In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels. What were these two levels? (Select all that apply)
A. File Scan
B. Read Only
C. Full Control
D. Write Only
E. Both B and C
Answer: E
Computer Science & Information Technology
You might also like to view...
If a Web address uses a secure protocol, the address begins with http
Indicate whether the statement is true or false
Computer Science & Information Technology
Lines, arrows, stars, banners, ovals, and rectangles are examples of ________ that are used to illustrate an idea, a process, or a workflow
A) clips B) shapes C) crops D) headers
Computer Science & Information Technology