1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
13

You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Ma

ngum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do
Computers and Technology
1 answer:
Anna71 [15]3 years ago
5 0

Answer:

Following are the solution to the given question:

Explanation:

The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.

You might be interested in
What is best android apps​
natima [27]

Answer:

brainly

Explanation:

cuz yeah its the best app ever tbh

8 0
3 years ago
Read 2 more answers
In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
pickupchik [31]

Answer: d. the time quantum should be as small as possible.

Explanation: Round robin is a CPU scheduling algorithm. If the time quantum is extremely small, number of context switches is very high, round robin scheduling will be same as processor sharing algorithm. Then the algorithm is good. Very large time quantum will make response time of processes too much which may not be tolerated in interactive environment.

3 0
3 years ago
Assuming each reference costs 1 byte, and each piece of data/info costs 1 byte as well. When will a doubly linked list be more a
NeX [460]

Answer:

The circular individually linked list is more efficient for time sharing process ,when multiple application are running on pc it is responsibility of an output system to put all process on a list and execute them all by giving them piece of time and make them wait when cpu is selected to other process.

It will be more suitable for output system to use circular list as when it reaches to last of list it will be manually reaches to starting node or process.

Singly circular linked list is used when we are concerned with the memory as only one process will be allocated memory at once and there are no chances of process to go never-ending waiting.

Explanation:

8 0
4 years ago
Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, w
MA_775_DIABLO [31]

Answer:

In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.

Explanation:

3 0
3 years ago
Read 2 more answers
Distinguish between principles, guidelines and standards, using examples of each to illustrate​
AleksAgata [21]

Explanation:

principles is what governs a place

guidelines is what you read to guide you

standards is what build up in your self

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which wireless device connects multiple laptops, tablets, phones, and other mobile devices in a corporate environment?
    13·1 answer
  • Evaluate means having a preference for one thing over another in a way that's unfair.
    5·1 answer
  • What number system is the basis for all of the powerful computers and electronic devices in the world?
    7·1 answer
  • SOMEONE HELP 60 POINTS!!!!! When creating business publications, these two factors must be determined before planning the layout
    8·2 answers
  • A folder is a collection of related of data is true or false​
    10·2 answers
  • Question of Computer science​
    7·1 answer
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
  • What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
    10·1 answer
  • Select the correct answer.
    9·1 answer
  • The largest amount of data, in bytes, which can be accomodated by a particilar network, link, or physical-layer is called the?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!