1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikdorinn [45]
3 years ago
12

Hey!! Can u help me please!!​

Computers and Technology
2 answers:
BartSMP [9]3 years ago
4 0

1. deletes file named school.txt

2 copy Aic.txt to windows

3. display the volume label and serial number if logical drive

4. remove directory named ASIAN

5.lists all files and sub directories of OS

6. displays current date and time

Answer:

Explanation:

what guy under me coreect

igor_vitrenko [27]3 years ago
3 0

1. deletes file named school.txt

2 copy Aic.txt to windows

3. display the volume label and serial number if logical drive

4. remove directory named ASIAN

5.lists all files and sub directories of OS

6. displays current date and time

You might be interested in
Can someone follow my tt its c1ndy.dont.miss
Stells [14]

Answer:

hiii

Explanation:

kk ill follow you do you have any vids

5 0
3 years ago
What is the term for the error caused when one end of an unshielded twisted-pair (UTP) cable is terminated in the T568A configur
FinnZ [79.3K]

Answer:

A transposition is the correct answer.

Explanation:

A transposition is the type of encryption that caused when one side of the unshielded twisted pair cable is finished in the configuration of  T568A and at the other side of the configuration of T568B, it is also termed as error or cipher. So, that's why the following answer is true.

7 0
3 years ago
Hi Im really a girl and i want to know how to change my username without having to make a new account?
bixtya [17]
No sadly.
You can change your e-mail, profile picture, but that's about it.
I didn't see an option to change your name.

7 0
3 years ago
Read 2 more answers
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
Mashcka [7]

Answer:

d. The technician should be setting NTFS permissions instead of using Group Policy.

Explanation:

NTFS (New Technology File System) permissions run on drives formatted with NTFS.Under NTFS permissions, individual users are granted permission at the Windows logon and so in this way local users and network users are affected, affecting each user from wherever he may be connecting from. In the example above using NTFS permissions would solve the problem of file system among departments .

4 0
2 years ago
When was the Ethics Resource Center (ERC) established? In the 1970s In the 1980s In the 1990s In the 2000s
baherus [9]

Answer:

1922

Explanation:

i looked it up When was the Ethics Resource Center (ERC) established?

4 0
3 years ago
Other questions:
  • What type of link is used to call this file
    11·1 answer
  • What runs a network, steering information between computers and managing security and users?
    11·1 answer
  • Throwing an improperly drained oil filter into the trash dumpster is a violation that can carry heavy penalties. A) true b) fals
    7·1 answer
  • Two students are discussing the flow of electricity. Student A says that voltage is a measure of the amount of electron flow in
    8·1 answer
  • __________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
    9·1 answer
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • In java
    6·1 answer
  • What is also known as computer Network?
    6·2 answers
  • Which of the following helps you plan out every step of an animation?
    12·2 answers
  • Write a method in pseudocode or Java called move that accepts a boolean[], integer value, and a boolean value. Your method shoul
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!