1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
6

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best

solve this issue without losing data in the folder
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
4 0

Answer:

Take ownership of the folder and then change permissions.

Explanation:

The New Technology file system or a NTFS may be defined as a file system of proprietary journaling. It was developed by Microsoft. It is used to store, find or organize file efficiently in the hard disc.

In the context, if I am having a difficulty in changing permission of a folder on an NTFS that was created by some other user, the best way to solve the issue is to take ownership of the folder and change the permissions. The owner of the file can have the full permission. This way the data is not lost.

You might be interested in
A company has a popular gaming platform running on AWS. The application is sensitive to latency because latency can impact the u
AysviL [449]
Yetwywywywywywyyw would
8 0
3 years ago
The two outputs of a digital controller for an automatic drip coffee maker are for the time
victus00 [196]
The answer is (d.) display and pilot light

An automatic drip coffee maker displays two output from the digital controller; the time and the light or output signal. According to the US Patents publication, an automatic drip coffee maker includes a timer circuit. It's to provide pre-selected time for the activation and deactivation of the coffee maker.
7 0
3 years ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
You defined a book data type.
tensa zangetsu [6.8K]

Answer:

myBook = book()

Explanation:

Correct answer edge 2020

4 0
3 years ago
Adware and spyware are similar to each other in that they both ________.
scoundrel [369]
The answer is that they both infect your browser. Adware and spyware are one of many that can access what you search up, what you submit, and what you provide.
8 0
3 years ago
Other questions:
  • Help me Please?!! I will put you as brainliest.<br>I hope I spelled that right.
    5·2 answers
  • Casey Griggs is a very capable computer engineer. Recently, he noticed a problem that computer engineers have, and thought of a
    13·1 answer
  • Which printout will result from the snippet of code?
    9·1 answer
  • What tool can help discover and report computer errors and conflicts that occur when you first turn on a computer and before the
    15·1 answer
  • Encapsulation is the process of “packaging” information prior to transmitting it from one location to another. true or false
    14·1 answer
  • _____ provides vital protection and maintenance services for system hardware and software, including enterprise computing system
    12·1 answer
  • 6.4 Predicting Prices of Used Cars. The file ToyotaCorolla.csv contains data on used cars (Toyota Corolla) on sale during late s
    5·1 answer
  • What is the Piston Displacement having 3-inch bore and 3-inch stroke?
    11·1 answer
  • Which of these is a valid use of the Reply All feature?
    11·1 answer
  • Read the citation example, and then use the drop-down menus to identify each part.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!