1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mars2501 [29]
3 years ago
11

6. How can you encrypt an entire drive, including files and folders belonging to other users? a. EFS b. User Account Control c.

Administrative Shares d. BitLocker
Computers and Technology
1 answer:
matrenka [14]3 years ago
6 0

Answer:

A.

Explanation:

Encrypting File System (EFS) is a file system which enables you to encrypt files, thus making them unviewable by any account but your own.

You might be interested in
A _______ is a piece of computer hardware used for the modulation and demodulation of data between digital and analog formats.
mario62 [17]
'Modem'. A hardware that changes analogy to digital and vice versa.
5 0
3 years ago
Orphan record example?
Goryan [66]

Answer:

If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.

4 0
3 years ago
What is storage virtualization? Multiple Choice combines networks by splitting the available bandwidth into independent channels
slavikrds [6]

Answer:  Combines multiple network storage devices so they appear to be a single device.

Explanation: In this case, different physical devices, that normally are accessed separately as different drives, are treated  by the operating system, like they were only one "giant drive" , hidding from the  user the details regarding how it is done, creating in this way a virtual storage, a single logic unit.

8 0
4 years ago
Caesar Cipher is an older and since outdated encryption technique used by Julius Caesar to "hide" messages he sent to his troops
netineya [11]

Answer:

c. UHPDLQ KRPH

Explanation:

The above question is missing key details.

The missing part of the question is

Suppose that you want to encrypt the following message: REMAIN HOME. Of the following, which would be a potential encrypted message using Caesar Cipher?

a. TGPBKP JPQG

b. SFNCKO IPNF

c. UHPDLQ KRPH

d. PFLBHO INND

Using Caeser Cipher with an offset of 3, the answer is option c, UHPDLQ KRPH

With the main text being, REMAIN HOME,

Notice that if you letter U is 3 letters after R

Letter H is 3 letters after E

Letter P is 3 letters after M

It continues like that till it gets to the last letter H,

Letter H is 3 letters after E

In conclusion if REMAIN HOME is to be ciphered with an offset of 3, it gives UHPDLQ KRPH

4 0
4 years ago
What's 3+3 and stop deleting my question i just wasted 41 points
bazaltina [42]

Answer:

I am pretty confident that the answer is 6

Explanation:

3+3=6

3 0
3 years ago
Read 2 more answers
Other questions:
  • What device consisting of a screen and keyboard was used to connect to a mainframe computer?
    6·1 answer
  • The shortcut key to access the spelling and grammar check is _____.
    11·2 answers
  • My programming lab 9.2 C++ Write a full class definition for a class named Counter, and containing the following members:_______
    6·1 answer
  • Describe how an attacker can use whois databases and the nslookup tool to perform reconnaissance on an institution before launch
    8·1 answer
  • escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
    10·1 answer
  • Which of these is an aggregator?
    5·2 answers
  • [5]Suppose a 1,600 kg car is traveling at 20.0 m/s. What average force is needed to stop the car in 4.0 s?
    8·2 answers
  • A python program for the following output using for loop.
    13·1 answer
  • g Deliverables: 1.Referencing the Arduino attachInterrupt() documentationand the provided code, what does the attachIntterupt()
    14·1 answer
  • Purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment and softwa
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!