1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
4 years ago
13

A user needs to open some files that are being shared from a remote computer. however, the user receives an "access denied" mess

age when trying to open some files and folders. what is a probable cause of this? 1 point
Computers and Technology
1 answer:
scoundrel [369]4 years ago
5 0
Hes not a member of the group that has been granted access to view the files
You might be interested in
True or false An electronic form uses input fields in which the user can enter data from their own computer and then transmit t
miskamm [114]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

An electronic form uses input fields in which the user can enter data from their own computer and then transmit the form back to the company - (True)

Yes, it is true, because an electronic form that contains input fields which is used to collect data from the user. The input fields in the electronic form are based on the requirement of the organization about what they want to collect from their user.

For example, when you signup on google account, google company wants to know about your authentication. So the user enters the data in input fields such as first name, last name, phone number etc. When the user clicks on the submit or signup button, all these input values are then transmitted back to the company (google).

7 0
3 years ago
Given the variables isfulltimestudent and age, write an expression that evaluates to true if age is less than 19 or isfulltimest
Pani-rosa [81]
Which language is this in?

if (age<19||isfulltimestudent==true)
    return true;
6 0
3 years ago
Que es la felicidad??​
olchik [2.2K]
Se feliz el amor es nada
4 0
3 years ago
What steps can be used to password-protect a worksheet?
muminat

Answer:

Review

Changes

Protect sheet

Explanation:

I did it

8 0
3 years ago
Which encryption standard uses Advanced Encryption Standard (AES), a 128-bit block cipher that is much tougher to crack than the
Alchen [17]

Answer:

Wi-Fi Protected Access 2 (WPA2)

Explanation:

The Wi-Fi Protected Access 2 (WPA2) makes some alterations to the encryption algorithm that were used in WPA and WEP to what is known as the  Advanced Encryption Standard (AES). This is a 128-bit block cipher considered to be much more difficult to crack than the usual 128-bit TKIP wrapper. However, although WPA2 offers a much more tougher encryption standard, it is important to note that it is not hack proof.

5 0
3 years ago
Other questions:
  • List 3 ways that you can use excel and the features it includes and explain why a spreadsheet is the best choice for this task.
    5·1 answer
  • What are words with the root gest?
    15·1 answer
  • An intranet is an external network.TrueFalse
    15·1 answer
  • La computadora es un medio de comunicacion moderno?
    8·1 answer
  • If a tv was showing a flat black or blue screen or had "snow", what steps would you take to fix it? Give an example of the direc
    11·1 answer
  • Write a class named Car that has the following fields: yearMode1. The yearModel field is an int that holds the car's year model.
    6·2 answers
  • Primary functions of lighting are sufficient light to...
    13·1 answer
  • 1.
    7·1 answer
  • The success criteria are used to judge whether a project is successful. False True <br> need it now
    13·2 answers
  • Why is it easier to spot a syntax error than a logical error?​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!