Controlling, Sharing and Storing FilesContains unread posts

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

1. Give reasons why a user would protect a file from read or write access by other users and provide examples how this can be done.

2. Explain the difference between a virus, a worm, and a Trojan.

3. Explain why it is safer for administrators to use two different accounts when working with a computer. Explain the difference between the two accounts.

4. Explain how access restrictions on a folder or directory can block a users access to a file, even if the file itself may be readable by that user.

5. Explain the four general tasks that may play a role in recovering from a security incident