1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
10

The ntfs ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.

Computers and Technology
1 answer:
ale4655 [162]3 years ago
4 0
You use the <span>NTFS encrypt attribute.</span>
You might be interested in
What type of program is Microsoft® Excel®?
8090 [49]

Answer:

the answer is spreadsheet application. I hope it helps

7 0
3 years ago
Read 2 more answers
What best determines whether a borrower's interest rate on an adjustable rato loan goes up or down?
Lelu [443]

Answer:

a bank finances

Explanation:

the best determines whether a borrower's investment on an adjustable-rate loan goes up or down is the current market. The market's condition drastically impacts the rate of investment.

8 0
3 years ago
Read 2 more answers
A cell reference with only one dollar sign before either the column or the row is called an absolute reference.
BlackZzzverrR [31]
False, absolute references have two dollar signs
4 0
3 years ago
In what way, if any, can your social media presence affect your chances of getting a job in social media?
Leno4ka [110]

Answer:

Your social media postings can help you secure a job too, not just it being effective in a bad way.

Explanation:

Your content can give hiring managers an overall idea of your personality, what you are passionate about, how you interact with people in group discussions and how previous colleagues feel about you through recommendations and so on. All of these give you an advantage in securing a job.

7 0
2 years ago
Technician A says that the TP sensor signal voltage should be about 0.5 volt at idle and increase to about 2.5 volts at wide-ope
swat32

Answer:

Both are right.

Explanation:

4 0
3 years ago
Other questions:
  • Describe three general methods for passing parameters to the operating system.
    6·1 answer
  • What is a browser cookie?
    10·2 answers
  • Olivia creates a personal budget. She enters her current savings account balance in cell D3. In cell A3, she calculates her inco
    8·1 answer
  • When preparing a document flowchart, the names of organizational departments or job functions should appear in theA) column head
    6·1 answer
  • Convert the binary number into a hexadecimal number.
    7·1 answer
  • In chapter 3, we discussed syntax and semantics, in general there are two types of grammars for programming languages, regular a
    14·1 answer
  • Cloud computing is an old phenomenon in computing infrastructure dating back to the early days of the Internet that involves mov
    10·1 answer
  • Summary about Interface Design in system analysis
    12·1 answer
  • Which describes the Paradox of Automation?
    5·2 answers
  • which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!