1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
6

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best

solve this issue without losing data in the folder
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
4 0

Answer:

Take ownership of the folder and then change permissions.

Explanation:

The New Technology file system or a NTFS may be defined as a file system of proprietary journaling. It was developed by Microsoft. It is used to store, find or organize file efficiently in the hard disc.

In the context, if I am having a difficulty in changing permission of a folder on an NTFS that was created by some other user, the best way to solve the issue is to take ownership of the folder and change the permissions. The owner of the file can have the full permission. This way the data is not lost.

You might be interested in
What is important for an internet user to know about https:// ?
frutty [35]

Answer:

c. It should be contained in the website URL if you'll be providing any personal information.

Explanation:

Https in the URL ensures that the communication between the browser and the server is encrypted using SSL(Secure Socket Layer).

Https stands for Hyper Text Transfer Protocol Secure .

So in all those interactions where security of information flow is a major concern, the communication should happen over https. Examples include:

  • Financial transaction online from my bank account
  • Online purchase using credit card
  • Sharing sensitive information such as health records.

6 0
3 years ago
Directions: SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN Java.
luda_lava [24]

Answer: I don’t know

Explanation:I had a website to help but it won’t let send it

7 0
3 years ago
How long will it take Lola to travel from Paris to nice?
Alisiya [41]

the answer is 5,000 hours.

I recommend you post these kind of questions in the mathematics section

4 0
4 years ago
A website sells illegal and counterfeited materials. According to which law can the US Attorney General seek a court order to re
RideAnS [48]
The answer is SOPA or Stop Online Piracy Act. This bill was introduced by Lamar Smith a representative in US. Lamar passed this bill in the United states to enforce the law to combat online copyright, online trafficking, and other cyber crimes. There are many provisions on this bill including the court orders to request ISP (Internet Service Provided) to block access to that website.
3 0
3 years ago
Read 2 more answers
Activity: Identify what hazards are addressed by the following health and safety procedures.
lisov135 [29]

Answer:

1. other hazard

2.mechanical hazard

3. ergonomics hazard

4.chemical hazard

5.hazard

4 0
2 years ago
Other questions:
  • To locate something in the database, one must type in the keyword into the ________ of the application.
    12·1 answer
  • 3. The combination of keys that we should press to select all document is
    14·1 answer
  • Mary is an aspiring web designer. Which degree she should opt for to strengthen her portfolio? A. bachelor’s degree in computer
    11·1 answer
  • Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
    6·1 answer
  • Let f be the following function: int f(char *s, char *t){char *p1, *p2;for(p1 = s, p2 = t; *p1 != ‘\0’&& *p2 != ‘\0’; p1
    6·1 answer
  • HELP PLS TIME LIMIT HERE
    11·1 answer
  • Drow flowchart that finds a<br> series between 10, 100<br> fibonanchi
    6·1 answer
  • Help me code game plz just comment below for more info
    10·2 answers
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!