1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
10

You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim

med. What is the most likely problem?a. Encryption has not been enabled. Use the Computer Management console to enable it.
b. You are not using an edition of Windows that supports encryption.
c. Most likely a virus has attacked the system and is disabling encryption.
d. Encryption applies only to files, not folders
Computers and Technology
1 answer:
yaroslaw [1]3 years ago
5 0

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

You might be interested in
Write the icon of full justification​
ad-work [718]

Answer:

In the paragraph group, click the Dialog box Launcher. ,and select the Alignment drop - down menu to set your justified text. You can also use the keyboard shortcut , Ctrl + J to justify your text

6 0
2 years ago
The method used to transfer information to far off place instantly is called​
ahrayia [7]

Telecommunication

Explanation:

4 0
2 years ago
Read 2 more answers
The internet in this Packet Tracer network is overly simplified and does not represent the structure and form of the real intern
Vlad1618 [11]

Incomplete question. However, I answered from a general IT perspective.

<u>Explanation:</u>

It is important to note that the internet |(or real internet) in this case, refers to a global network of interconnected networks (internetworks) linked together for the purpose of communication. In other words, it is a broad global network arranged in a mesh network topography form.

It is also important to <em>remember </em>that nobody owns the internet, in other words, it is open an source network. So some internet service providers (ISPs) have a business model where they make revenue by having users pay in other to have the internet service delivered to them.

6 0
2 years ago
Each Google My Business location has a unique ID that applies changes to the right listing.
Soloha48 [4]

Answer:

The correct answer to the following question will be option c. Store Code.

Explanation:

A store code will be the unique ID which can uniquely identify any location of that store.

  • Any random number or name can be the store code.
  • A store code in each Google My Business (GMB) will only be viewable to the person who is managing that locations arround the store.
  • Any costumer doesn't have possibility to see it.

Hence, Option C is the right answer.

6 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Find some search engine as many that you can find
    9·1 answer
  • What kind of game was pole position?
    6·2 answers
  • A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart
    14·1 answer
  • When was internet started in which year​
    13·2 answers
  • For this assignment, select one of the organizations with a prominent IT department from the Topic 1 assignment. Once identified
    11·1 answer
  • Command create database in oracle database ::((
    8·1 answer
  • Explain the history of computing device of mechanical era
    7·1 answer
  • What do people in the movie e.t think about the character E.T
    9·1 answer
  • Suppose a large group of people in a room were all born in the same year. Consider the following three algorithms, which are eac
    8·1 answer
  • A for construct is a loop construct that processes a specified list of objects. As a result, it is executed as long as there are
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!