1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sholpan [36]
2 years ago
13

A user in a small office environment explains to you that his office implements a small microsoft workgroup. users commonly shar

e folders with each other. which access control model is represented in this example?
Computers and Technology
1 answer:
Kazeer [188]2 years ago
6 0

65DAC, is access control model is represented in this example, A user in a small office environment explains to you that his office implements a small Microsoft workgroup.

<h3 /><h3>What are folders?</h3>

Folders are the virtual location where data is stored in the computer, there can be the several folders in a computer can be made and can name it accordingly. The folders can store the maximum GB files in it.

Thus, it is 65DAC

For more details about folders, click here:

brainly.com/question/17616752

#SPJ1

You might be interested in
The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make
Natali [406]

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

4 0
3 years ago
Individual mental blocks may cause option
Bond [772]

B. negative attitude option

3 0
3 years ago
As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in
Nataliya [291]

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
6 0
3 years ago
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
4 years ago
PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP
Vadim26 [7]

Functions are code segments that are executed when called or invoked

The function definition is not given; so, the output of the program cannot be outrightly determined.

However, the following are the possible scenarios.

  • The program would return 35.55 if the 2 represents the digits after decimal.
  • The program would return 36 if the 2 represents the significant digits.

It is unlikely for the program to return (a) 35.555 and (d) 40

Read more about functions at:

brainly.com/question/14284563

5 0
2 years ago
Other questions:
  • The disk drive is a secondary storage device that stores data by ________ encoding it onto circular disks.
    11·1 answer
  • A is the smallest unit of application data recognized bysystem software.
    12·1 answer
  • What is NOT powered by the PSU of your computer?
    9·1 answer
  • Your company has 1,000 users in a Microsoft Office 365 subscription. A Power BI administrator named Admin1 creates 20 dashboards
    14·1 answer
  • Which of the following is not a data type in python Float, string, integer, decimal ​
    15·2 answers
  • What error occurs in the following program? #include using namespace std; int main() { int number1, number2, sum; cout &lt;&lt;
    13·1 answer
  • True or false. The CPU requires it's own power from the power supply, and can't receive power from the motherboard.
    9·1 answer
  • Test if the word mold is stored in the variable word. Computer science.
    9·1 answer
  • Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:​
    14·1 answer
  • Mencione 2ejemplos de procesos manuales
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!