1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
2 years ago
13

A user in a small office environment explains to you that his office implements a small microsoft workgroup. users commonly shar

e folders with each other. which access control model is represented in this example?
Computers and Technology
1 answer:
Kazeer [188]2 years ago
6 0

65DAC, is access control model is represented in this example, A user in a small office environment explains to you that his office implements a small Microsoft workgroup.

<h3 /><h3>What are folders?</h3>

Folders are the virtual location where data is stored in the computer, there can be the several folders in a computer can be made and can name it accordingly. The folders can store the maximum GB files in it.

Thus, it is 65DAC

For more details about folders, click here:

brainly.com/question/17616752

#SPJ1

You might be interested in
Which are Career and Technical Student Organizations? (Check all that apply.)
ivolga24 [154]

Answer: BPA (Business Professionals of America)

DECA (formerly Distributive Education Clubs of America)

Educators Rising.

FBLA-PBL (Future Business Leaders of America-Phi Beta Lambda)

FCCLA (Family, Career, and Community Leaders of America)

FFA (formerly Future Farmers of America)

Explanation: these are all i cant think of at the moment. sorry! but i hope this helps :)

4 0
3 years ago
The Open Systems Interconnection (OSI) Reference Model: defines standards for many aspects of computing and communications withi
Advocard [28]

Answer:

is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer.

2. Data link Layer.

3. Network Layer.

4. Transport Layer.

5. Session Layer.

6. Presentation Layer.

7. Application Layer.

Hence, the Open Systems Interconnection (OSI) Reference Model is a generic description for how computers use multiple layers of protocol rules to communicate across a network.

Additionally, each layer has its unique functionality which is responsible for the proper functioning of the communication services.

8 0
3 years ago
What would be the total width of the div in the code below?
Artyom0805 [142]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is d- 346px.

The complete code of this example is given below:

<div>

style="margin:20px; border:solid 3px #888888;">

</div>

while the image width is 300px.

It is noted that the image width is 300px and the margin is 20 px.

Margin:20px means that image margin from four side is 20 px each.

So the width of dive from both side increase to 40 px and the image has 300 px, then total width becomes 340px. Now the border also has 3px of four sides of the image, then the width of the border becomes 6px.

so the total width of the div tag is 346 px.

In short, we can calculate the width of tag as below:

total width of div= width of image+ width of margin+ width of border

total width of dive= 300px+40px+6px

total width of div=346px.

4 0
3 years ago
Read 2 more answers
What is a browser? Give one example
Harman [31]
It is a program that may be used by a user to access files and navigate the World Wide Web. An example of this would be Firefox, Chrome, Safari, etc.
3 0
3 years ago
Read 2 more answers
Go to the Creamy Ice Corporation passage on the next page. Insert the trademark sign after the word “Corporation'' in the first
GuDViN [60]

Answer:

v

Explanation:

because it is

5 0
4 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • Print either "Fruit", "Drink", or "Unknown" (followed by a newline) depending on the value of userItem. Print "Unknown" (followe
    15·1 answer
  • LOOK TO THE LEFT AND RIGHT BEFORE ENTERING ANY INTERSECTION ON A GREEN LIGHT BECAUSE:
    12·2 answers
  • Christine wants to send a quick communication to all department managers. She should send a _____. report
    13·2 answers
  • How do i show all emails from same sender in outlook
    13·2 answers
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • Your team has been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560
    6·1 answer
  • Which of the following is NOT areserved word in Java?intpublicstaticnum
    9·1 answer
  • Which word describes an important characteristic of good computer
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!