1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
5

A technician is trying to access a user's files and is unable to open any folder or file. Which of the following BEST describes

the situation?
a. The folders contain older versions of the files.
b. The files are corrupted.
c. The technician needs to change the file attributes.
d. The technician does not have permission.
Computers and Technology
1 answer:
vodomira [7]3 years ago
4 0

<em>The answer is </em><em>D. The technician does not have permission. </em>

<em> </em>

<em>Folders are locked that's why he couldn't open any folder or file. There must be a prompt telling him that he doesn't have an access or authority to open those files. This could be done via Folder sharing in the network. And a shared folder can be customized by assigning the proper and correct permission to each user.</em>

You might be interested in
Windows organises information on computer using a
lana66690 [7]
B folder
hope i helped
8 0
3 years ago
Read 2 more answers
You manage the DNS servers for the eastsim domain. You have a domain controller named DNS1 running Windows Server 2016 that hold
Ierofanga [76]

Answer:

..

Explanation:

...

3 0
3 years ago
Select the correct answer. Which is the bottom-most layer in the OSI model?
tatiyna

Answer:

B.Physical layer

Explanation:

I am sure.Hope it helps

3 0
3 years ago
Can you determine if an external web site was likely accessed from a computer in you department a couple of seconds ago?
fredd [130]

Answer:

Yes, it can be determined if an an external web site was likely accessed from a computer in the same department a couple of seconds ago.

Explanation:

Yes. “Dig” can be used to search that website in the local DNS server. A practical example would be to insert “dig google.com” and that will give us the result of the query time for searching and finding google.com. Supposing google.com was accessed a few seconds ago, then an entry for google.com is cached in the local DNS cache and the search or query time is 0 msec. If not the query time will be large.

3 0
3 years ago
Complete the sentence about readability.
Alex787 [66]

Color should have a contrast ratio of four to one or lower.  The lowest contrast ratio should be 3:1.

<h3>What is a 4 5 1 contrast ratio?</h3>

When one has a "normal" sized text or images of text, the required minimum contrast ratio is  said to be 4:5:1.  A large text or images of large text is known to have the minimum contrast ratio is 3:1.

Conclusively, the definition of color ratio is known to be a volumetric ratio that consist of all dark minerals to light in the case of igneous rocks.

Learn more about Color from

brainly.com/question/911645

8 0
3 years ago
Other questions:
  • The website’s________ section will enable Lana to add her company website name and logo to the top of every page of the website.
    8·1 answer
  • What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
    8·1 answer
  • Define function multiply(), and within the function: Get user input() of two strings made of whole numbers Cast the input to int
    11·1 answer
  • Which feature of a typical professional networking site helps users add professional details to their profile?
    7·2 answers
  • There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
    5·1 answer
  • Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparison
    14·1 answer
  • Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shut
    6·1 answer
  • Inputs and outputs that allow a user to interact<br> with a piece of software
    14·2 answers
  • Explain different types of secondary memory of computer system<br>​
    5·1 answer
  • The rules of a programming language constitute its__________________
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!