Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Starting Out with C++ from Control Structures to Objects
8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis
1,294 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Operating System Concepts
9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Recommended textbook solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Fundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
1. From the Show hidden icons area, right‐click the OneDrive icon, and click Settings.
2. When the Microsoft OneDrive dialog box opens, click the Settings tab.
3. If you don't want OneDrive to automatically load when you logon, deselect the Start OneDrive automatically when I sign into to Windows option.
4. Click the Account tab.
5. Click Add a business account.
6. Log on with your Office 365 account credentials (email address and password).
7. When the This is your OneDrive folder page is displayed, click Next.
8. In the page that asks if you want to sync files from your OneDrive, the Sync all files and folders in my OneDrive and Sync only these folders are already selected. Leave the defaults and then click Next.
9. When it says that your OneDrive is ready for you, click Open my OneDrive folder.A File Explorer window opens.
10. Back in the Microsoft OneDrive dialog box, click OK.
Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?
•Share permission (Share tab)-Sales group: Full Control
•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Write
a. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.
b. Members of the Sales group will be able to edit content and delete files.
c.
Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.
d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (26)
b. For drives formatted with the FAT/FAT32 file system, share permissions are the only option available.
c. They determine the type of access that others will have to the folder when they connect to it over the network
Which of the following statements are true concerning share permissions? (Choose all that apply)
a. For drives formatted with the NTFS file system, share permissions are not available.
b. For drives formatted with the FAT/FAT32 file system, share permissions are the only option available.
c. They determine the type of access that others will have to the folder when they connect to it over the network
d. They apply whether the user attempts to access them over the network or locally
b. Members of the Sales group will be able to edit content and delete files.
Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?
•Share permission (Share tab)-Sales group: Full Control
•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Write
a. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.
b. Members of
the Sales group will be able to edit content and delete files.
c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.
d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.
b. Select one of your shared libraries in File Explorer and click Share in the toolbar.
Which of the following steps begins the process of modifying the default homegroup sharing configuration?
a. Open the Computer Management console and select the HomeGroup node.
b. Select one of your shared libraries in File Explorer and click Share in the toolbar.
c. Open the HomeGroup app from Control Panel.
d. Open the local Group Policy Editor console using gpedit.msc.
a. Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings.
Which of the following best describes how to turn on Public folder sharing?
a. Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings.
b. Install the Public sharing feature.
c. Open Computer Management, access the Sharing tab, and then enable the Public folder.
d. Turn off the Public folder blocking in Windows Firewall.
a. Music
c. Documents
Which of the following are default libraries included in a user profile? (Choose all that apply)
a. Music
b. Movies
c. Documents
d. Desktop
b. Print device
The hardware that actually produces hard-copy documents is called a _____.
a. Printer
b. Print device
c. Print server
d. Print
driver
a. Printer
In Windows, a _________ is the software interface through which a computer communicates with a print device.
a. Printer
b. Printing device
c. Print device
d. Print driver
c. They are essentially the same physically. Logically, the print jobs are handled differently
Which of the following statements best describes the differences, physically and logically, between the two printing configurations: network-attached printing and network-attached printer sharing?
a. They are essentially the same, both logically and physically.
b. They are essentially the same logically. Physically, the printers are made available differently.
c. They are essentially the same physically. Logically, the print jobs are handled differently.
d. These two printing configurations are not alike
physically or logically.
b. Take ownership
Which of the following is not a basic printer permission?
a. Print
b. Take ownership
c. Manage this printer
d. Manage documents
c. Manage documents
Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs as well as the print jobs of others?
a. Print
b. Manage this printer
c. Manage documents
d. Manage print jobs
d. Print device
Which of the following printer-related terms refers to the actual physical hardware that prints data?
a. Print queue
b. Print server
c. Printer
d. Print device
a. Network-attached printer sharing
With one of the following network printing configurations, the print devices do not need to be attached to computers; instead, they can be connected directly to the network. Identify the network printing configuration described.
a. Network-attached printer sharing
b. Network-attached printing
c. Locally attached printer sharing
d. Direct printing
c. Locally attached printer sharing
Which printing configuration makes the computer with the locally attached print device function as a print server?
a. Network-attached printer sharing
b. Network-attached printing
c. Locally attached printer sharing
d. Direct printing
d. Public folder sharing places all shared files in a single location.
