Your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures You create a new child folder under the C:\Documents folder. What term describes the permissions the new folder automatically attains from the C:\Documents folder?

Answers

Answer 1

Answer:

Inherited Permissions.

Explanation:

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass (child) can inherit the variables or methods of the superclass (parent).

Basically, all instance variables that have been used or declared in any superclass (parent folder) would be present in its subclass object (child folder).

In this scenario, your computer has a single HDD formatted with NTFS with the following data folders: C:\Documents C:\Pictures. You create a new child folder under the C:\Documents folder. Thus, the term which best describes the permissions the new folder automatically attains from the C:\Documents folder is known as inherited permissions.

An inherited permission can be defined as all the permissions or rights that are ascribed or assigned to an object due to the fact that it is a subclass (child) of a superclass (parent) object.


Related Questions

Which filter gives a “squeezed” effect to an image?

Answers

Explanation:

When using the pinch filter, you simply select a percentage from -100 to 100 to pinch or squeeze your image. The Pinch filter squeezes a selection or layer inward or outward.

Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games?

Answers

Answer:

you could say that you would  put watermarks in some frames so you can prove u made it yourself

Explanation:

Writers develop plot arcs and dialogue, artists construct 2D and 3D models, composers produce soundtracks, programmers choreograph all the moving parts into a cohesive universe. The artwork is an eclectic mix. The audience and players have a first-person perspective while playing the games.

What personal creativity and ideas for video games?

Playing video games can increase your reaction times and hand-eye coordination, two skills that are essential to creativity. Game design is the process of using creativity and design to produce a game for entertainment or educational purposes. It is a part of the broader field of creating video games.

Post-Release Assistance. This is a crucial element in the various stages of game development. Most projects fail because this important component is overlooked.

Therefore, You may claim that you would include watermarks in select frames to demonstrate your authorship.

Learn more about creativity here:

https://brainly.com/question/17081416

#SPJ2

Please help me figer out hot to change the letter to a C

Answers

Answer:I

I do not know sorry, but I will try and see if I can sear how to do it..

Explanation:

Answer:

find where it says d and delete it and add a c

Explanation:

but if you reload it will go back to normal

Help Me

What are the four types of graphic models?

Answers

Answer:

-Bayesian network

-Naive Bayes classifier where we use a tree with a single root

-Dependency network where cycles are allowed

-Tree-augmented classifier or TAN model

Explanation:

Bananas are curved because they grow towards the sun ☀️

Answers

Answer:

Yes bc nutrients twords the sun!

Explanation:

Answer:

yes?

Explanation:

Project: big research project

Answers

Answer:

Where is the question?

Explanation:

Cool, where is the question. If u want us to answer ur gonna have to give a question or picture lol

The ____ view displays the worksheet the way it will look when it prints.

A) Normal

B) Page layout

C) Break

D) Page settings

Answers

I think you are looking for page layout. You can typically see it before printing out a page
page layout should be correct

14. The term used to describe an attribute that can function like a primary key is a?​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

In the relationship model of database  a primary key is a specific choice of a minimal set of attributes that uniquely specific a tuple in a relation.Informally  a primary key is which attribute and in simple cases are simple a single attribute.More  formally a primary key is a choice of candidate key any other candidate key is an alternate key.

A primary key may consists of real word observable in which way it is called natural key,while an attribute created to function as a key and not use for identification outside the database is called a surrogate key.For example for a database of people time and location of birth could be a natural key.National identification number is another example of an attribute that may be used as an natural key.

Have any of you guys had to deal with not seeing profile pictures or not being able to open PDFs on this website? Is it just me or an overall glitch of the Brainly system?

Answers

Me too man me too yeah

hellllllllllp i need hlel dad

Answers

miss girl whatttttttttt

WILL GIVE BRAINLIEST!!!!!!!!!
The Port of New Orleans is not considered an intermodal port.


True

False

Answers

Answer:

True

Explanation:

Effective nonverbal communication can cause tension.

True or False

Answers

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

Answer:

False

Explanation:

Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?

for
else
else-if
while

Answers

Answer: D

Explanation:

Answer:

im pretty sure its for

Explanation:

Question #3
Which techniques are useful when evaluating a program? Select 4 options.
O user experience testing
print debugging
defuncto debugging
o test cases
automated testing

Answers

Answer:

user experience testingtest casesautomated testingprint debugging

Explanation:

The techniques which are useful when evaluating a program are user experience testing, test cases, automated testing and print debugging. Thus, option 1st, 2nd, 4th and 5th are correct.

