1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
11

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde

r?
Computers and Technology
1 answer:
Basile [38]3 years ago
5 0

Answer:

Full control.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Hence, if a folder exists on a new technology file system (NTFS) partition, the permission which is needed by a user who needs to set security permissions on the folder is full control.

You might be interested in
burger hut is trying to decide if it can receive money from the government for providing employees with insurance .
lawyer [7]

Answer:

A cell grows to its full size, The cell copies its DNA

have a great weekends, hopefully it was the right answer!

8 0
3 years ago
Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope
telo118 [61]

Answer:

im pretty sure its A

Explanation:

it makes more sense

4 0
3 years ago
Which element of a business document provides additional information but is not a part of the body of the text?
Vaselesa [24]

The subject is generally covered inside the body of text, so that one's out.

The footer is a completely separate part of the document, specifically the bottom-most portion of the page, but let's look at the others.

The salutation is placed at the beginning of the body of text.

And your closing note is placed at the end of the body of text.

So, the best answer would be b. footer.

3 0
3 years ago
Read 2 more answers
Once you turn 18, if you choose one of the 4 options for accessing credit, how will you be sure you use that credit responsibly?
dmitriy555 [2]

Answer:

hm not sure man

Explanation:

sorry, give me crown and 5 stars  tho

6 0
3 years ago
What is the difference between ionizing and non-ionizing radiation?
e-lub [12.9K]
Non-ionizing radiation is longer wavelength/lower frequency lower energy. While ionizing radiation is short wavelength/high frequency higher energy. Ionizing Radiation has sufficient energy to produce ions in matter at the molecular level.
8 0
3 years ago
Read 2 more answers
Other questions:
  • Edward has started up a new company with his friend, Matthew. Currently, he has only two people working with him. Which type of
    8·1 answer
  • How to remove a channel from favorite list on suddenlink?
    15·1 answer
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • . Once a vulnerability has been identified by Nessus, where would you check for more information regarding the identified vulner
    15·1 answer
  • Select the correct answer.
    9·1 answer
  • Describe at least two other companies that are direct or indirect competitors to your company. Explain how you will differentiat
    15·1 answer
  • Someone please tell me please y my ps4 controller won’t charge:(
    12·2 answers
  • Very Short Answer Type Question (any 9)
    12·1 answer
  • What tells the hardware what to do and how to do it?
    9·1 answer
  • A bank wants to reject erroneous account numbers to avoid invalid input. Management of the bank was told that there is a method
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!