1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
7

When using the Common Internet File System (CIFS), which security model does not require a password to be set for the file share

?
Computers and Technology
1 answer:
Natasha2012 [34]3 years ago
7 0

Answer:

share level security model not required password for file share

Explanation:

The Common Internet File System ( CIFS ) formerly name is ( SMB ) a server message block    

it is develop by IBM and Intel for message based protocol

and there are 2 type authentication that are share level and user level

and in share level connection not required authentication

so its share level security model not required password for file share

 

You might be interested in
___________ is a technique that uses IT to develop an ongoing relationship with the purchasers or buyers of an organization's pr
Diano4ka-milaya [45]

Answer:

Customer relationship management.

Explanation:

Customer Relationship Management provides the controls overall the relationships of business between the clients and potential customers to getting the profit in the business The main objective of Customer Relationship Management is to enhance the relationships between businesses.  

Customer Relationship Management builds the ongoing partnership with the purchasers or purchasers of the commodity of an organization to optimize the value that the company can offer over time.

5 0
2 years ago
To insert a clip art you must do the following
Elis [28]

In word (.docx) or powerpoint (.ppt), one can insert images. These images may come from the internet online and other avenues for inserting images. If one does not have internet at home, he could opt to using the ‘clip arts’ where you click ‘Insert’ in the home bar up, and click clip art.

<span> </span>

5 0
3 years ago
If some1 emails u and u want to know who it was how do u find that out
bonufazy [111]
The name should pop up on the email saying sent by? 
5 0
3 years ago
Read 2 more answers
PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST
vagabundo [1.1K]

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

6 0
3 years ago
Categorize each of the following situations as a compile-time error, run-time error, or logical error. Group of answer choices m
svetlana [45]

Answer:

1. multiplying two numbers when you meant to add them - Logical Error

2. dividing by zero - Compile time error

3. semi colon at the end of a programming statement - Logical error

4. wrong in output - Run time error

5. when you should have typed a - Compile time error

6. producing inaccurate results - Logical error or Run time error

Explanation:

Compile time error is a lack in computer programming which causes to violate the rules which are defined by user in the program.

Run time error produces wrong outputs. It causes lags in the softwares which makes the output inefficient. It even causes programs crash when the output is just seconds away.

Logical error is the situation where programs completes the task assigned but with the wrong syntax. The output is produced with some abnormality.

3 0
3 years ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
    8·1 answer
  • You can use ???? a to test tread wear on your tires
    14·2 answers
  • What uses HTML hypertext links that users can click to access different locations or information?
    11·1 answer
  • Each of the walls of a room with square dimensions has been built with two pieces of sheetrock, a smaller one and a larger one.
    11·1 answer
  • You are the administrator of the Sybex website. You are working when suddenly web server and network utilization spikes to 100 p
    15·1 answer
  • Which are two main areas of the properties inspector
    7·1 answer
  • You need to extract data from the system your predecessor created. you discover tables have been created according to the third
    7·1 answer
  • Each drop-down menu.
    8·1 answer
  • How to send an email to multiple recipients individually outlook
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!