1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
4 years ago
13

You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need

to be able to view and edit any file in the shared folder.Your team needs to be able to view and edit any file in the shared folder, so you configure advanced sharing to give each team member Full Control share permissions. The team is doing some competitive analysis and connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?
Computers and Technology
1 answer:
horrorfan [7]4 years ago
5 0

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

You might be interested in
Evaluate the following expressions.
Alenkinab [10]

Answer:

In this question all the expression follow the BOD MAS rule.

Explanation:

The explanation of the given expression can be given as:

In option (a) first we add two number then we subtract.

Answer=31

In option (b) we divide the value (/). it give the Quotient

Answer=1

In option (c) we first divide the value (/) that give the Quotient. then multiply the value and then subtract it.

Answer=-6

In option (d) we first modules the value (%) that give the remainder.Then  subtract it.

Answer=6

In option (e) we divide the value (/). it give the Quotient

Answer=9.2

In option (f) first we done modules then divide and then addition and at the last subtract.

Answer=12

In option (h) first we done modules, second divide, third multiply then addition and at the last subtract.

Answer=-42

In option (i) first solve bracket the divide and multiply.  

Answer=0

In option (j) first divide, second multiply then addition.

Answer=21.75

4 0
4 years ago
I don't have a split screen in my Samsung Galaxy A02 why???​
weqwewe [10]

Answer:

YOU CAN open

Turn on Multi Window

1. Select the Recent apps key. 2. Select the desired app icon, then select Open in split screen view.

Explanation:

PLEASE MARK ME BRAINLIEST IF MY ANSWER IS CORRECT

6 0
2 years ago
What method does a GSM network use to separate data on a channel?
Sergeu [11.5K]

Answer: TDMA(Time division multiple access)

Explanation: Time-division multiple access is the method that is used by GSM(Global system for mobile communication) usually for the separation process of the data.It is a way in which a same frequency is shared by different time slots of signal.It has high flexibility and so thus is helpful for the GSM network and provides easy services of division.It divides the data according to the time period slots in a GSM network.

4 0
3 years ago
Write a function definition for a function which takes one parameter and returns twice that parameter
dezoksy [38]

Answer:

The function in python is as follows:

def twice(num):

   return 2 * num

Explanation:

This defines the function; The function receives num as its parameter

def twice(num):

This returns twice of num

   return 2 * num

8 0
3 years ago
You can use automatic link-checking software to identify invalid hyperlinks. if you find invalid links, what should you do next?
Solnce55 [7]
Correct the href value of the appropriate anchor.
7 0
3 years ago
Other questions:
  • You have a website that sells widgets, and you have a category page specifically for blue widgets. After some extensive outreach
    5·1 answer
  • Which of the following keys on a keyboard allows you to select multiple cells located in different parts of your worksheet?
    13·2 answers
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • Does anyone know the answer to this question
    9·1 answer
  • This type of software is used for creating slid shows.
    8·1 answer
  • Write a function strlen_recursive which accepts a pointer to a string and recursively counts the number of characters in the pro
    6·1 answer
  • What is the range for copper tape
    15·1 answer
  • Write the simulate method, which simulates the frog attempting to hop in a straight line to a goal from the frog's starting posi
    10·1 answer
  • You need to implement a class that represents the state of a room or game section. The class will contain a room_id, a descripti
    15·1 answer
  • i was wondering if anybody would have a season 1 or 2 or 3 Fortnight account they never use and was gonna ask if i could play on
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!