Which of the following statements is true of public folder sharing?
a. Public folder sharing shares files from any location.
b. Public folder sharing shares files from their original locations.
c. Public folder sharing shares files from their default library locations.
d. Public folder sharing places all shared files in a single location.
c. Homegroup sharing
For users at home, which file sharing is most likely the simplest to set up and use?
a. Any folder sharing
b. Public folder sharing
c. Homegroup sharing
d. None of the above
b. Fetching
Which of the following terms is defined as the process in which OneDrive connects to a remote computer to obtain a file that was not previously included in the sync folder?
a. Resyncing
b. Fetching
c. Pulling
d. Whisking
b. Access
OneDrive includes a light version of selected Microsoft Office applications for the creation and editing of documents. Which Office application is not found in OneDrive?
a. OneNote
b. Access
c. Excel
d. PowerPoint
a. Send email
b. Post to Facebook
c. Get a link
When sharing documents in OneDrive, which options are available to choose from? (Choose all that apply)
a. Send email
b. Post to Facebook
c. Get a link
d. Post to OneDrive
b. Fetching
When using the OneDrive desktop app, which of the following terms is described as gaining remote access to any file on a computer?
a. Pulling
b. Fetching
c. Uploading
d. Snagging
a. explicit
Which permissions are assigned directly to a file or folder?
a. explicit
b. inherited
c. encompassing
d. overriding
d. Write
Which of the following is the minimum permission needed to change the attributes of a file?
a. Full Control
b. Modify
c. Read & Execute
d. Write
a. Full Control
Which of the following is the minimum permission needed to take ownership of a file or folder?
a. Full Control
b. Modify
c. Read & Execute
d. Write
b. Explicit Deny Full Control
Which permission always wins out?
a. Explicit Allow Full Control
b. Explicit Deny Full Control
c. Inherited Allow Full Control
d. Inherited Deny Full Control
b. Disk quotas
Which Windows feature allows an administrator to control the amount of disk space that is made available to each user?
a. Primary partitions
b. Disk quotas
c. NTFS volumes
d. MBR disks
a. The limits will only apply to users who have never written data to the volumes in scope.
When configuring disk quotas using Group Policy, which of the following must administrators be aware of when configuring the default and warning levels in their quotas?
a. The limits will only apply to users who have never written data to the volumes in scope.
b. The limits will retroactively apply to all users who have written data to the volumes in scope.
c. The limits will be applied as soft quotas to all users who have written data to the volumes in scope.
d. The limits will not be applied to any users if the volume has any data already written on it.
c. Quotas apply to all users, including administrators.
When implementing disk quotas, there are several requirements that must be met. Which of the following items is not one of those requirements for implementing disk quotas?
a. Users are charged only for the files they own.
b. Quotas must be enabled separately on each volume and are applied on a per-user basis.
c. Quotas apply to all users, including
administrators.
d. Quotas can be configured only on NTFS volumes.
Windows 10 - Lesson 8 (multiple choice set)
35 terms
NMILLIGAN00
Supporting Windows OS Exam 2
80 terms
charles_fagans
Chapter 9 & 10
60 terms
adebaugh
Sets found in the same folderIN130 Module 10 Quiz
5 terms
Clonetrooper12
Config Windows 8
293 terms
MissJacquie911
70-697 - Configuring Windows Devices - Threat Resi…
22 terms
S_Sheff
IN130 Module 10 Quiz
10 terms
Clonetrooper12
Other sets by this creatorile chapter 1-3
53 terms
alldaystudyfun
DCO
41 terms
alldaystudyfun
review
50 terms
alldaystudyfun
Windows 10
9 terms
alldaystudyfun
Verified questions
computer science
Write a function that searches a numeric array for a specified value. The function should return the subscript of the element containing the value if it is found in the array. If the value is not found, the function should throw an exception.
Verified answer
computer science
List three examples of deadlocks that are not related to a computer-system environment.
Verified answer
computer science
Let $\Sigma=\{\mathrm{a}, \mathrm{b}\}$. Give a CFG generating the language of strings with twice as many a’s as b’s. Prove that your grammar is correct.
Verified answer
computer science
Write a program to print the following pattern. U N U N I V U N I V E R U N I V E R S I U N I V E R S I T Y U N I V E R S I U N I V E R U N I V U N
Verified answer
Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Starting Out with Python
4th EditionTony Gaddis
629 solutions
Other Quizlet setsSeries 7 Final Review 2
72 terms
ashley_heil
CompTIA A+ Exam 220-1001 Practice Test 17
25 terms
Bryan_Ortiz81
Module 5: Money Purchase Pension Plans
27 terms
sarah_wester3
Design Tech Final Exam
18 terms
dsmstiger101
Related questionsQUESTION
Equally sized page chunks don't match how programming think of a process -- Programmers think of a process's memory space being divided into what 4 regions?
3 answers
QUESTION
Black-listing a service prevents it from running at boot up.
7 answers
QUESTION
Would you use a standard release or a rolling release distribution for an enterprise Linux server installation?
4 answers
QUESTION
The seek time is the amount of time it takes for the heads of a disk to reach a particular cylinder.
9 answers