Computers and Technology

Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared folder on his computer; hence, there is a risk of other people accessing the files. Which of the following steps should Rony take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user?A. He should designate all the files in the shared folder as execute-only.
B. He should designate all the files in the shared folder as author only by using the chown command.
C. He should designate all the files in the shared folder as client only by using the chgrp command.
D. He should designate all the files in the shared folder as read-only.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 06:00, ashleyd198308
Respond to the following in three to five sentences. select the workplace skill, habit, or attitude described in this chapter that you believe is most important for being a successful employee.
Answers: 1
image
Computers and Technology, 23.06.2019 15:00, ryleerose255
Idon’t understand the double8 coding problem. it is java
Answers: 1
image
Computers and Technology, 24.06.2019 01:30, Cinders13
How can you make your column headings stand out?
Answers: 1
image
Computers and Technology, 24.06.2019 13:20, sanaiajohnson56
In the insert table dialog box, you select the checkbox to create the first row as the header of the table.
Answers: 3
Do you know the correct answer?
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony pl...

Questions in other subjects:

Konu
History, 15.01.2021 01:00
Konu
Mathematics, 15.01.2021 01:00
Konu
Social Studies, 15.01.2021 01:00
Konu
English, 15.01.2021 01:00