What is Programming?

Programming is the process of carrying out a certain computation, often through creating and constructing an executable computer program. Programming activities include analysis, algorithm generation, algorithm accuracy and resource use assessment, and algorithm implementation.

The process of producing a set of instructions that tells a computer how to complete a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Goal-based, process-based, and outcomes-based assessment methods are the three basic types of evaluation methodologies.

User experience testing, test cases, automated testing, and print debugging are always that may be used to evaluate an application. As a result, options 1, 2, 4, and 5 are correct.

Learn more about programming here:

https://brainly.com/question/11023419

#SPJ2

overview of your opinion of Digital Access

Answers

Answer:

What type of digital access I can further answer if you tell me

Explanation:

I think its ok sometimes, but other times its just stupi.d

E-mail is a special form of business communication.
is the set of rules that governs communication using e-mail.

Answers

Answer:

 Your answer would be 'Netiquette ' .

Hope this helped you out :D

what are the secure methods when transmitting data?

Answers

Answer:

Many secure transmission methods require a type of encryption. The most common email encryption is called PKI.

Explanation:

Imma say something random...



like LOL
who ever likes Gacha games with tik tok
go follow "ashten.ace" if ya want UwU
he's pretty good in my opinion


okay thx BYEEEEEEEEEEE <3

Answers

Answer:

Uh I don't understand what you said.

Explanation:

N/A

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center ___________ layer.

Answers

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.

12) --- In-Excel, Columns-are-labelled as
a) +A, B, C, etc
b)+1,2,3.etc
C-A1, A2, etc. 1
d)+ $A$1, $A$2. etc. I​

Answers

Answer:

C-A1, A2, etc.

I need help building a computer what are some good parts?

Answers

Answer:

glass for the screen, wires to connect everything, something for the buttons, you also might need a screen protector so it can help your eyes because the screen will be bright, use something that will help the computer not fall off the desk, you also need to make some space at the bottom of the computer for the sound to go through, you need to make some more space at the either side you want the charger for it to always have power so you can always use it, and memory space, if you want to you can add a little space at the side for your earbuds.

Explanation:

you need to have your parents help you so you don't get hurt.

You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. A different set of observations might result in a larger portion of male drivers being on the phone. Your program compared an equal number of male and female drivers. It is important to test your program with a small enough set of data that you can know what the result should be. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. You could modify the program to allow the user to enter the data.

Answers

Answer:

1,3,4,5 (It's not the one that starts with your program)

Explanation:

Edge 2020

A driver is essentially a piece of software that enables communication between an operating system and a device. Consider the scenario where a device needs to read some data from an application.

What program to compare the portion of drivers?

Type “device management” into the taskbar's search box, then click on Device Manager. To see the names of the devices, choose a category, then right-click (or press and hold) the item you want to update. Decide Automatically check for driver software updates.

A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, video card, printer, or keyboard.

Therefore, The device's collection of specific commands must be thoroughly understood by the driver.

Learn more about program here:

https://brainly.com/question/3224396

#SPJ2

You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?

Answers

Answer:

Least privilege model.

Explanation:

In Computer science, the least privilege model can be defined as an information security model which typically involves giving a user the minimum level of permission, access or rights required to perform his or her duties, tasks or job functions.

In this scenario, you want to ensure that a project team can only access the files specifically created for them, and no other files. Thus, the term which is most correct in describing this configuration is least privilege model.

Basically, the least privilege model ensures a particular user is only given the barest minimum of rights, permission or access needed to perform a task.

How do science, mathematics, and technology each influence engineering

Answers

Answer:

In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!

Explanation:

Answer:

Math: By using numbers and some problems are really hard and they like solving them makes some kids want to do engineering

Science: By do expirments and getting kids excited about doing something like engineering

Technolgy: I think this speaks for itself by saying that if you like computers and dealing with technogly you would want to do engineering

Explanation:

Need help asapppppppppp

Answers

Answer:

artistic

Explanation:

because being it is considered a art

Answer:

daddy

Explanation:

A typical day in programming and software development would involve

monitoring network connections.

figuring out why a computer will not turn on.

using an image-editing program.

writing code for a software program.

