1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saul85 [17]
3 years ago
15

What are the basic features of Usenet group

Computers and Technology
1 answer:
Ainat [17]3 years ago
7 0
The Osa net is a powerful fact Militar of group communication across the time and geographic space. One person can post a message on the use Annette another person will reply to it and a third person reply to either message, no matter where they are in the world and whenever it’s convenient to them
You might be interested in
I’ll give Brainly if u answer all please <br> ASAP
Yuki888 [10]

Answer:

Answers are: 38, 135, 23, 209, 53 & 181 respectively

Explanation:

8 0
3 years ago
What are the responsibilities of the DBA and the database designers?
Ratling [72]

Answer:

Explanation:

DBA's main responsibility is making sure that there is enough CPU, disk, memory, and network bandwidth available, as well as making backups every so often. Meanwhile, the database designers/developers are responsible for investigating and implementing what the end-user needs and making sure that the database holds all of the information that the end-user will be using.

3 0
3 years ago
We have a user Sally Smith who we want to grant the ability to launch applications and browse folders. But we do not want her to
igomit [66]

Answer:

LIST

Explanation:

NTFS is A proprietary journaling file system developed by Microsoft. It started with windows 3.1.

List Folder Contents: Is what Gives authorized user the permission to viewing and listing of files and sub-folders as well as executing of files inherited by folders only.

NTFS permissions applies to every file and folder stored on a volume formatted with the NTFS file system. By default, permissions are inherited from a root folder to the files and sub-folders beneath it, although this inheritance can be disabled.

List Folder Contents will allow you to display the folder's contents and to display the data, attributes, owner, and permissions for files within the folder.

The NTFS permission that applies to the Domain Users group that will allow Sally to do what he wants without allowing more access than necessary is LIST.

8 0
3 years ago
You are flying an aircraft equipped with an electronic flight display and the air data computer fails. What instrument is affect
Makovka662 [10]

Answer:

cause loss of power, excessive oil consumption, and possible permanent internal engine damage.

Explanation:

4 0
3 years ago
problemas demográficos o movilizaciones que se generaron a lo largo de la historia de Honduras debido a la explotación minera​
BabaBlast [244]

Answer:

Explanation:“Se realizaron varios estudios y confirmamos que la actividad minera ha provocado graves problemas dermatológicos y de la vista, caída del pelo, partos prematuros, malformaciones congénitas y abortos. También se detectaron niveles altísimos de metales pesados en la sangre de las personas.

7 0
3 years ago
Other questions:
  • As you are planning your informative speech on the prevalence of Internet memes in pop culture and you wonder if your audience w
    14·1 answer
  • What has prompted schools to add Internet activities in their academic integrity policies?
    6·2 answers
  • Write a program that reads in two integers typed on the keyboard and outputs their sum, difference, and product.
    12·1 answer
  • Which of these are correctly formatted python dictionaries? Check all that apply.
    5·2 answers
  • Can you answer your own question on brainly?
    12·2 answers
  • 3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
    7·1 answer
  • Direct Mapped Cache. Memory is byte addressable. Fill in the missing fields based upon the properties of a direct-mapped cache.
    6·1 answer
  • When you are using remote control services and need to enter the ip address of the system you want to control, you should use th
    6·1 answer
  • What is stored in studentScores after running the program code?
    5·1 answer
  • In 1956, the unit byte was coined by American statistician and computer scientist John Tukey
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!