Share permissions apply __________
a. On the local computer only
b. Over the network only
c. On the local computer and over the network
d. None of the above
B.Share permissions apply only over the network (remotely). Security permissions apply both locally and remotely.
Computer Science & Information Technology
You might also like to view...
The character class \s represents any:
a. whitespace character b. space character c. string character d. non-whitespace character
Computer Science & Information Technology
After defects are found in a software product and reported, what should the next step be?
A. Submission of defects to a defect management system B. Develop fix for defect C. Note defect in the production logs and provide management with an overview of the defect D. Publish information regarding the defect
Computer Science & Information Technology