1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
5

A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes

the situation?
a. The folders contain older versions of the files.
b. The files are corrupted.
c. The technician needs to change the file attributes.
d. The technician does not have permission.
Computers and Technology
1 answer:
vodomira [7]3 years ago
4 0

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

You might be interested in
In the classroom settting,listeners can best help reduce speaker presentation anxiety by______
Anuta_ua [19.1K]

speaker ?

notify me if wrong i must know.

3 0
3 years ago
The Review feature automatically adjusts to select the edited information.<br> true of false
NNADVOKAT [17]
True I hope this helps
8 0
3 years ago
Read 2 more answers
The physical part or components of a computer system called​
Margaret [11]
Hardware is what it’s called
4 0
3 years ago
Read 2 more answers
What’s the difference packet switching and message switching??
Sphinxa [80]
Im not sure but the person above is right x :)))


Explanation dudjdb
6 0
3 years ago
I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.
Scorpion4ik [409]

Answer:

oh- Did he find out-

Explanation:

8 0
3 years ago
Other questions:
  • In the 2007/2010 version of Paint, which of the following tools are located in the View tab? (Select all that apply.)
    5·1 answer
  • Sending packets with false ip source addresses is called ____. ip address spoofing a port scanning attack a ip address scanning
    11·1 answer
  • You have been approached by the network administrator of the company whose office is adjacent to yours. He has advised you to mo
    5·1 answer
  • What are ways to switch windows in Excel? Check all that apply. On the status bar, click the Windows button, and then click the
    9·1 answer
  • What should be included in research for a problem statement? Select all that apply
    13·2 answers
  • Do these devices allow you to view photos using the cloud?
    10·1 answer
  • 9. Differentiate between bolding and highlighting<br>text.<br>(2 marks)​
    15·2 answers
  • Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you
    15·1 answer
  • Convert 10101010 into decimal number system​
    13·2 answers
  • Describe the role of a distributed file system in a job execution environment such as MapReduce in a large-scale cloud system. g
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!