Share permissions apply __________

a. On the local computer only
b. Over the network only
c. On the local computer and over the network
d. None of the above

B.Share permissions apply only over the network (remotely). Security permissions apply both locally and remotely.

Computer Science & Information Technology

You might also like to view...

The character class \s represents any:

a. whitespace character b. space character c. string character d. non-whitespace character

Computer Science & Information Technology

After defects are found in a software product and reported, what should the next step be?    

A. Submission of defects to a defect management system B. Develop fix for defect C. Note defect in the production logs and provide management with an overview of the defect D. Publish information regarding the defect

Computer Science & Information Technology