1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
k0ka [10]
3 years ago
8

You have local administrative rights to your computer running windows 7. you cannot find some of the operating system files on y

our system volume. what can you do to make them appear?
a. uncheck ���hide protected operating system files��� in folder options.
b. uncheck ���hide protected operating system files��� in admin tools.
c. slide the security bar in control panel to ���less secure.���
d. uncheck ���enable protected mode��� in local security tools.
Computers and Technology
1 answer:
ElenaW [278]3 years ago
6 0
<span>a. uncheck ���hide protected operating system files��� in folder options</span>
You might be interested in
Which of the following statements best explains how multitasking works in the human mind?
Pepsi [2]
Multitasking is a myth—everyone can only process information one piece at a time.
5 0
3 years ago
Hi um... i just wanna say hi :P
trasher [3.6K]
Lol Heyy , how are you
4 0
3 years ago
Read 2 more answers
You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
irga5000 [103]

Answer:

Port security and violation mode.

Explanation:

A switch is a layer two device of the OSI model. It is used to transmit frames between nodes within a network. It transfers frames by discovering the destination Mac address and saving it to its address table, and sending the frame to the egest port to the destination.

The port security command is used to specify the Mac addresses that are recognised by a port. There are three types of port security, they are, dynamic, static and sticky Mac addresses that can configured on an interface.

The security violation command is used to decide what happens to a port when it detects an unfamiliar Mac address. The three security violation modes are protect, restrict and shutdown. It is used as an interface command alongside the port security command.

4 0
3 years ago
Pls help it’s on a test!! no links :) you can zoom in if hard to read
kotykmax [81]

Answer:

the last one

Explanation:

the domain specifies exactly what file is requested the path specifies where the browsers request should be sent

8 0
3 years ago
Which of the following best describes the purpose of a design specification?
snow_lady [41]

Answer:

it is.    Describing the requirements for how a program will work or users will interact with it

Explanation:

mark brainlist

6 0
3 years ago
Read 2 more answers
Other questions:
  • The biggest factor in determining the price of a mortgage is:
    14·1 answer
  • In the structure of a conventional processor, what is the purpose of the data path?
    15·1 answer
  • What is wrong with line 1?
    14·1 answer
  • Which option nukes your systemâall apps, programs, user files, user settingsâand presents a fresh installation of Windows?
    13·1 answer
  • Who is hurt by piracy
    10·1 answer
  • The term "exception propagation" means:
    5·1 answer
  • Which hardware device connects your network to the internet? select one:
    15·1 answer
  • What will the following code display? int numbers[4] = { 99, 87 }; cout &lt;&lt; numbers[3] &lt;&lt; endl; a. 87 b.0 d. 34. What
    12·1 answer
  • Why is 0.3333333333333333 the output of print(1/6 + 1/6) in python?
    8·1 answer
  • What is one of four key principles of Responsible AIntelligence (AI) vendor serviceIntelligence (AI) vendor serviceI
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!