Which of the following permissions are assigned directly to a file or folder quizlet?

Recommended textbook solutions

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Starting Out with C++ from Control Structures to Objects

8th EditionGodfrey Muganda, Judy Walters, Tony Gaddis

1,294 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Operating System Concepts

9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

489 solutions

Recommended textbook solutions

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

1. From the Show hidden icons area, right‐click the OneDrive icon, and click Settings.

2. When the Microsoft OneDrive dialog box opens, click the Settings tab.

3. If you don't want OneDrive to automatically load when you logon, deselect the Start OneDrive automatically when I sign into to Windows option.

4. Click the Account tab.

5. Click Add a business account.

6. Log on with your Office 365 account credentials (email address and password).

7. When the This is your OneDrive folder page is displayed, click Next.

8. In the page that asks if you want to sync files from your OneDrive, the Sync all files and folders in my OneDrive and Sync only these folders are already selected. Leave the defaults and then click Next.

9. When it says that your OneDrive is ready for you, click Open my OneDrive folder.A File Explorer window opens.

10. Back in the Microsoft OneDrive dialog box, click OK.

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?
•Share permission (Share tab)-Sales group: Full Control
•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Write

a. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.
b. Members of the Sales group will be able to edit content and delete files.
c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.
d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (26)

b. For drives formatted with the FAT/FAT32 file system, share permissions are the only option available.
c. They determine the type of access that others will have to the folder when they connect to it over the network

Which of the following statements are true concerning share permissions? (Choose all that apply)

a. For drives formatted with the NTFS file system, share permissions are not available.
b. For drives formatted with the FAT/FAT32 file system, share permissions are the only option available.
c. They determine the type of access that others will have to the folder when they connect to it over the network
d. They apply whether the user attempts to access them over the network or locally

b. Members of the Sales group will be able to edit content and delete files.

Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network?
•Share permission (Share tab)-Sales group: Full Control
•NTFS permission (Security tab)-Sales group: Read & Execute, Modify, Write

a. Members of the Sales group will be able to take ownership of files and edit content, but not delete files.
b. Members of the Sales group will be able to edit content and delete files.
c. Members of the Sales group will be able to take ownership of files, edit content, and change NTFS permissions.
d. Members of the Sales group will be able to edit content, delete files, and change NTFS permissions.

b. Select one of your shared libraries in File Explorer and click Share in the toolbar.

Which of the following steps begins the process of modifying the default homegroup sharing configuration?

a. Open the Computer Management console and select the HomeGroup node.
b. Select one of your shared libraries in File Explorer and click Share in the toolbar.
c. Open the HomeGroup app from Control Panel.
d. Open the local Group Policy Editor console using gpedit.msc.

a. Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings.

Which of the following best describes how to turn on Public folder sharing?

a. Enable the feature by opening the Network and Sharing Center and then enabling the appropriate feature in Advanced Sharing Settings.
b. Install the Public sharing feature.
c. Open Computer Management, access the Sharing tab, and then enable the Public folder.
d. Turn off the Public folder blocking in Windows Firewall.

a. Music
c. Documents

Which of the following are default libraries included in a user profile? (Choose all that apply)

a. Music
b. Movies
c. Documents
d. Desktop

b. Print device

The hardware that actually produces hard-copy documents is called a _____.

a. Printer
b. Print device
c. Print server
d. Print driver

a. Printer

In Windows, a _________ is the software interface through which a computer communicates with a print device.

a. Printer
b. Printing device
c. Print device
d. Print driver

c. They are essentially the same physically. Logically, the print jobs are handled differently

Which of the following statements best describes the differences, physically and logically, between the two printing configurations: network-attached printing and network-attached printer sharing?

a. They are essentially the same, both logically and physically.
b. They are essentially the same logically. Physically, the printers are made available differently.
c. They are essentially the same physically. Logically, the print jobs are handled differently.
d. These two printing configurations are not alike physically or logically.

b. Take ownership

Which of the following is not a basic printer permission?

a. Print
b. Take ownership
c. Manage this printer
d. Manage documents

c. Manage documents

Which basic printer permission should be granted to a user to be able to pause, resume, restart, and cancel his own print jobs as well as the print jobs of others?

a. Print
b. Manage this printer
c. Manage documents
d. Manage print jobs

d. Print device

Which of the following printer-related terms refers to the actual physical hardware that prints data?

a. Print queue
b. Print server
c. Printer
d. Print device

a. Network-attached printer sharing

With one of the following network printing configurations, the print devices do not need to be attached to computers; instead, they can be connected directly to the network. Identify the network printing configuration described.

a. Network-attached printer sharing
b. Network-attached printing
c. Locally attached printer sharing
d. Direct printing

c. Locally attached printer sharing

Which printing configuration makes the computer with the locally attached print device function as a print server?

a. Network-attached printer sharing
b. Network-attached printing
c. Locally attached printer sharing
d. Direct printing

d. Public folder sharing places all shared files in a single location.

