1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
7

You are in the windows power shell window and decide to encrypt folder which of the following command do you use

Computers and Technology
1 answer:
aleksklad [387]3 years ago
7 0

Answer:

try this script bro

(Get-ChildItem –Path C:\Folder).Encrypt()

Explanation:

simply microsoft just use encrypt() & decrypt() words in script to act doing the method encrypting & decrypting.

but i suggest you to use the windows gui features , its more easier. just right click on your folder target , go to properties then click advanced button , checklist encrypt box.

You might be interested in
Write an efficient C++ function that takes any integer value i and returns 2^i ,as a long value. Your function should not multip
Ilya [14]

Answer:

long power(int i)

{

   return pow(2,i);

}

Explanation:

The above written function is in C++.It does not uses loop.It's return type is long.It uses the function pow that is present in the math library of the c++.It takes two arguments return the result as first argument raised to the power of second.

for ex:-

pow(3,2);

It means 3^2 and it will return 9.

4 0
3 years ago
What activities are the most likely to infect your computer with a virus? Check all that apply
Alex17521 [72]
Opening unfamiler emails and visiting unknown websites
4 0
3 years ago
Read 2 more answers
What is one purpose of an algorithm
adelina 88 [10]

Answer:

Algorithms is formula for solving a problem. It is helpful because it specifically give instructions detail to computer to what a computer should perform a specific task.

For e.g. calculating report cards.

4 0
3 years ago
What value(s) can be input into this code for the value of number that will cause the code in the loop to execute? Scanner keybo
Marianna [84]

Answer:

There is no value of the number variable, for which the loop can be true in any iteration.

Explanation:

  • The above loop states the condition that the value should be less than 100 and greater than 500. It is because the loop holds the and condition which gives the true if both conditions will be true.
  • The first condition of the while loop states that the value of the number variable is less than the 100.
  • The second condition of the while loop state that the value of the number variable is greater than the 500.
  • The and condition of the while loop will true if both conditions will true.
  • But there is no number which is less than 100 and greater than 500.
  • So no number can satisfy the while condition to be true.

5 0
3 years ago
Which is not a characteristic of system testing?
alexandr1967 [171]

Answer:

Characteristics of system testing include;

1. It is the first full assessment of a complete software package.

2. It evaluates the functional, non-functional, and business requirements of a software package.

3. It is similar to black-box testing.

4. It is done by a team of specialized software testers.

5. It helps to ensure the optimal performance of the software after it is deployed.

Explanation:

System testing is a form of software testing that is done to evaluate the full software package before deployment. The testing is done on the basis of some standards and specifications that had been previously established. It is the first testing that is done in a series of software ware testing. This system testing ensures that the functional, business, and non-functional requirements of a software package are met.

It minimizes the problems that are likely to be experienced by a software program that goes unchecked. One such problem is troubleshooting. It is a very important test that should be performed on any developed software.

3 0
3 years ago
Other questions:
  • Complete the following:_____
    9·1 answer
  • Elise has just edited two photos of her cat and three different photos of her dog. She needs to save all five of these photos in
    5·2 answers
  • The gaining of unauthorized access to data in a<br> system or computer:
    11·1 answer
  • In the __________ Standard, chemical manufacturers, importers, and distributors are required to provide hazard information by wa
    12·2 answers
  • Which words in the sentence make up the adjective phrase? Which word does the adjective phrase modify? The farmer delivers five
    15·1 answer
  • What does Putting a word in quotation marks on your search bar do on google?
    12·1 answer
  • Assume that you are testing the Orders database introduced in Watt (2014) - Appendix C. Discuss the problems and possible conseq
    12·1 answer
  • "What technology will examine the current state of a network device before allowing it can to connect to the network and force a
    6·1 answer
  • Need help fast this is do a 4
    5·1 answer
  • When a company sends you recommendations of what to buy you know that :
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!