best choice to explain why a human resource manager is so
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!