In early Windows systems there were no user accounts, and permissions on a share could be set to one of two levels. What were these two levels? (Select all that apply)

A. File Scan
B. Read Only
C. Full Control
D. Write Only
E. Both B and C

Answer: E

Computer Science & Information Technology

You might also like to view...

If a Web address uses a secure protocol, the address begins with http

Indicate whether the statement is true or false

Computer Science & Information Technology

Lines, arrows, stars, banners, ovals, and rectangles are examples of ________ that are used to illustrate an idea, a process, or a workflow

A) clips B) shapes C) crops D) headers

Computer Science & Information Technology