1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
7

Numdu

Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
4 0
The question is unclear /unfinished please send again.
You might be interested in
Cuando se creo argentina​
vekshin1

Answer:

Argentina se creó tras su independencia respecto de España el 9 de julio de 1816, tras 6 años de guerra por la independencia del país, donde líderes como Manuel Belgrano, Martín Miguel de Güemes y José de San Martín derrotaron a los españoles.

La unidad nacional de los argentinos, a su vez, se originó tras las invasiones inglesas de 1806 y 1807, y se consolidó tras la conquista de España por parte de los Bonaparte, que dio origen a la Revolución de Mayo de 1810, donde los argentinos decidieron imponer un gobierno propio.

7 0
3 years ago
Which phrase best describes a scenario in Excel 2016?
Airida [17]

Answer:

what are the phrases?

Explanation:

6 0
3 years ago
Outline the steps necessary to prepare a storage device for storing files. Identify and briefly describe the tools used to prepa
Fantom [35]

Answer:

Outline the steps necessary to prepare a storage device for storing files.

  1. Link the storage unit to a network, whether it be a laptop computer or a mobile device.
  2. Firewall it with sufficient anti-virus so that it also does not affect the linked system.
  3. The program must auto-install the storage device on the network after quarantine, and authorize it.
  4. Test the file that requires to be moved to the storage device, then upload it to the storage device after anti virus is safe.
  5. Should not directly pull the storage device out of the network, select the exit device option correctly and only then remove the device after it has been accepted.

Identify and briefly describe the tools used to prepare a storage device for storing files.

<em>EFSDump -</em> Users can share encrypted files by carrying certificates by using EFSDump. It is usually very time consuming to audit the users who have privileges. But it is very simple to list users who have access to encrypted files using EFSDump.

<em>SDelete -</em> Suppose Windows operating system eliminates the index and prevents access when we delete a file. All the same, attackers can still recover the contents of the file. Files that are encrypted by EFS leave the file behind on the disk. Using the SDelete tool we can modify free space to prevent the recovery of deleted files.

Explain why file systems are critical components of an operating system. What is their purpose?

Hypothetically defining file system is nothing more than the way files are called and logically organized for storage.

Ex: DOS, Windows, and Unix-based operating systems all contain various file systems where data is organized in tree structure.

Usually defines the naming of files, how long the suffix can be. The file system often includes a format indicating the access to a file.

Specify the file system or file systems that would be available with that operating system.

A file system controls the mechanism by which data is stored and accessed on a disk. This deals mainly with internal disk operations such as naming files, records, directories, documentation, storage management, and other protocol accesses.

  1. FAT (File Allocation Table)
  2. NTFS (New Technology File System)

Describe from an administrator perspective what is necessary to prepare a storage device for access by a user.

Connection to the storage unit is equipment-oriented. The Windows Explorer summary contains optical drives, USB keys and hard drives as separate devices, making it much easier to navigate a new computer.

To connect a Linux computer you must mount the drive by connecting it to a directory.

Usually mounting a device is a manual operation, since only the administrator determines which directory the system attaches to.

Graphical interfaces are seldom seen on Linux servers. When you plug a storage device into a USB port on your computer, nothing can happen.

Usually the mount command looks like mount/dev / sdb1/mnt, where /dev / sdb1 is the system and /mnt is the directory you want to mount it.

List a few ways that a user can utilize a file system.

System output can be improved not only by choosing the most appropriate file system(s) but also by using the various choices available for most file systems.

There are variations in the number of options depending on the specific file system, and some options can only be set at the time of development of the filesystem, even though it can be modified afterwards.

7 0
3 years ago
how do you set up a slide show to play continuously, advancing through all slides without requiring your interaction? A. Click S
Archy [21]

Answer:

B. Click Set Up, Slide Show, and then select the Loop continously until 'Esc' and use timings, if present options.

Explanation:

PowerPoint presentation is a program which was developed by Microsoft. It is a platform which is used to create business presentation or educational presentations, etc.

In order to play the slide show continuously without our interaction, we need to do the following steps :

1. In the powerpoint presentation, we have to click  "Slide Show" tab in the ribbon and then click on the "Set up slide show" on the Set Up bar.

2. The set up slide show dialogue box will pop up. In this we have to  check or tick on the "Loop continuously until 'Esc' " in the "Show Option" and then click 'OK'

3. Now in the "Slides" preview side panel, we have to click the 1st slide , then Press and hold the 'Shift' key and then click the last slide. This selects all the slides.

4. Now, in the transition tab, in the "Timing" group, we have or uncheck or untick the " On Mouse Click " and also check the " After"

6 0
2 years ago
A computer on a network that is not the server​
katrin [286]

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

5 0
2 years ago
Other questions:
  • Kuta software infinite pre- algebra multiplying polynomial and a monomial find product answer key
    14·1 answer
  • Question 1 (1 point)
    10·2 answers
  • “identify the skill in the following scenario” :
    6·2 answers
  • Which browser should you choose if you want all viewing information except thumbnail previews of websites?
    15·2 answers
  • Why do you classify computers?
    6·1 answer
  • Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the
    15·1 answer
  • Https://www.blooket.com/play?id=300932<br> please
    8·2 answers
  • Which online note-taking device allows students to clip a page from a website and reuse it later?
    13·2 answers
  • Convertbinary(111100)to decimal​​​​
    13·2 answers
  • Database queries is an example of
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!