1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
7

You are in the windows power shell window and decide to encrypt folder which of the following command do you use

Computers and Technology
1 answer:
aleksklad [387]3 years ago
7 0

Answer:

try this script bro

(Get-ChildItem –Path C:\Folder).Encrypt()

Explanation:

simply microsoft just use encrypt() & decrypt() words in script to act doing the method encrypting & decrypting.

but i suggest you to use the windows gui features , its more easier. just right click on your folder target , go to properties then click advanced button , checklist encrypt box.

You might be interested in
What is the process called when programmers look for and fix errors in code? Analysis Debug Document Error check
Sunny_sXe [5.5K]
It’s Debug. definition: “identify and remove errors from (computer hardware or software)”.
4 0
3 years ago
Read 2 more answers
What describes Accenture's approach to automation?
kogti [31]

human center because we describe stuff by what we see and obserevs

4 0
3 years ago
Read 2 more answers
Which type of address is the ip address 232. 111. 255. 250?.
svp [43]
I think it’s a multicast
8 0
2 years ago
Which of the following is not true about network design?Group of answer choicesIn designing LAN networks, network designers tend
sergey [27]

Answer:

In designing LAN networks, network designers tend to design err on the side of providing for less capacity than what is currently necessary.

Explanation:

In designing LAN networks, network designers tend to design err on the side of providing for less capacity than what is currently necessary is not true about network design.

8 0
3 years ago
Does anyone go to connections acadomy​
Komok [63]

Answer:

no I dont where is that at

7 0
3 years ago
Read 2 more answers
Other questions:
  • Why is the ipad not considered to be an enterprise-worthy device
    8·1 answer
  • The title bar of a window tells you the name of the document or program that's being displayed in the window, and it also serves
    11·1 answer
  • What does intergrated organization mean
    15·1 answer
  • __ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital
    13·1 answer
  • What can your employer do to protect you from overhead power lines?
    13·1 answer
  • Can an iphone user see when an android user is typing
    10·2 answers
  • Difference between a software package and Integrated software and why users would choose one over the other
    8·1 answer
  • What provision of the Government Paperwork Elimination Act was designed to encourage a paperless society?
    6·2 answers
  • Many companies use telephone numbers like 555-GET-Food so the number is easier for their customers to remember. On a standard te
    6·2 answers
  • A program that converts a program to binary all at once and runs the entire program when finished with the conversion.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!