1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qwelly [4]
3 years ago
15

A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there

fore aren't secure. Why is this?
Question 6 options:

A. There is no way to enforce security on a USB.

B. The USB stick is formatted with FAT 32.

C. The USB stick is formatted with FAT 64.

D. The USB stick is formatted with NTFS
Computers and Technology
2 answers:
Delicious77 [7]3 years ago
7 0
It is (D) because FAT 32 is the most secure option that is why it is most popular
belka [17]3 years ago
5 0

Answer:

The USB stick is formatted with NTFS ( D )

Explanation:

NTFS ( new technology file system ) is file system developed by Microsoft   starting with windows NT 3.1. NTFS is a more sophisticated and improved file system over the previous system like the file allocation table ( FAT ) and high performance file system ( HPFS )

It also has additional extensions that ensures more elaborate  security system based on access control lists and  file system journaling.

the more elaborate security system might be the reason why the user can't get the permissions associated withe the file.

You might be interested in
On which tab can you find the margins button
insens350 [35]
In the tab key you alwAy use that to center
4 0
4 years ago
Read 2 more answers
Write a program that will prompt the user to enter an integer. The program should square the number and then print the squared n
Kay [80]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// function to compute sum and product

void square(int input)

{

   // variable to store the square of number

   long long squ_num;

   calculate the square of number

   squ_num=pow(input,2);

   // print the output

   cout<<"square of "<< input<<" is: "<<squ_num<<endl;

   

}

// driver function

int main()

{

   int n;

   // read the number until user enter 0

   do{

       cout<<"enter a number!! (0 to stop):";

     // read the input from user

       cin>>n;

       // call the function to calculate square of input number

       square(n);

       

   }while(n!=0);

 

return 0;

}

Explanation:

Declare a variable "n" to read the input number from user.Call the function  square() with parameter "n".In this function, it will calculate the square  of the input number and print it.This will repeat until user enter 0 as  input.Program will ends when user give 0 as input.

Output:

enter a number!! (0 to stop):5                                                                                                                                

square of 5 is: 25                                                                                                                                            

enter a number!! (0 to stop):7                                                                                                                                

square of 7 is: 49                                                                                                                                            

enter a number!! (0 to stop):11                                                                                                                              

square of 11 is: 121                                                                                                                                          

enter a number!! (0 to stop):0

3 0
4 years ago
A crowd-funding open source business model, called _______, is where users offer money as a reward for new software or new featu
Lana71 [14]

Answer:

bounties        

Explanation:

The bounties are a free or open-source business model for the funding.It is is a payout or bonus which an offered by the community as a bonus or incentive or reward The bounties is offered when someone task to be done by not normally associated with the member or group.

In the software point of you, the bounties are defined as when the user gives a reward in the existing software when some new features are added into that software.  

5 0
3 years ago
Which sequence best describes the evolution of computers?
SVETLANKA909090 [29]

Answer:

d. Mainframes came before minicomputers, which led to the development of microcomputers.

Explanation:

The first <em>mainframe</em> was introduced in 1951: The UNIVAC (UNIVersal Automatic Computer I): large computer systems, for general purpose, with hundreds of users (separated from the computer) and fast computations, typically deployed by large business, industry, and government organizations.

The <em>minicomputers</em> are another class of computers that start to evolve since the late of the 1950s and the beginning of 1960s (like LINC, PDP-1, among many others), and focused on to have a more direct contact with the user or programmer, and because of this, it is said that minicomputers were the first 'personal' computers. They were cheaper than mainframes and with less memory capacity.

Finally, the <em>microcomputers</em> appeared around the beginning of 1970s (Micral), and sometime later (Altair 8800,  Apple II) and were firstly used by hobbyists and computers enthusiasts. The term microcomputers have been supplanted nowadays by 'personal computers'.

 

7 0
3 years ago
What action demonstrates unethical behavior?
patriot [66]

Answer:

C. Taking credit for another person's work

Explanation:

Taking credit for another persons work is lying and is a harmful thing to do to another person rather then working yourself

6 0
3 years ago
Other questions:
  • Which of the following is not an important consideration before a business invests in a particular technology?
    12·1 answer
  • How do you use the Internet? Think about your typical day. When are you using the Internet? For what purposes? What role does it
    11·1 answer
  • You are asked to write an app to keep track of a relatively small music library. The app should load song information from a dat
    14·1 answer
  • Someone may choose to own a car instead of leasing because:
    14·2 answers
  • Which of these shortcuts becomes available only when text is highlighted?
    10·1 answer
  • A quality assurance test for digital imaging receptors is to check for dark noise. What is the purpose of this test?
    8·1 answer
  • 4. A computer architect boasted that they were able to design a computer in which every instruction occupied exactly thirty-two
    8·1 answer
  • Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.
    8·1 answer
  • Which text features does this section contain? Check all that apply.
    15·1 answer
  • PLEASEEEEEE HELP, ILL DO ANYTHING JUST ANSWER THESE CORRECTLY!!!!!TYSM!!!
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!