1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
3 years ago
13

A user has called you to complain that he does not have access to a file. While on the phone, you add the user to the appropriat

e group that has permission to access the file. You ask the user to try to access the file again, but he still cannot. What should you do?
Computers and Technology
1 answer:
Andre45 [30]3 years ago
6 0

Answer:

You should remove the user from each group that has denotative contradiction to access the file.

Explanation:

This happens when the user is also a member of one or more such groups that do not allow users to access specific files. The controller get confused by having two options (have access , does not have access) and does not gives access to user for such files unless they are removed from the groups that have a contradiction for accessing that files.

I hope it will help you!

You might be interested in
Which term represents a computational instruction stored in computer memory?
lys-0071 [83]
A computational instruction with operands is command so computational instructionis just a opcode.
B. opcode
4 0
3 years ago
Read 2 more answers
What number will be output by the console.log command on line 5?
bagirrra123 [75]

Answer:

The output is 35

Explanation:

Required

Determine the output on line 5

We start by analysing the program line by line.

On line 1: kit = 20

On line 2: roo = 10

On line 3: kit = kit + 5

Substitute 20 for kit.

So, we have

kit = 20 + 5

kit = 25

On line 4:

roo = kit + roo

Substitute values for kit and too

roo = 25 + 10

roo = 35

On line 5: Output roo

So, 35 is displayed as an output

4 0
3 years ago
References inserted initially as footnotes can be converted to endnotes through an option in the software.
Vesna [10]
The answer is A. True
3 0
3 years ago
Read 2 more answers
Which of the following is considered both an input and output peripheral?
larisa [96]
Keyboard
Explaination: it is period
8 0
3 years ago
Which of the following best describes open source software?
sp2606 [1]
What was the options they gave you?
5 0
3 years ago
Read 2 more answers
Other questions:
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Company policies require that all network infrastructure devices send system level information to a centralized server. Which of
    6·1 answer
  • Create a trigger that prevents anychange(insert, update, or delete)to the grade attribute of the takesrelation that would change
    14·1 answer
  • As an experienced networking professional, you are asked to conduct a posture assessment on a local credit union’s network. The
    12·1 answer
  • Life Decisions Cyber Cafe is a cafe with free Internet service and computers that are linked to various online career opportunit
    15·1 answer
  • Need help with this​
    5·1 answer
  • Tribology is a branch of physics concerned with friction in mechanical motion. Knowledge of tribology would be useful working wi
    14·1 answer
  • The most important task in developing a new computer system/app is to: a) choose the most current technologies such as operating
    5·1 answer
  • Write two sentences but each one having either computer in it or technology in it. You can use a word more than once in a senten
    7·2 answers
  • Goals of the project objectives
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!