Answers

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

What is wrong with the following code?
numl = int (input("Enter a number: "))
numz = int (input("Enter a number: "D)
num3 = int (input("Enter a number: "))
print ("The average is: + (numl + num2 + num3/3)
The last line should be print ("The average is: (numl + num2 + num/3)
The variables should be lnum, 2num, Bnum
It needs a into command
It needs a stro command

Answers

Code:

numl = int (input("Enter a number: "))

num2 = int (input("Enter a number: "))

num3 = int (input("Enter a number: "))

print ("The average is:" + ((numl + num2 + num3)/3))

Answer:

It needs a str command

Explanation:

Given

The above code

Required

Determine and correct the error

At the last line of the code, there is an attempt to print the average of the three numbers.

However, this will return an error because:

In order to print the literal "The average is:" and the numeric value of (numl + num2 + num3)/3, a str command is needed.

This converts (numl + num2 + num3)/3 to a literal and then print without error.

So, the correct instruction is:

print ("The average is:" + str((numl + num2 + num3)/3))

can someone help me with Exercise 7.1.5: Initials on codehs.

Answers

7.1.5 Codehs:

Write a program that gets a string containing a person's first, middle and last names, and then display their first, middle and last initials. For example, if the user enters John William Smith, the program should display J. W. S. [In python]

Answer:

first = input("First name: ")

middle = input("Middle name: ")

last = input("Last name: ")

print(first[0]+". "+middle[0]+". "+last[0]+".")

Explanation:

This line prompts user for first name

first = input("First name: ")

This line prompts user for middle name

middle = input("Middle name: ")

This line prompts user for last name

last = input("Last name: ")

This line prints the name initials

print(first[0]+". "+middle[0]+". "+last[0]+".")

Answer:

def initials(string, new_string):

   return string[0] + "." + new_string[0] + "."

print(initials("Your", "Name"))

Explanation:

Tennis players are not allowed to swear when they are playing in Wimbledon

Answers

Answer:

True

Explanation:

Answer:

Yes

Explanation:

Other Questions
A rhyme can only be used for concepts learned in Science class.Please select the best answer from the choices providedTF Nikki has $1100 and spends $35 per week. Mich has $520 and saves $55 per week. In about how many weeks, will Nikki and Micah have thesame amount of money?(round to the nearest whole number) How many moles of FeCI3 are present in 345.0 g FeCI3 When the supplies are endless, prices tend to O A. fluctuate O B. stay the same O C. decrease O D. increase how much progress did America make toward racial equality during Reconstruction ? The Baking Club is selling pies during lunch to raise money to go to baking competition. Each pie is cut into 8 slices. The club made a certain amount of pies, and the cafeteria staff donated 2 pies. If there were a total of 80 pie pieces to sell, how many pies did the Baking Club make? Can you help me by the definition of a timeline about the events in Europe while the American continent was being discovered. Gahder ne demek .Gahder ile bir cmle yazarsanz mutlu olurum acil ltfen cevaplayn. How long have coronaviruses existed? PLEASE HELP 10 BRAINLY POINTSFind SA for this triangular prism: DON'T FORGET TO SHOW ALL WORK What are at least 2 examples of how individual Rights impact our social, political, and economic systems? Provide 2 examples for each system. The sum of two numbers is 30 and theirdifference is 12. Find the two numbers.The first step is to set up the problem as:X+Y= -12X+Y= 30A) TrueB) False 1. What are at least 3 effects of the oceanic plate/continental plate convergent boundary? 2. Where can you find an example of this type of convergent boundary? Which country, continent, or ocean? GIVING BRAINLIEST Tom knows when he clicks the "Send" key his life will change forever.A.metaphorB.idiomC.personificationD.onomatopoeia The side lengths of a triangle are 6, 8, and 12. Is this a right triangle? Question 3 of 5Which statement describes climate and not weather?O A. Seattle usually gets a lot of rain in DecemberB. It is raining very hard today in Seattle.O C. Last week in Seattle, it rained three inches.D. Some low-pressure systems lead to rain.SUBMIT The relationship between the elapsed time t, in days, since the mass of the sample was initially measured, and its mass, M(t), in grams, is modeled by the following function:M(t)=900(8/27)^tComplete the following sentence about the rate of change of the sample. Round your answer to two decimal places.The sample loses 1/3 of its mass every ___ days. State, district, and appeals courts are called inferior or lower courts because they are not highly thought of by U.S. citizens. A. false B. true Please help making brainliest if correct 1. Patrick and Shelby are playing a game. They toss a fair six-sided number cube, numbered 1 through 6, and spin a spinner that is divided into 2 equal regions, one colored red and one colored blue. Which list represents all possible outcomes of tossing the number cube and spinning the spinner?