1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
2 years ago
8

You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y

our system volume. what can you do to make them appear?
a. uncheck ���hide protected operating system files��� in folder options.
b. uncheck ���hide protected operating system files��� in admin tools.
c. slide the security bar in control panel to ���less secure.���
d. uncheck ���enable protected mode��� in local security tools.
Computers and Technology
1 answer:
ElenaW [278]2 years ago
6 0
<span>a. uncheck ���hide protected operating system files��� in folder options</span>
You might be interested in
1. What does it mean to say that a country’s land area is positively correlated with its population?
disa [49]
For 1.
Positive correlation means if you plot a country's population and land size on a graph. There would be a linear regression line that's sloping upwards. 

Since it's a scatterplot, there will be some that fall out of the line, but most of them should be on the line.

It's  (A)

For 2.
An outlier is a datapoint that's far, FAR away from the others, so it's (B)

For 3. (A), it's a single line-of-best fit that runs through the middle of the cluster of data points.
5 0
3 years ago
Read 2 more answers
Which of the following statements is not correct ​
just olya [345]
Wich statements ? I don’t see anything
4 0
2 years ago
Read 2 more answers
Is the wireless network you own as secure as it should be? Examine your wireless network or that of a friend or neighbor and det
AleksandrR [38]

Answer:

See explaination

Explanation:

Wireless Security:

In a bid to examine the network you can use ipconfig /all command in windows or in the event where you are a linux user type in ifconfig to view all the configuration details of your network such as

indows IP Configuration

Host Name . . . . . . . . . . . . : myvpc-hb

Primary Dns Suffix . . . . . . . : example.com

Node Type . . . . . . . . . . . . : Hybrid

IP Routing Enabled. . . . . . . : Yes

Ethernet adapter Local Area Connection:- - - - - -

Connection-specific DNS Suffix . :- - - - - -

Description . . . . . . . . . . : Intel 68540-Based PCI Express Fast Ethernet Adapter

Physical Address. . . . . . . . . : 00-03-AA-BC-CA-8F

Autoconfiguration Enabled . . . . : Yes

Link-local IPv6 Address . . . . . : fe65::ab56:ccb9:320c:524d%8(Preferred)

IPv4 Address. . . . . . . . . . . : 192.168.45.111(Preferred)

Default Gateway . . . . . . . . . : 192.168.15.1

DHCP Server . . . . . . . . . . . : 192.168.15.1

DHCPv6 IAID . . . . . . . . . . . : 201327615

Note: If you want to deeply examine the your network and to find security model go with Wireshark application.It will help you to capture the data packets easily using GUI.Also it will provide other details like transmission control protocols,etc.

To take your network to highest level i.e. to make it more secure you can use:

1.Firewalls like application gateways,packet filtering,hybrid systems.

2.Crypto cable routers

3.Virtual private networks, etc.

Estimation of cost and the time to increase the level is solely depends on the type of the architecture you want to use for the network building structure.Also the size of the network will be responsible for the cost and time.

In case of any attack on your computer it depends on the size of the data on the computer disc and the bandwidth of the network to which your computer is connected to replace all data. The faster the bandwidth of the network,faster the data replacement rate.

3 0
2 years ago
A a a a I don't need help!?
Arlecino [84]

Answer:

ok

Explanation:

ok

6 0
2 years ago
Which of these practices should you follow while creating your resume?
avanturin [10]

B is better than any other one's I think.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Safety interlock module operates by monitoring the voltage from the
    7·1 answer
  • Which access control principle specifies that no unnecessary access to data exists by regulating members so they can perform onl
    11·1 answer
  • Which of the following programs can open a bitmap file?
    11·2 answers
  • WHAT IS MULTIMEDIA SUPPOSED TO MEAN ???
    15·2 answers
  • Face book suggests Friends for users based on their
    13·1 answer
  • The Binder Prime Company wants to recognize the employee who sold the most of its products during a specified period. Write a qu
    12·1 answer
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • JAVA CODE.
    6·1 answer
  • Susan wants to play the games that come with Windows on her computer, but they are not on the Start menu. What should she do in
    7·1 answer
  • What is the function of a primary key in a table? to uniquely identify each record in the table to uniquely identify foreign key
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!