1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ValentinkaMS [17]
4 years ago
13

A user needs to open some files that are being shared from a remote computer. however, the user receives an "access denied" mess

age when trying to open some files and folders. what is a probable cause of this? 1 point
Computers and Technology
1 answer:
scoundrel [369]4 years ago
5 0
Hes not a member of the group that has been granted access to view the files
You might be interested in
What device is used to transmit what is effectively a type of Morse code between stations?
IrinaVladis [17]
<h3>Its B 100% sure.....</h3>

Brainiest Please :)

6 0
3 years ago
After pasting data, what can be done to access more options for how to paste it? You can change the formatting in the original c
uysha [10]

<span>You can click the smart tag that pops up after pasting.
</span>

♣Amaranthine
8 0
3 years ago
What information is used in a communication between two system
xz_007 [3.2K]

Answer:

IPv4 address. I guess, it's kind of tricky. lol

6 0
3 years ago
Match each Excel term to its definition. cell a group of cells containing related data ribbon a row of tabs, groups, and command
Artist 52 [7]

Answer:

ribbon- a row of tabs, groups, and commands

range- a group of cells containing related data

title bar- file name

cell- a container used to input data

worksheet- Excel’s version of a spreadsheet

Explanation:

6 0
3 years ago
The laws governing search and seizure in the public sector are much more straightforward than those in the private sector. TRUE
Lapatulllka [165]

Answer:

True

Explanation:

Because of the contract that you have agreed to when joining the work force. Which is different from the private sector.

7 0
3 years ago
Other questions:
  • Password cracking is a technique used to extract user’s password of application/files without the knowledge of the legitimate us
    11·1 answer
  • When a computer restarts without a hardware power-down-power-up cycle, it is doing a _______________?
    9·1 answer
  • An agile team used planning poker to estimate user stories. After all team members read a user story, the facilitator asks every
    7·1 answer
  • Joshe is a project leader in Tiran technologies. 75 developers and analysts work under his supervision on several projects. Thes
    12·1 answer
  • File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
    8·1 answer
  • Consider the following code segment:
    14·1 answer
  • Choose the word that matches each definition. : processed facts, how the output is used for making decisions : action performed
    12·2 answers
  • Why do we use if statements?
    9·1 answer
  • Write a function that receives a one-dimensional array of integers and returns a Python tuple with two values - the minimum and
    10·1 answer
  • 9) Which date is assigned the serial number of 1?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!