1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
5

A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes

the situation?
a. The folders contain older versions of the files.
b. The files are corrupted.
c. The technician needs to change the file attributes.
d. The technician does not have permission.
Computers and Technology
1 answer:
vodomira [7]3 years ago
4 0

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

You might be interested in
You need to install a 32-bit application on a 32-bit version of windows 10. In which default directory will the application be i
luda_lava [24]

Answer:

%systemdrive%\Program Files

7 0
2 years ago
Which windows utility should you use to organize the files on your disk to improve efficiency?
olga55 [171]

<span>Disk Defragmenter, is a windows utility that rearranges the records and unused space on the PC's hard disk so that the operating system accesses data more rapidly and projects run quicker. Disk Defragmenter keeps running on a timetable, yet you can likewise break down and defragment your disk and drives manually.</span>

7 0
3 years ago
What would you consider before buying a printer​
Marysya12 [62]

Answer:

Printing Quality, Price, If it van vonnect to my laptop or nay devices.

4 0
2 years ago
Read 2 more answers
A retail store stocks two types of shirts A and B. These are packed in attractive cardboard boxes. During a week the store can s
antiseptic1488 [7]
300 of A and 300 of b
7 0
2 years ago
As our use of the internet increases e-safety becomes essential.<br> Discuss why e-safety is needed.
nlexa [21]

Answer:

The answer is described below

Explanation:

E safety means means protection of private information and personal safety when using the internet. E safety involve the protection of private information, passwords against identity theft or property theft. A persons  private information, passwords can be gotten through the use of phishing or malwares.

Also, the use of internet has exposed people to cyber bullying(i.e abuse of an individual), stalking, engaging underage children into sexual relationships and sextortion.

E safety  help protect children from harmful content and services as those listed.

8 0
3 years ago
Other questions:
  • Encryption relies on the use of _________to ensure that information is readable only by the intended recipient.
    5·1 answer
  • How does Hadoop work? It breaks up Big Data into multiple parts so each part can be processed and analyzed at the same time on o
    5·1 answer
  • If you feel that an OSHA inspection is needed to get hazards corrected at your workplace, which is your best option?
    7·1 answer
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • How does technology make America great?​
    10·1 answer
  • Explain each of the three important concepts behind the Federal Networking Council's definition of the term Internet. Explain ho
    8·1 answer
  • Why does computer uses 0s and 1s to procress data​
    7·2 answers
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • The range of an area where users can access the Internet via high-frequency radio signals transmitting an Internet signal from a
    9·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!