1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna007 [38]
4 years ago
13

You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need

to be able to view and edit any file in the shared folder.Your team needs to be able to view and edit any file in the shared folder, so you configure advanced sharing to give each team member Full Control share permissions. The team is doing some competitive analysis and connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?
Computers and Technology
1 answer:
horrorfan [7]4 years ago
5 0

Answer:

modify the NTFS permissions on the folder

Explanation:

In order to solve this problem what you need to do is to modify the NTFS permissions on the folder. The NT File System permissions are security measures blocking access to manipulation of files within a directory and affects local users as well as network users. By adjusting the permissions of this within the folder that the members are trying to access then it will give them the ability to modify the files.

You might be interested in
Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
rosijanka [135]

eh I think yes I think. Maybe

6 0
3 years ago
When doing career research online, you always want to make sure you are viewing a reliable source, what factors about the websit
MrMuchimi

Answer:

You want to consider the expertise of the site, if it is a well-known organization, the date and author of the information presented and the site's look.

Explanation:

The factors about the website that you want to consider to make sure you are viewing a reliable source are:

-Expertise of the site: Check if the websites specializes in information related to careers to make sure they have knowledge about the topic.

-Well-known organization: Validate if the organization that manages the website is well establish and is considered reliable.

-Date and author: Look for the date to make sure the information is up to date and avoid information with anonymous authors.

-Site's look: Consider if the website has a professional appearance as that can show that it could be reliable. However, the other factors have to be taken into account.

5 0
4 years ago
Read 2 more answers
Which company is credited with solving a problem by creating a program that could work on all computers?
Ksivusya [100]
It’s Microsoft because it deals with all tech stuff and helps other people out
5 0
4 years ago
PLEASE HELP
svet-max [94.6K]

Answer:

i think its accommodate, because the other two dont look right. correct me if im wrong

7 0
2 years ago
Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
Mnenie [13.5K]

Answer:

Binary file.

Explanation:

                           In this case, the network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transaction. However, the transaction data seems indecipherable. The explanation for this is that the TCP transaction file is a Binary File and because of this the network secuirty analyst is unable to decipher the transaction file.

                           The solution for this is to convert the binary file into text file which is human readable.

3 0
3 years ago
Other questions:
  • The two types of one-time-password tokens are ______ and ______.
    10·2 answers
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • What is the Difference between CUI and GUI
    14·2 answers
  • Does a soda vending machine Give reciepts?<br><br>need for computer science hw
    7·2 answers
  • Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
    15·1 answer
  • Design and implement a GUI application that uses text fields to obtain two integer values (one text field for each value) along
    9·1 answer
  • A user prefers an external monitor, mouse, and keyboard for a laptop. The user does not want to use the built-in screen; however
    5·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • An array can store integers and doubles together.true or false
    14·1 answer
  • The suffix of a web address denotes which type of organization it is affiliated with. For example, an .edu is what type of websi
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!