1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zielflug [23.3K]
3 years ago
8

You have created shared folders for all your companies departments and assigned the appropriate permissions. everyone can access

the shares as planned, but now you find that an extraordinary amount of disk space is being used on the server. what can you do to limit how much users can store on your servers?
Computers and Technology
1 answer:
larisa86 [58]3 years ago
8 0
I would suggest the use of a disk quota.

Using a disk quota would limit the available space that users could have used to store data. The New Technology File system (NTFS) has several features like disk quotas to see which users are uploading the most space.  The windows interface Open Computer Management is also another option that limits the number of users of a shared folder.



You might be interested in
Please answer that and i'll gave you branlliest
juin [17]

num = float(input('Enter a number: '))

if num > 45.6:

   print('Greater than 45.6')

I wrote my code in python 3.8. I hope this helps.

7 0
3 years ago
Write a technical term for following statements
gizmo_the_mogwai [7]

Answer:

1. Hardware Maintenance

2. Uninterrupted Power Supply (UPS)

3. Antivirus software

Explanation:

Antivirus software, or Anti-virus software (also known as AV software), otherwise called anti malware, is a PC program used to forestall, distinguish, and eliminate malware.

Antivirus software was initially evolved to identify and eliminate PC infections, thus the name. Be that as it may, with the expansion of different sorts of malware, antivirus software began to give security from other PC dangers. Specifically, current antivirus software can shield clients from: noxious program criminals.

A few items additionally incorporate security from other PC dangers, for example, tainted and noxious URLs, spam, trick and phishing assaults, online identity (privacy), web based financial assaults, social engineering techniques, advanced persistent threat (APT).

3 0
3 years ago
Lenny copied and pasted content from a commercial website into his research paper without citing his source, passing the work of
Sedbober [7]
Lenny might be either suspended
Or might be failed in that particular course
6 0
1 year ago
Let C(x) be the statement "x has a cat," let D(x) be the statement "x has a dog," and let F(x) be the statement "x has a ferret.
allsm [11]

Answer:

See attached for answer and explanation

Explanation:

Note: the question is incomplete, consider the statements below as the statements to be expressed in terms of C(x), D(x), F(x), quantifiers, and logical connectives.

(a) A student in your class has a cat, a dog, and a ferret.

(b)  All students in your class have a cat, a dog, or a ferret.

(c) Some student in your class has a cat and a ferret, but not a dog.

(d) No student in your class has a cat, a dog, and a ferret.

(e) For each of the three animals, cats, dogs, and ferrets, there is a student in your class who has this animal as a pet.

7 0
3 years ago
Imagine that one of your clients has complained to your manager that you have not responded quickly to his e-mails. Compose an e
Galina-37 [17]
Dear Mr. _____,
I am truly sorry for the inconvenience and I promise to work faster to more quickly solve your problem so that you can continue to enjoy your day without worrying about the situation. Next time I will respond back faster to ensure that your problem is fixed as quickly as possible.

Sincerely,
_____________

6 0
3 years ago
Other questions:
  • A typical, small, dry cell battery has a voltage of A. 6.0 volts. B. 1.0 volts. C. 12.0 volts. D. 1.5 volts.
    11·2 answers
  • What is the purpose of a turbine in a power plant?
    14·1 answer
  • Which is a correctly formatted Python tuple?
    9·1 answer
  • Which of the following pathways relates to the Architecture and construction career cluster
    7·1 answer
  • After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:
    7·1 answer
  • what is the total resistance of a series circuit with four resistors in series of 12 16 20 and 24 ohms​
    14·1 answer
  • Which of the following actions can NEGATIVELY impact your credit score?
    9·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • 17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
    8·1 answer
  • What technology would a bank's website use a scramble information as it is transmitted over the Internet
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!