1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
15

Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a

folder in the Documents library of her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied. ​ What can Allison do to fix this security issue?
Computers and Technology
1 answer:
Margaret [11]3 years ago
8 0

Answer:

restart computer,check to see who was last on her account or call a technician  

Explanation:

You might be interested in
Melissa is the network administrator for a small publishing company. as network administrator, she is in charge of maintaining t
Arte-miy333 [17]
The answer is an Intruder Prevention System (IPS). An Intrusion Detection System (IDS) will detect an attack but will not block it.
3 0
3 years ago
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection co
Scorpion4ik [409]

Answer:

a. Password length, password encryption, password complexity

Explanation:

Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.

4 0
3 years ago
The History feature of a browser enables you to retrace your browsing history over a short period of time. (1 point) True False
Elena-2011 [213]

The statement that the History feature of a browser helps in retracing browsing history over a short period of time is True.

<h3>What is a browser?</h3>

A browser can be regarded as an computer application that is used in surfing the internet.

One of the features of a browser is the history tab which helps to retrace your browsing history over a short period of time.

Learn more about browsers at;

brainly.com/question/24858866

6 0
2 years ago
In an effort to determine where the company can cut spending, Larry creates
tester [92]

Answer:

C.He could determine that the company could save the most money by cutting back on party spending.

(APEX)

3 0
4 years ago
Suppose that a client performs an intermixed sequence of (queue) enqueue and dequeue operations. The enqueue operations put the
earnstyle [38]

Answer:

b, c and d can't occur.

Explanation:

Order is preserved in queue. Option A is order preserving so only it will occur.

8 0
3 years ago
Other questions:
  • Assume that you have an array of integers named arr. The following program segment is intended to sum arr [0]through arr[n−1], w
    7·1 answer
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • Two technicians are discussing the voltage measurements taken on the circuit below: V1 = 12Volts; V2 = 12Volts; V3 = 0Volts; V4
    11·1 answer
  • How can parents be health educators in family​
    13·1 answer
  • Can someone help me with this lab assignment? I really do not know what should I do?
    5·1 answer
  • When would the Jerusalem virus attack?<br> 1. Friday the 13th<br> 2. Wednesday the 13th
    13·2 answers
  • You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Se
    12·1 answer
  • Can you help me with this question please ​
    13·1 answer
  • During the ___ phase of a software development project, members broadly define the features that the software should include
    15·1 answer
  • Answer the following question in 3-4 complete sentences. Define the following terms: - registration - press - keyblock.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!