1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
6

You are having difficulty changing permissions for a folder on an NTFS volume that was created by another user. How can you best

solve this issue without losing data in the folder
Computers and Technology
1 answer:
Oduvanchick [21]3 years ago
4 0

Answer:

Take ownership of the folder and then change permissions.

Explanation:

The New Technology file system or a NTFS may be defined as a file system of proprietary journaling. It was developed by Microsoft. It is used to store, find or organize file efficiently in the hard disc.

In the context, if I am having a difficulty in changing permission of a folder on an NTFS that was created by some other user, the best way to solve the issue is to take ownership of the folder and change the permissions. The owner of the file can have the full permission. This way the data is not lost.

You might be interested in
In one sentence, how would you sum up the internet?
Slav-nsk [51]

Answer:

an informational system

Explanation:

6 0
3 years ago
Read 2 more answers
c Write a program that simulates a magic square using 3 one dimensional parallel arrays of integer type. Each one the arrays cor
Komok [63]

Answer:

hope this helps and do consider giving a brainliest to the ans if it helped.

Explanation:

//program to check if the entered grid is magic square or not

/**c++ standard libraries

*/

#include<bits/stdc++.h>

using namespace std;

/**function to check whether the entered grid is magic square or not

*/

int isMagicSquare(int arr[3][3]){

  int i,j,sum=0,sum1=0,rsum,csum;

  for(i=0;i<3;i++){

      sum+=arr[i][i];

      sum1+=arr[i][2-i];

  }

  if(sum!=sum1){

      return 0;

  }

 

  for(i=0;i<3;i++){

      rsum=0;

      csum=0;

      for(j=0;j<3;j++){

          rsum+=arr[i][j];

          csum+=arr[j][i];

      }

      if(sum!=rsum){

          return 0;

      }

      if(sum!=csum){

          return 0;

      }

  }

  return 1;

}

/** main function to get user entries and

* call function

* and print output

*/

int main(){

  int i,j,arr[3][3]={0};

  for(i=0;i<3;i++){

      for(j=0;j<3;j++){

          cout<<"Enter the number for row "<<i<<" and column "<<j<<" : ";

          cin>>arr[i][j];

      }

  }

  int ret = isMagicSquare(arr);

  if(ret==1){

      cout<<"This is a Lo Shu magic square"<<endl;

  }

  else{

      cout<<"This is not a Lo Shu magic square"<<endl;

  }

  return 0;

}

7 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
4 years ago
Software that interpret commands from the keyboard and mouse is known as the
goldfiish [28.3K]
The Operating system kernel, a component of all operating systems, interprets these signals by the use of a device driver, so the answer to your questions is a "driver".    <span />
3 0
3 years ago
If the main cable in a bus topology is to be more than ____ yards long, the network will need one or more hubs.
Viefleur [7K]

Answer:

I think 10 yards

if wrong by chance correct me please

7 0
3 years ago
Other questions:
  • Bunch of points!!!!!!! help pls
    11·2 answers
  • The Glow effect adds a blinking border around a chart.<br> t or f
    15·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • You type a web address in your web browser. order the steps, which describe the internet name resolution process for the web add
    7·1 answer
  • ________type of website is an interactive website kept constantly updated and relevant to the needs of its customers using a dat
    5·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    10·2 answers
  • This Command to insert copied text anywhere in your document
    13·2 answers
  • Assessment
    12·1 answer
  • _________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejectio
    12·1 answer
  • Select the correct answer. Who takes care of the final layout of the product that meets the standards set by UX designers? A. we
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!