1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
1 year ago
5

It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o

f the share name?
Computers and Technology
1 answer:
Effectus [21]1 year ago
8 0

Creating Hidden Shares in Windows

To make a shared folder or drive hidden, simply add a dollar sign ($) to the end of the Share Name.

<h3>What is hidden share?</h3>

Alternatively referred to as an Administrative share, a hidden share is a network share on a Microsoft network that is not visible when viewing another computer's shares. However, it is still accessible if the name of the hidden share is known. Default Microsoft Windows hidden shares.

<h3>What is the symbol used for hidden data share?</h3>

Hidden Share, in Microsoft Windows operating systems, is a share with a dollar sign ($) appended to the share name.

To learn more about  Microsoft Windows , refer

brainly.com/question/26338728

#SPJ4

You might be interested in
Difrent between computer and computer system​
vampirchik [111]

Answer:

hope it helps..

Explanation:

a computer exists in a single place and does a primitive set of functions. A computer system combines a computer with many other things to perform a complex set of functions. It can also exist in a single place, but it may exist in many places at the same time.

HAVE A NICE DAY

3 0
3 years ago
Space cushion includes
Ulleksa [173]

Answer:

D. sides

Explanation:

Space cushion includes sides of your vehicle.

8 0
3 years ago
Read 2 more answers
Debugging is not testing, but always occurs as a consequence of testing. <br> A) TRUE<br> B) FALSE
kherson [118]
A) True Hope that helps
5 0
3 years ago
Select all that apply.
Leto [7]
You may do all of the given options.
Thank You!
8 0
3 years ago
The OSI model is a useful tool in troubleshooting a network because it enables you to isolate a problem to a particular software
lutik1710 [3]

Answer:

1)  Layer 4, transport

2) Layer 2, datalink

3) Layer 5, session

4) Layer 7, application

Description of Problems are as below:

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Explanation:

OSI Model is a reference model to determine how applications communicate over a network. OSI consists of seven layers, and each layer performs a particular network function. The seven layers are:

   Layer 7 - Application.

   Layer 6 - Presentation.

   Layer 5 - Session.

   Layer 4 - Transport.

   Layer 3 - Network.

   Layer 2 - Data Link.

   Layer 1 - Physical.

1) One of your servers has been exhibiting sluggish network performance. you use a network-monitoring program to try to evaluate the problem. You find considerable TCP retries occurring because the server is being overwhelmed by data, and packets are being discarded.

Layer 4, transport

2) You check some statistics generated by a network-monitoring program and discovers that an abnormally high number of CRC errors were detected. (Hint think of the cause of CRC errors).

Layer 2, Data Link

3) A user is trying to connect to another computer, but the logon attempt is continually rejected.

Layer 5, session

4) You try to access a Linux server to share files by using NFS. You can communicate with the server, but the shared files don't appear to be available.

Layer 7, application

7 0
3 years ago
Other questions:
  • What is the one common feature that ties together different social media technologies? All of the social media tools we use toda
    5·2 answers
  • Tower defense is included under which genre of game
    15·2 answers
  • "what are the problems with tcp over wireless network?"
    15·1 answer
  • Once a graph has been created, you would need to start over to make any changes to it?
    5·1 answer
  • To use the AutoCalculate area, select the range of cells containing the numbers for a calculation you want to verify and then pr
    7·1 answer
  • Write a Program in C language using arrays:
    14·1 answer
  • When was internet started in which year​
    13·2 answers
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this
    7·1 answer
  • HELP ASAP Encoding a video format and then decoding it during playback is one of the functions of MPEG-4 and H.264 file players.
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!