1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
5

A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes

the situation?
a. The folders contain older versions of the files.
b. The files are corrupted.
c. The technician needs to change the file attributes.
d. The technician does not have permission.
Computers and Technology
1 answer:
vodomira [7]3 years ago
4 0

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

You might be interested in
__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea
Ludmilka [50]

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
5 0
3 years ago
If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
IRISSAK [1]

Answer:

B:6

Explanation:

FLVS :)

6 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
4 years ago
A petrol (gas) station is to be set up for fully automated operation. A driver inputs his or her credit card into the pump, the
malfutka [58]

Answer:

Explanation:

Gas Filling Station has pumps. Pumps have credit card readers. Driver can able to swipe their cards, pumps have Fuel. Pumps card readers communicate with Credit Company. Driver interacts with pump for fuel and credit card.

In this situation the following we need to treat as objects.

They are Pump, Card reader, Fuel tank, communication system, system controller and price table.

Design pattern for the following system is attached below

6 0
4 years ago
Read the code snippet below and determine which markup language it is:
nignag [31]

Answer:

Sound Card

Explanation:

4 0
3 years ago
Other questions:
  • The maximum number of colors that should be used on a slide is _____. 2 4 6 8
    5·1 answer
  • With which type of media are you interacting when you read an online shopping website?
    7·1 answer
  • Why is it important for software developers to study Human-Computer Interaction? to make sure a user interface is easy to use, w
    10·2 answers
  • ____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
    7·2 answers
  • Which leader of the Jamestown colony am I?
    15·2 answers
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • What is the use of technology to enable people to learn anytime and anywhere​
    13·1 answer
  • PLEASE GO SUPPORT I JUST STARTED 3 WEEKS AGO AND I GET NO VIEWS
    12·2 answers
  • You designed a program to create a username using the first three letters from the first name and the first four letters of the
    6·1 answer
  • Consider the following language:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!