1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksley [76]
3 years ago
11

If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde

r?
Computers and Technology
1 answer:
Basile [38]3 years ago
5 0

Answer:

Full control.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Hence, if a folder exists on a new technology file system (NTFS) partition, the permission which is needed by a user who needs to set security permissions on the folder is full control.

You might be interested in
Tell what an array is and list two scenarios in which modeling data as a Java array (vs. another data type) would make sense.
OlgaM077 [116]

Answer:

The definition including its context of this discussion is outlined in the following clarification portion.

Explanation:

  • An array seems to be a storage research method to collect a set number of constant weight. Whenever the array was indeed generated, the length including its array has been determined. Its period is set after development.
  • Depending mostly on array description, the array may contain data structures and even some objects in something like a class. For primitive data types, the individual values become located at contiguous locations throughout the store.

Scenario:

  • If we're to preserve a summary, we could use the appropriate array size.
  • An individual can however preserve an object list.
3 0
3 years ago
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
What is a database query?
lana [24]
C.a form used to create a new tables for the database
8 0
3 years ago
Read 2 more answers
What is the different between the simple statement and compound statement ?​
OverLord2011 [107]

Answer:

Following is the difference between Simple and Compound statement; Simple statement (sentence) is one which has only one subject and one predicate. A Compound statement (sentence) is one which has two or more independent clauses consisting of their own subject and predicate.

Explanation:

hope it helps you

Mark as brainliest.

And follow for a follow back

4 0
3 years ago
If you have an if/else if/else code sequence with 4 blocks, what is the minimal number of input values that you should use to te
yawa3891 [41]

Answer:

4 is the correct answer for the above question.

Explanation:

  • If the if-else sequence has 4 blocks then it will be designed like if, else-if, else-if and then else which made 4 blocks which are as follows:-
  1. The first block is an if block.
  2. Then the second block is an else-if block.
  3. The third block is also else-if block and
  4. The fourth block else blocks.
  • So there is a need of 4 value (one value for each case) to test the application which is defined in the above scenario.
  • It is because when the first if statement is false then the first else-if statement is executed and when the first else statement is false then the second else-if statement is executed and when it is false then the else statement will executed.
7 0
3 years ago
Other questions:
  • Why is knowledge of percent composition important in the mining process?
    7·1 answer
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • Select the strategies below that are likely to increase audience attention.
    14·2 answers
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • 5 of 10
    7·1 answer
  • Identify two real-world examples of problems whose solutions do scale well
    13·1 answer
  • When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.​
    10·1 answer
  • How to give a brainiest on a question? if you teach me i will give brainiest
    7·2 answers
  • 2023 murano’s available intelligent awd adjusts the ________ to help maintain cornering control.
    11·1 answer
  • What do you think that private information like passwords pin number will be guarded or shared with the public? why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!