1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
7

You are in the windows power shell window and decide to encrypt folder which of the following command do you use

Computers and Technology
1 answer:
aleksklad [387]3 years ago
7 0

Answer:

try this script bro

(Get-ChildItem –Path C:\Folder).Encrypt()

Explanation:

simply microsoft just use encrypt() & decrypt() words in script to act doing the method encrypting & decrypting.

but i suggest you to use the windows gui features , its more easier. just right click on your folder target , go to properties then click advanced button , checklist encrypt box.

You might be interested in
4. Contoso, Ltd. has a vigorous Office 365 and Azure cloud-service presence.
OverLord2011 [107]

Answer:

Contoso has an on-premises identity infrastructure. The infrastructure includes servers that run Active Directory Domain Services

Explanation:

3 0
3 years ago
Clickable text or image that takes you to a different site
hichkok12 [17]
A clickable text or image that takes you to a different site is called a Hyperlink or simply a Link.
3 0
3 years ago
Which web browser was created by Google?
Natali5045456 [20]

Answer:

Chrome

Explanation:

6 0
3 years ago
Read 2 more answers
Who can give me answer for this kinda urgent pls
marissa [1.9K]

Answer:

true

Explanation:

it's TRUE the correct answer is true

6 0
3 years ago
When you schedule an appointment, Outlook adds the appointment to the ____ folder by default.
fomenos
C. schedule.

Outlook adds your appointment to your schedule folder.
6 0
3 years ago
Other questions:
  • ____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, man
    11·2 answers
  • Which searching method requires that the list be sorted?
    5·1 answer
  • The max-age attribute of a cookie is specified in
    13·1 answer
  • Match each keyboard command with its result.
    6·1 answer
  • A(n ____ is used to describe the characteristics of data used in a database or other type of computer system.
    12·2 answers
  • #include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid > 0 ) { value += 20; } printf(val
    10·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • Testing a function or program using test values that are at or near the values that change the outcome of the program is known a
    13·1 answer
  • Kevin gets a call from a user who is trying to install a new piece of software. The user doesn’t have administrative rights, so
    10·1 answer
  • L00000000000000000000000000000000000000000000000000000000l they b00ty tickled
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!