1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pav-90 [236]
3 years ago
8

What is required to control access to the file system using file and folder permissions on a windows based computer?

Computers and Technology
1 answer:
Elis [28]3 years ago
5 0
NFTS-formatted partition.
You might be interested in
LargeCo is planning a new promotion in Alabama (AL) and wants to know about the largest purchases made by customers in that stat
pychu [463]

Answer:

Check the explanation

Explanation:

Assuming Cust_code is unique for every customer.

Query :

SELECT * FROM CUSTOMER WHERE CUST_STATE= "AL" GROUP BY CUST_CODE HAVING LARGEST INVOICE = MAX(LARGEST INVOICE) OR (LARGEST INVOICE =0 and INV_DATE IS NULL);

5 0
4 years ago
Peter is working on a project. He feels that the parameters need to be changed to meet the client specifications. First he must
11111nata11111 [884]

Answer:

C) chain

Explanation:

Small group network comprises of a vertical, direct, chain, all channel and box network

The vertical network is a network that is made for some specific purpose or goal of the business organization.

The direct network is a network that is directly interrelated to each other.

The chain network is that network in which the formal chain of command follows through which proper  communication can be done in all the departments without any barriers to a communication network

It also shows that each member can communicate the person below and above their position only in a vertical hierarchy. It follows the top-down approach

This all channel network follows an informal communication network through which anyone can communicate with anyone at any time with following any chain of the business organization

The box network covers all the things in one network. Like -  various software, packages, etc

In the given case Peter is asking permission from the supervisor and supervisor is discussing with the department director, is showing the formal chain of command that's why according to the given scenario the most appropriate answer is chain network.

8 0
4 years ago
Microsoft's Xbox operating system provides Xbox programmers with a set of common standards to use to access controllers, the Kin
ASHA 777 [7]

not be made for Xbox platform.

Hope this helps.

3 0
4 years ago
Which Additional Authorization List item can replace the hook at the end of the winch cable for fastening the cable to some load
satela [25.4K]

Answer:

Shackle

Explanation:

A winch may be defined as a mechanical device which is used to pull in or let out the rope or cable maintaining its tension. It can also adjust the tension of the cable or the rope.

It is mainly used in tow trucks, elevators and steam shovels.

Shackle is one of the additional authorization list of a vehicle with a winch which can be used to replace the hook of the cable of the winch.

8 0
3 years ago
What is another term for additive manufacturing
Ira Lisetskai [31]

Answer:

Contact Us. Additive manufacturing (AM) or additive layer manufacturing (ALM) is the industrial production name for 3D printing, a computer controlled process that creates three dimensional objects by depositing materials, usually in layers.

Explanation:

6 0
3 years ago
Other questions:
  • Rebecca received the following e-mail from her boss: I NEED ALL EMPLOYEES TO WORK LATE ON SATURDAY. NO EXCEPTIONS! What is the m
    13·2 answers
  • Okay so remember that page I was advertising? At: fol ? Now it's deleted. And idk why because I was doing everything the right w
    7·1 answer
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • In the written Hawaiian language, only 13 letters are used: the five vowels (a,e,i,o, and u), and 8 consonants (h,k,l,m,n,p,w, a
    10·1 answer
  • The term “computer literacy” dates back to what decade? <br> 1960s<br> 1970s<br> 1980s<br> 1990s
    5·1 answer
  • After you select a cell with an error indicator, you can click the error checking _______ to display additional information abou
    14·1 answer
  • If I dribbled on my motherboard and I used windex to clean off the spit would it still work ?
    11·2 answers
  • A ____ is a statement specifying the condition(s) that must be true before the function is called.
    6·1 answer
  • Computer network reduces the cost of operation​
    14·1 answer
  • 6. Write a C++ program to print the largest three elements in an array. <br>​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!