1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Westkost [7]
4 years ago
13

User Jsmith is a member of the Accounting and Contractor groups, and is trying to save a file to Folder A on his local computer,

but finds he has no access. Upon investigating, you discover the Accounting group has Full Control over Folder A, but the Contractor group has been denied all access to the folder. What Jsmith's effective access?
Computers and Technology
1 answer:
DochEvi [55]4 years ago
4 0

Answer and Explanation:

Jsmith's membership in the Contractor group means that he has been denied all access to the folder.

You might be interested in
Similarities of ROM and RAM?​
lesantik [10]

Explanation:

both are primary storage devices

4 0
3 years ago
What is the difference between a computer’s RAM and its hard disk?
san4es73 [151]

Answer:

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Explanation:

Most RAM (random access memory) used for primary storage in personal computers is volatile memory. Volatile memory contrasts with non-volatile memory, which does not lose content when power is lost. Non-volatile memory has a continuous source of power and does not need to have its memory content periodically refreshed.

8 0
2 years ago
Read 2 more answers
The expressionvecCont.empty() empties the vector container of allelements.
Semenov [28]

Answer:

False

Explanation:

vector is like a dynamic array that has a special ability to resize automatically when it required.

vector has several functions:

like, insert() to insert the element in the vector.

delete() for delete the one element at a time.

empty() is also the function used in the vector. It is used for checking the vector is empty or not.

it gives the Boolean value (TRUE or FALSE), if the vector is empty it gives the output TRUE if the vector is not empty it gives the output FALSE.

It is not used for empty or deletes all elements of the vector.

Therefore, the answer is False.

4 0
3 years ago
1. The________  member function moves the read position of a file.
emmasim [6.3K]

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

8 0
3 years ago
Company A’s IT department has a hosting platform specifically for systems used by the company’s large marketing department. This
agasfer [191]

Answer:

cloud has the On demand and ubiquitous access characteristics

Explanation:

The specific characteristics of cloud that would be helpful for his problem to be addressed is the fact that cloud offers on demand usage and ubiquitous access.

What is meant by on demand access is that the cloud customer can pay for cloud services and use them whenever they are needed. As long as the cloud service is authorized.  

By Ubiquitous access it means that the cloud customer has reliable access without the presence of any form of disturbances or issues and it can be accessed from anywhere. Different range of devices are supported on the cloud platform and with the presence of internet lots of services can be accessed.

Based on the issues being faced by customers, this characteristics of cloud will be useful to address the problems.

6 0
3 years ago
Other questions:
  • What name are input devices, output devices, and auxiliary storage devices collectively known?
    9·1 answer
  • Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?
    15·1 answer
  • Which of the following is necessary to effectively navigate online?. A. You must be able to identify important questions. B. You
    12·1 answer
  • Smartphones are the top target for _______ that locks a device and then requests payment for an unlocking code.
    5·1 answer
  • You have heard that it is possible to improve your computer's performance by storing all related files for a particular program
    9·1 answer
  • A printer would be considered _____. Select 2 options. 1 an input device 2 an output device 3 hardware 4 software 5 storage
    10·1 answer
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Several programmers write individual code modules that are used for different processes in a vehicle. Individual tests have alre
    13·1 answer
  • In a typical day, what types of Computer-Mediated Communication do you use?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!