1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
klemol [59]
1 year ago
5

It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end o

f the share name?
Computers and Technology
1 answer:
Effectus [21]1 year ago
8 0

Creating Hidden Shares in Windows

To make a shared folder or drive hidden, simply add a dollar sign ($) to the end of the Share Name.

<h3>What is hidden share?</h3>

Alternatively referred to as an Administrative share, a hidden share is a network share on a Microsoft network that is not visible when viewing another computer's shares. However, it is still accessible if the name of the hidden share is known. Default Microsoft Windows hidden shares.

<h3>What is the symbol used for hidden data share?</h3>

Hidden Share, in Microsoft Windows operating systems, is a share with a dollar sign ($) appended to the share name.

To learn more about  Microsoft Windows , refer

brainly.com/question/26338728

#SPJ4

You might be interested in
Which type of RAM is used exclusively in laptops?<br> a) SODIMM<br> b) DDR3<br> c) DDR<br> d) DDR4
Black_prince [1.1K]

Answer:

DDR3

Explanation:

6 0
3 years ago
Propose a data structure that supports the stack push and pop operations and a third operation findMin, which returns the smalle
juin [17]

Answer: attached below

Explanation:

3 0
3 years ago
Which is the correct process for opening a blank spreadsheet?
Step2247 [10]
The best way of doing this would be when you are opening a document application, the first thing that you would do in this case in to click "new". And by clicking new, you would have a fresh new spread sheet.
5 0
3 years ago
The last time period the federal government of these United States ran a budget surplus was ________.
lina2011 [118]
Your answer is a 1998-2001
3 0
3 years ago
Memory is a _____________ that includes the organization and shaping of information by processing, storage, and retrieval of inf
vaieri [72.5K]

Answer:

A. <em>Encoding Process </em>

Explanation:

Memory is an <em>encoding process </em>that includes the organization and shaping of information by processing, storage, and retrieval of information.

There are two types of memory in computing, <em>RAM </em>and <em>ROM</em>. <em>RAM </em>stands for <em>Random Access Memory</em>. It I the core memory of the computer and it is especially faster regarding reading and writing process. As an analogy, RAM memory is like the “<em>Short-term</em>” memory of the computer. <em>ROM </em>stands for <em>Read-Only Memory</em>, this is the type of memory in charge of permanently storing data in the computer. It contains the necessary information to run the computer. As an analogy, <em>ROM </em>memory is like the “<em>long-term</em>” memory of the computer.

3 0
3 years ago
Other questions:
  • (b) An online game allows players to race cars. They can play against other people or computer players.
    10·1 answer
  • In which file format is image data compiled into a binary file? TIFF SVG CGM BMP
    11·1 answer
  • Clep allows students to do all of thw following except which?
    11·2 answers
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • Video Fundamentals
    6·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • Write a regular expression that selects lines containing any of the following words: linux windows solaris macos. For this exerc
    13·1 answer
  • Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
    14·1 answer
  • Write a program that uses a dictionary to store students birthdays. Your program should ask the user what their name is, and loo
    11·1 answer
  • What are acenders? What are decenders?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!