Which of the following statements is true of public folder sharing?

a. Public folder sharing shares files from any location.
b. Public folder sharing shares files from their original locations.
c. Public folder sharing shares files from their default library locations.
d. Public folder sharing places all shared files in a single location.

c. Homegroup sharing

For users at home, which file sharing is most likely the simplest to set up and use?

a. Any folder sharing
b. Public folder sharing
c. Homegroup sharing
d. None of the above

b. Fetching

Which of the following terms is defined as the process in which OneDrive connects to a remote computer to obtain a file that was not previously included in the sync folder?

a. Resyncing
b. Fetching
c. Pulling
d. Whisking

b. Access

OneDrive includes a light version of selected Microsoft Office applications for the creation and editing of documents. Which Office application is not found in OneDrive?

a. OneNote
b. Access
c. Excel
d. PowerPoint

a. Send email
b. Post to Facebook
c. Get a link

When sharing documents in OneDrive, which options are available to choose from? (Choose all that apply)

a. Send email
b. Post to Facebook
c. Get a link
d. Post to OneDrive

b. Fetching

When using the OneDrive desktop app, which of the following terms is described as gaining remote access to any file on a computer?

a. Pulling
b. Fetching
c. Uploading
d. Snagging

a. explicit

Which permissions are assigned directly to a file or folder?

a. explicit
b. inherited
c. encompassing
d. overriding

d. Write

Which of the following is the minimum permission needed to change the attributes of a file?

a. Full Control
b. Modify
c. Read & Execute
d. Write

a. Full Control

Which of the following is the minimum permission needed to take ownership of a file or folder?

a. Full Control
b. Modify
c. Read & Execute
d. Write

b. Explicit Deny Full Control

Which permission always wins out?

a. Explicit Allow Full Control
b. Explicit Deny Full Control
c. Inherited Allow Full Control
d. Inherited Deny Full Control

b. Disk quotas

Which Windows feature allows an administrator to control the amount of disk space that is made available to each user?

a. Primary partitions
b. Disk quotas
c. NTFS volumes
d. MBR disks

a. The limits will only apply to users who have never written data to the volumes in scope.

When configuring disk quotas using Group Policy, which of the following must administrators be aware of when configuring the default and warning levels in their quotas?

a. The limits will only apply to users who have never written data to the volumes in scope.
b. The limits will retroactively apply to all users who have written data to the volumes in scope.
c. The limits will be applied as soft quotas to all users who have written data to the volumes in scope.
d. The limits will not be applied to any users if the volume has any data already written on it.

c. Quotas apply to all users, including administrators.

When implementing disk quotas, there are several requirements that must be met. Which of the following items is not one of those requirements for implementing disk quotas?

a. Users are charged only for the files they own.
b. Quotas must be enabled separately on each volume and are applied on a per-user basis.
c. Quotas apply to all users, including administrators.
d. Quotas can be configured only on NTFS volumes.

Sets with similar terms

Windows 10 - Lesson 8 (multiple choice set)

35 terms

NMILLIGAN00

Supporting Windows OS Exam 2

80 terms

charles_fagans

Chapter 9 & 10

60 terms

adebaugh

Sets found in the same folder

IN130 Module 10 Quiz

5 terms

Clonetrooper12

Config Windows 8

293 terms

MissJacquie911

70-697 - Configuring Windows Devices - Threat Resi…

22 terms

S_Sheff

IN130 Module 10 Quiz

10 terms

Clonetrooper12

Other sets by this creator

ile chapter 1-3

53 terms

alldaystudyfun

DCO

41 terms

alldaystudyfun

review

50 terms

alldaystudyfun

Windows 10

9 terms

alldaystudyfun

Verified questions

computer science

Write a function that searches a numeric array for a specified value. The function should return the subscript of the element containing the value if it is found in the array. If the value is not found, the function should throw an exception.

Verified answer

computer science

List three examples of deadlocks that are not related to a computer-system environment.

Verified answer

computer science

Let $\Sigma=\{\mathrm{a}, \mathrm{b}\}$. Give a CFG generating the language of strings with twice as many a’s as b’s. Prove that your grammar is correct.

Verified answer

computer science

Write a program to print the following pattern. U N U N I V U N I V E R U N I V E R S I U N I V E R S I T Y U N I V E R S I U N I V E R U N I V U N

Verified answer

Recommended textbook solutions

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

726 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Starting Out with Python

4th EditionTony Gaddis

629 solutions

Other Quizlet sets

Series 7 Final Review 2

72 terms

ashley_heil

CompTIA A+ Exam 220-1001 Practice Test 17

25 terms

Bryan_Ortiz81

Module 5: Money Purchase Pension Plans

27 terms

sarah_wester3

Design Tech Final Exam

18 terms

dsmstiger101

Related questions

QUESTION

Equally sized page chunks don't match how programming think of a process -- Programmers think of a process's memory space being divided into what 4 regions?

3 answers

QUESTION

Black-listing a service prevents it from running at boot up.

7 answers

QUESTION

Would you use a standard release or a rolling release distribution for an enterprise Linux server installation?

4 answers

QUESTION

The seek time is the amount of time it takes for the heads of a disk to reach a particular cylinder.

9 answers

What type of permissions are assigned directly to a file or folder?

Permissions assigned directly to a particular file or folder (explicit permissions) take precedence over permissions inherited from a parent folder (inherited permissions).

Which of the following are permissions that can be granted to a file?

There are six standard permission types which apply to files and folders in Windows:.
Full Control..
Modify..
Read & Execute..
List Folder Contents..
Write..

Which of the following are permissions that NTFS provides for assignment to a folder or file?

Read, Change, and Full Control are shared folder permissions. Write and Modify are NTFS permissions.

What are two types of permissions that you can assign to files and folders on an NTFS file system?

There are both basic and advanced NTFS permissions. You can set each of the permissions to “Allow” or “Deny” to control access to NTFS objects.

Chủ đề