1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
6

11. What are the two DFS models?12.When you move a file from the Spreadsheets folder to the Corp Documents folder on a Windows S

erver 2016 server, what happens to the permissions on the file?
Computers and Technology
1 answer:
Vesnalui [34]3 years ago
7 0

Answer/Explanation:

11. Standalone and Domain-based models

12. The moved file takes with it the permission it had in the Spreadsheets folder.

Cheers.

You might be interested in
Which of the following initializer lists would correctly set the elements of array n?
Elina [12.6K]

Answer:

The correct answer to this question is option (a).

Explanation:

In the programming language (java) the syntax for declaring,initializing single denominational array can be given as:

Syntax:

datatype array[] arrayname;            // declare the array

Example:             int [] a;                    

a = new int[5];              // create the array

int [] n ={2,5,7,9,3};                 // initialize all elements

Or

a[0] = 2;

a[1] = 22;

a[2] = 12;

a[3] = 20;

a[4] = 23;

In the above we define the way to initialize the array. So the correct way to set array element is option (a).

3 0
3 years ago
A benefit of IPsec is __________.
Montano1993 [528]

Answer:

Option (4) is correct answer

Explanation:

IPsec stands for Internet protocol security. It is a protocol that works between two communication points. It provides integrity, confidentiality and data authentication for any network. It is used for Virtual private network.  There are two types of VPN, From which an organization needs to choose one.

IPsec and OpenSSl in which IPsec VPN uses IP security.

Benefits of this network are as follows--

  • Option 1 states that it works after the transport layer which is true.
  • Option 2 states that when any user leaves the organization they have no need to take back the martial which he had already provided to the organization which is also the benefit of IPsec.
  • Option 3 states that it provides security that is also correct because it is a protocol that is designed to provide security.

Hence option D (all of the above ) are correct.

3 0
3 years ago
To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key.
Ratling [72]
You have to press the Backspace key.
8 0
4 years ago
Q) Look at the code and determine the output
lutik1710 [3]

Answer:

B.

Explanation:

6 0
2 years ago
In 1-2 sentences, describe some keyboard shortcuts you have used during this lesson to save you time.
Aneli [31]
Command C command V command A
5 0
3 years ago
Read 2 more answers
Other questions:
  • 15 points
    5·2 answers
  • The first thing you must consider in any type of communication is ______.
    9·2 answers
  • The ability of a person booking a flight on Southwest's website to reserve a car from Dollar Rent-A-Car without having to leave
    6·1 answer
  • Hands-On Project 15-4 Make Network Cables
    8·1 answer
  • Which statement does NOT describe working with text in presentation programs?
    13·2 answers
  • Simon is producing a report on major rivers in North America. In the report he wants to add a table that displays the statistics
    12·1 answer
  • Differentiate between Computer Science and Information Technology
    10·1 answer
  • Can someone please help me? (,:
    14·1 answer
  • After months of hard work, the big day has finally arrived, and your software will be produced and distributed. Which phase of t
    15·1 answer
  • You notice that you have having problems with attenuation in your home network. What are two possible solutions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!