1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
10

You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim

med. What is the most likely problem?a. Encryption has not been enabled. Use the Computer Management console to enable it.
b. You are not using an edition of Windows that supports encryption.
c. Most likely a virus has attacked the system and is disabling encryption.
d. Encryption applies only to files, not folders
Computers and Technology
1 answer:
yaroslaw [1]3 years ago
5 0

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

You might be interested in
Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi
Aleksandr-060686 [28]

Answer:

b. Code an include preprocessor directives for the members

Explanation:

Namespace in programming can be defined as the declarative region which provides scope for the identifiers such as the functions, name of the types, variables, etc.

The namespaces are $\text{used to organize}$ the code into the logical groups and also used to prevent the name collision.

The ways that can be used outside the namespace $\text{can access the members}$ as :

-- the code used the fully qualifies name

-- by using the declaration to bring one of the identifier into the scope

-- by using the directive to bring all the things in the newspaper into the scope.

Thus the correct option is (b).

5 0
3 years ago
Select the correct answer.
S_A_V [24]
I think the answer is b
5 0
3 years ago
What electronic appliances at your home / school can be controlled remotely? Name any 4
Paladinen [302]

Answer:

Hi how are you doing today Jasmine

8 0
3 years ago
Draw a flowchart diagram for a program that displays numbers 1 to 20
madreJ [45]
Here you go plz mark brainlist
6 0
3 years ago
Pls help I will give points
Fed [463]

Answer:

phone !!

Explanation:

since it's a mobile app, that would apply to a handheld device !!

i hope this helps !!

3 0
3 years ago
Read 2 more answers
Other questions:
  • Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create
    5·1 answer
  • Julio is the department head for his company's customer service department. His staff has complained that they spend countless h
    13·2 answers
  • Write the steps for displaying multiple subtotal functions in excel.
    10·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • What do you believe are the motives of a cyber criminal? Why?
    15·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • Analytical CRM systems are the input for operational CRM systems.<br><br> True<br><br> False
    11·1 answer
  • Peripeteia is also referred to as __________.
    5·2 answers
  • the ghost adventures team uses a variety of tools and technology in investigations. which one is described as an adjustable freq
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!