subject

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. He should designate all the files in the shared folder as execute-only.
B. He should designate all the files in the shared folder as author only by using the chown command.
C. He should designate all the files in the shared folder as client only by using the chgrp command.
D. He should designate all the files in the shared folder as read-only.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:00
How is the number 110 written when expanded out to place values in the base 2 (binary) number system? options: 2 x 4 + 3 x 2 + 4 x 1 1 x 2 + 1 x 2 + 0 x 2 1 x 100 + 1 x 10 + 0 x 1 1 x 4 + 1 x 2 + 0 x 1
Answers: 1
question
Computers and Technology, 22.06.2019 23:30
Which text format is this, "the text is transcribed exactly as it sounds and includes all the utterances of the speakers. "?
Answers: 2
question
Computers and Technology, 23.06.2019 07:00
What are three software programs for mobile computing?
Answers: 1
question
Computers and Technology, 23.06.2019 09:10
(328 inc. 448 ind. 480 in25. john has a collection of toy cars. he has 2 red cars, 4 blue cars, 4 black cars, and 6 yellowcars. what is the ratio of red cars to yellow cars? a. 1: 2b. 1: 3c. 1: 626. the net of a right triangular prism is shown below.
Answers: 2
You know the right answer?
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony pl...
Questions
question
Mathematics, 11.05.2021 18:20
question
Mathematics, 11.05.2021 18:20
question
Mathematics, 11.05.2021 18:20
Questions on the website: 13722361