1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ser-zykov [4K]
3 years ago
9

A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th

e following message, "Could not find this item. Verify the location of '\\FileServer\Docs' and try again."
Which of the following is the most likely cause for this message?

a. The user's PC is out of local hard disk space.
b. The file server could not contact directory services.
c. The share to the file server is disconnected.
d. The user signed out of directory services
Computers and Technology
2 answers:
Natalka [10]3 years ago
8 0

Answer:

c. The share to the file server is disconnected.

Explanation:

Sharing a file to the file server is the same as saving the document to the file server as the most important function of file server is storage. Therefore if one is getting an error message of not being able to find the saved file and to verify the location of '\\FileServer\Docs', it means that the saved files are no longer available anywhere on the server and even in the computer of the user.

Anna [14]3 years ago
8 0

Answer:

c. The share to the file server is disconnected.

Explanation:

A file server is responsible for storing and retrieving of files used by all other computers that are connected to it via a network. The file sharing protocol that are commonly use to access file servers on a local area network(LAN) could be Server Message Block or Common Internet File System.

The messages implies that the network access protocol to the file server has been disconnected, hence the reason the file server could not be accessed.

You might be interested in
Harry is undertaking a digital photography course as the college and wants to
Ludmilka [50]

C. Unconventionally yes it will break down the system potentially causing a virus

4 0
3 years ago
What is the trade-offs in time complexity between an ArrayList and a LinkedList?
AURORKA [14]

Answer:

  In the time complexity, the array-list can easily be accessible any type of element in the the given list in the fixed amount of time.

On the other hand, the linked list basically require that the list must be traversed from one position to another end position.

The Array-List can get to any component of the rundown in a similar measure of time if the file value is know, while the Linked-List requires the rundown to be crossed from one end or the other to arrive at a position.

4 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
question 7 packages installed in rstudio are called from cran. cran is an online archive with r packages and other r-related res
Ksenya-84 [330]

Packages installed in rstudio are called from cran. cran is an online archive with r packages and other r-related resources, is the true statement.

<h3>What are CRAN packages in R?</h3>

It comprises archives for both the most recent and prior versions of the R distribution, donated R packages, and documentation. It provides both source packages and pre-compiled binaries for Windows and macOS. there are more than 16,000 bundles available.

The version of R that is made available through CRAN is compatible with the integrated development environment for R, referred to as RStudio. All of the major systems support RStudio, which includes a variety of tools that boost productivity.

Thus, it is the true statement.

For more information about CRAN packages in R, click here:

brainly.com/question/10658169

#SPJ1

7 0
1 year ago
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
3 years ago
Other questions:
  • W jakim celu powstawały pieśni żołnierskie i partyzanckie?
    10·1 answer
  • Suppose two computers (A &amp; B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform pro
    9·1 answer
  • In GIMP, the ( ) displays the image that the user is currently working on
    12·1 answer
  • ​ In addition to analyzing logic and program code, a project team usually holds a session with users, called a _____, to review
    5·1 answer
  • Write a Twitter class that sets the Twitter user first (who is to be followed) and lets the client add up to 5 followers, which
    10·1 answer
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • You want to look up colleges but exclude private schools. Including punctuation, what would you
    9·2 answers
  • Complete the following sentence.
    7·1 answer
  • In which of these areas can software engineers specialize?
    10·1 answer
  • Create a program which reads in CSV data of Creatures and loads them into aHash Map. The key of this hash map will be the name o
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!