1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
10

The ntfs ____ attribute protects folders and files so that only the user who encrypts the folder or file is able to read it.

Computers and Technology
1 answer:
ale4655 [162]3 years ago
4 0
You use the <span>NTFS encrypt attribute.</span>
You might be interested in
What explains the discrepancy between the number of bytes you can
sergejj [24]

Answer:

This is because, the advertisers report the storage space in decimal while the computer reads the storage space in binary.

Explanation:

The advertisers report the storage space in decimal or base 10 because humans count in decimal, whereas the computer reports the storage space in binary or base 2.

Since the computer storage is in bytes and 8 bits equal 1 byte, It is easier to write a storage space of 1 kB as 1000 B but it is actually supposed to be 1024 B(2¹⁰). So, there is a discrepancy of 1024 B - 1000 B = 24 B.

As  we go higher, the discrepancy increases. For example, 1 MB is advertised as 1000 kB = 1000000 B but is actually supposed to be 1024 kB = 1024 × 1024 B = 1048576 B. So, there is a discrepancy of 1048576 B - 1000000 B = 48576 B.

So, the actual number of bytes on the storage device is actually less than that reported due to the different number systems in which they are reported in. This discrepancy is less in memory cards or flash drives though in which the stated value of storage capacity might be the actual storage size.

Note that the base 10 or decimal system was chosen by advertiser since this is what consumers understand.

8 0
2 years ago
The most basic software required for an online course where writing is involved is:
Andrej [43]
The annswer is word processing.
7 0
3 years ago
Given two ArrayLists of sorted strings (alphabetically ascending), write down a method to merge these sorted strings’ ArrayLists
Elena-2011 [213]

Answer:

see explaination

Explanation:

import java.util.ArrayList;

import java.util.Arrays;

public class Merge {

public static ArrayList<String> mergeList(ArrayList<String> lst1, ArrayList<String> lst2) {

ArrayList<String> result = new ArrayList<String>();

int i = 0, j = 0;

while (i < lst1.size() || j < lst2.size()) {

if (i < lst1.size() && (j >= lst2.size() || lst1.get(i).compareTo(lst2.get(j)) < 0)) {

result.add(lst1.get(i++));

} else {

result.add(lst2.get(j++));

}

}

return result;

}

public static void main(String[] args) {

ArrayList<String> lst1 = new ArrayList<>(Arrays.asList("Austin", "Dallas", "San Fransisco"));

ArrayList<String> lst2 = new ArrayList<>(Arrays.asList("Boston", "Chicago", "Denver", "Seattle"));

System.out.println(mergeList(lst1, lst2));

}

}

8 0
3 years ago
"If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op
Monica [59]

The operating system's memory protection routine intervenes and (usually) terminates the program if a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it.

Further Explanation

The memory protection routine is most commonly used in multi-programmed systems to prevent one process from affecting the availability of another. When a user opens up multiple processes, by default, they usually reside at the same time in the main memory. Sometimes, a program may attempt to access, modify, or read memory locations allocated to other processes. When this happens, the memory protection program jumps in. Keep in mind that the memory manager somehow works hand in hand with the memory protection routine. It protects the OS from being accessed by other processes and these processes from accessing one another. In addition, it helps save memory by allocating the same amount of memory to all running processes. The memory protection program, on the other hand, should be able to allow controlled sharing of memory among different processes and will usually terminate a program that tries to modify content of memory locations of that does not belong to it.

Learn More about Memory management

brainly.com/question/14241634

#LearnWithBrainly

3 0
2 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
2 years ago
Other questions:
  • Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
    9·1 answer
  • If you interview a dentist to learn about her experiences on the job, she is considered a secondary source of information. Pleas
    7·2 answers
  • What does the CPU do in a computer?
    7·2 answers
  • Hi whats airpods good for
    15·2 answers
  • The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Tim Berners-Lee B. Bill Gates C. Robert Kahn D. Rober
    8·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • O O O O O O O
    9·1 answer
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
  • Which of the following terms refers to the area of the hard drive used for virtual memory?
    13·1 answer
  • Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!