1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
4 years ago
15

You are responsible for tech support at your company. You have been instructed to make certain that all desktops support file an

d folder encryption. Which file system should you use when installing Windows XP?
Computers and Technology
1 answer:
lesya692 [45]4 years ago
3 0

Answer:

The file system that we shall choose is NTFS file system.

Explanation:

NTFS file system is a file system developed by Microsoft that provides file system encryption. Encryption means to secure our data in such a way such that only authorized person's can have access to it. NTFS file system allows to encrypt data so that all our data is safe from various cyber related thefts thus making our system and data safe from vulnerability of theft.

Encryption does not prevent access to data but the data that is accessed by various agents remains meaningless to all the agents until the user of the data decrypts it.

You might be interested in
Analyze the needs of the National Security team and help them articulate its problems, develop solutions to meet its needs, and
Zielflug [23.3K]

Answer:

Following are the solution to this question:

Explanation:

The Council's role has been to assist and support the President regarding national security and foreign policies ever since its inception under Truman. This Committee often acts as the primary arm of a President to organize these initiatives between government agencies.

The Leader holds sway over the NSC. Its Secretary Of Defense offers a range of options for the Administration on policy issues. The director of national intelligence helps prepare the administration's foreign travel, among other tasks, and offers context memos and staffing for the administration's discussions and phone interviews involving global leaders.

Safety investments were taken for many years utilizing threat cost-benefit analysis wherein the effect metric has been largely focused on even a risk reduction comparative estimate. To evaluate investment decisions, most aim to conduct similar analyses.

Even so, the potential threat is much harder to measure for high-security installations that potential hazard since the likelihood of an attack is highly uncertain and depends strongly on undefinable psychological factors like deterrence as well as the intensity of enemy goals.

3 0
3 years ago
Int side1;
o-na [289]

Answer:

int width_A, width_B, len_A, len_B;

float rw, rl;

rw = (float)(width_A/width_B);

rl = (float)(len_A/len_B);

if(rw == rl)

printf("They are similar");

else

printf("They are not similar");

Explanation:

The width of the first triangle i call width_A.

The width of the second triangle i call width_B.

The length of the first triangle i call len_A.

The length of the second triangle i call len_B.

The ratio of the width i call rw.

The ratio of the length i call rl.

If rw=rl, the retangles are similar. Otherwise, they are not.

The code is:

int width_A, width_B, len_A, len_B;

float rw, rl;

rw = (float)(width_A/width_B);

rl = (float)(len_A/len_B);

if(rw == rl)

printf("They are similar");

else

printf("They are not similar");

8 0
3 years ago
All drives in a computer have how many connections.
Lorico [155]

Answer:

 The oldest of the hard drive connections are the SCSI (Small Computer System Interface) types.  The 50 pin flat ribbon cable connectors were found in all sorts of computers and servers from their introduction in 1986 until the mid 1990's.  

They are still in use today, albeit in their updated Ultra SCSI form which uses either 68 or 80 pin connectors along with a pinless plug that is similar to a USB connection.  Up to 16 drives/devices can be connected through SCSI connections.  {The common alternative to SCSI connectors is the IDE connection.  Also known as ATA or PATA, IDE drives use a 40 pin flat ribbon cable and are limited to just two drives per cable.  These drives were initially developed for IBM PCs. }

Introduced in 2005 as a replacement for Ultra SCSI, SAS drives, or Serial Attached SCSI, share many common features with regular SCSI but offer many improvements. While SCSI drives can only run a single communication in the order it's received, SAS drives allow for multiple simultaneous communications through less numbers of pins and higher speeds.  SAS plugs look similar to those found on SATA devices but have seven additional pins for a total of 29 (14 for data, 15 for power). SAS systems can also handle upwards of 66,000 devices per controller.  

SATA, or Serial ATA, drives are similar to SAS but have a simplified plug with 15 power and seven data connections.  SATA drives can technically plug directly into any cable that accepts a SAS drive but it may not been by the computer it is connected too if it doesn't support SATA drives on a SAS system.

Finally, FC or Fibre Channel drives are designed for larger storage systems that use fiber optic interconnects between the server and drive enclosures.  The connections on Fibre Channel drives typically prevent them from being used with other drive types due to their specialty nature but since they are based on SCSI technology, they work easily with many different server systems.

7 0
4 years ago
Why are problem-solving strategies important? Choose all that apply. ensures important factors are taken into consideration ensu
marishachu [46]

Answer:

A,B,D

Explanation:

6 0
3 years ago
Garrett wants to search through a csv file to find all rows that have either the name John or Bob in them and display them out t
Olin [163]

Answer:

A.  grep -E "(John|Bob)" salesemployees.csv

Explanation:

The grep command is used to search text. It searches the given file for lines containing a match to the given strings or words.

How to use Grep Command:

grep 'letter' filename – Search any line that contains word 'letter' in filename on Linux

grep -i 'Alphabet' file1 – A case-insensitive search for the word ‘Alphabet’ in Linux and Unix

grep -R 'root' . – Search all files in the current directory and in all of its subdirectories in Linux for the word ‘root’

8 0
3 years ago
Other questions:
  • If you need to show slides on a wide-screen monitor, you might change their size to: Select one: a. Onscreen Show (16:9) b. Onsc
    11·1 answer
  • Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline.
    15·1 answer
  • A server of service is responsible for sending the contents of cengage.com to your browser when you type cengage.com into the lo
    12·1 answer
  • From your computer you are able to establish a telnet connection to a remote host but a traceroute to the host IP address result
    6·1 answer
  • What does an "embedded video" mean
    7·1 answer
  • Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​
    7·2 answers
  • Plz answer it’s timed
    6·1 answer
  • A gui allows you to interact with objects on the screen such as icons and buttons true or false
    15·1 answer
  • I hate school...............
    13·2 answers
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!