1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
3 years ago
11

A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But af

ter opening the file they find they cannot modify the files contents. What is the likely cause?
Computers and Technology
1 answer:
Eddi Din [679]3 years ago
4 0
What will happen is the file will be open by someone else and will be open as read only. I hope this helps!
You might be interested in
A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
omeli [17]

Answer:

7 iterations

Explanation:

my teacher said so

6 0
3 years ago
Hey does anyone know the name of that movie where like this teenage girl is chilling at her house then there is an outbreak of s
ANEK [815]

Answer:

I’m not sure. Maybe zombie land

Explanation:

4 0
3 years ago
Write at least complete set of HTML code to hyperlink to “Home.html”..
faltersainse [42]

Answer:

HTML Link Colors

By default, a link will appear like this (in all browsers):

An unvisited link is underlined and blue

A visited link is underlined and purple

An active link is underlined and red

You can change the link state colors, by using CSS:

8 0
3 years ago
1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch
Sav [38]

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

7 0
3 years ago
Which emerging technologies will have more injury on our day to day country & How?​
qwelly [4]

Explanation:

Complete the sentence with the words below stop push direction slow down move shape speed up pull A force is a. or a.

4 0
2 years ago
Other questions:
  • Why does a satellite requires two bridges?
    11·1 answer
  • What were the goals of the “paperless society” ideal?
    14·2 answers
  • All of the following are strategies to help you prepare for standardized test except <br>​
    5·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • The ______ printers are the most popular type of printer in small office/home office and large office environments.
    5·1 answer
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • How many domains are there in the classification system?
    13·1 answer
  • when you insert a new column, the existing columns are shifted to the ____ and the new column has the same width as the column d
    10·1 answer
  • Edit the following statement so it uses the constant named YEAR:
    5·1 answer
  • Energy/power management systems, kitchen appliances, smart televisions, baby monitors, fitness trackers, and personal health mon
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!