1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
7

When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?

Computers and Technology
1 answer:
fomenos3 years ago
3 0
For SMB:  \\server\path\to\share
For CIFS: //server/path/to/share
You might be interested in
Write a program to calculate and return total surface area of a box using FUNCTION _END FUNCTION.​
Andrei [34K]

Answer:

def funct1():

   h=int(input("Enter height of the box"))

   w=int(input("Enter the width of the box"))

   L=int(input("Enter the length of the box"))

   surface_area=2*(h*w + h*L + w*L)

   return surface_area

a=funct1()

print(a)

Explanation:

Please check the answer section.

6 0
3 years ago
What is pressure?
Licemer1 [7]
"force per unit area" because pressure is force per unit area.

hope this helped
6 0
3 years ago
Read 2 more answers
It is important to create an IT security program structure that aligns with program and organizational goals and describes the o
AleksandrR [38]

Answer:

Management and coordination of security-related resources

Explanation:

It is essential to make sure that an information security program is highly secured and non-authorized personnel cannot get access to the program. The security of the program is also important to ensure that valuable information and data of clients are safe. This is one of the most vital in security management.

8 0
3 years ago
Write a program to solve the selection problem. Let k = N/2. Draw a table showing the running time of your program for various v
Brums [2.3K]
So here is the code in Python:

n = 0.00 #this is a float because there are some numbers that are decimals.

while n < 20: #n which is 0.00 and while it is lower than 20 if runs the code below
n = n + 1 #it will add 1 to n everything it runs the code.
k = n / 2 #it will divide whatever n is everytime by 2
print(str(n) + '/2: ') # it's printing the number it's on
print(k) # prints the answer for the n.

You can change n to add by any, make n any num instead of 0.00 and you can change the while condition from n < 20 to any other logical statement. If you want to get creative you can take 2 inputs for numbers and make one of them the starting number and other one is the ending number. Also make sure to make n a number lower than you starting point because if you set n as your starting point then it will skip it.

4 0
3 years ago
Big data are used to _____. Select 3 options.
jeka57 [31]

Answer:

AI, Interests, and marketing

Explanation:

Processing privacy policies is not a real function of a large data set.

8 0
3 years ago
Other questions:
  • How long did it take Linkedln to reach 1 million users?
    5·2 answers
  • If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a
    9·1 answer
  • Explain in three to four sentences what happens to data packets once they leave a node.
    11·2 answers
  • Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasti
    14·1 answer
  • Write a script that will read from a file x and y data points in thefollowing format:
    9·1 answer
  • How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
    9·1 answer
  • What is an aspect ratio?
    6·1 answer
  • Sigma Technology is a company based in Singapore, with branches in 24 countries. It needs multiple CAs in different locations to
    6·1 answer
  • The memory capacity in bits for performing the operation y = f (x) using the table lookup method, where x is an 8-bit number and
    7·1 answer
  • Maria is conducting a security investigation and has identified a suspect. The suspect is an employee of the organization who ha
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!