1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
6

Marcus White has just been promoted to a manager. To give him access to the files that he needs, you make his user account a mem

ber of the Managers group, which has access to a special shared folder. Later that afternoon, Marcus tells you that he is still unable to access the files reserved for the Managers group. What should you do
Computers and Technology
1 answer:
Svetach [21]3 years ago
4 0

Answer:

log off of his account and log back in

Explanation:

The first thing that Marcus should do would be to log off of his account and log back in. This is so that the new changes to his permissions can take effect. This should solve his problem and grant him access to all the permissions available in the Managers Group. If this does not work, then it is most likely that he is still in the previous group which has the Manager level permissions blocked. In this case he would need to leave the previous group that he is in because the blocking permissions overrides the access allowed from the Managers group.

You might be interested in
A(n) _____ is a legal right of ownership of intellectual property.
marin [14]

Answer:

copyright

Explanation:

Copyright protects intellectual property. If you own a copyright, you own the legal rights to said property.

8 0
3 years ago
Hardware and software work (blank) to allow user to form of function?
Nadya [2.5K]
The answer is Jointly.

<span>No hardware and software cannot work without each other. 
</span>
Example:
<span>without a monitor, how can u install a software?</span>
8 0
4 years ago
Read 2 more answers
An organization is looking to add a layer of security by implementing a solution that protects hosts against known and unknown m
klio [65]

Answer: D) Whitelisting

Explanation:

Whitelisting are used in many applications and it only allows the good known apps. Whitelisting are majorly used for security purpose as, it permits to maintain or control the misuse the apps by employees in an organisation.

Blacklisting maintain the list of denied access system and it prevented the accessing undesirable program. It is also used as security application but it is less effective than whitelisting.

Encryption are the process which are not used in the restricting application. And lockout are used by the users for entering the password for many time as possible.  

Therefore, option (A) is correct.

4 0
3 years ago
in Python. Write a program whose input is two integers. Output the first integer and subsequent increments of 10 as long as the
11111nata11111 [884]

Answer:

a, b = list(map(int, input().split()))

sequence = []

while a + 10 <= b:

   sequence.append(a + 10)

   a += 10

print(*sequence)

Explanation:

6 0
2 years ago
Listed below are several commonly used hardwoods and softwood
Elis [28]
Redwood
Red cedar
Bass wood
6 0
3 years ago
Other questions:
  • Which of the following STEM discoverers is known as the “Prince of Math?”
    13·1 answer
  • In the game Beehive, you play the role of a worker bee who must watch over her hive. Your duties include (among others) directin
    12·2 answers
  • The actual database of active directory shared resources is stored on one or more computers designated as:
    10·1 answer
  • Researching the history of computers is a good troubleshooting technique.<br> True or False?
    5·1 answer
  • ___________________ are aggregated collections of memory and cpu resources that can be shared among groups of virtual machines o
    11·1 answer
  • Por favor alguem poderia me falar qual PC e melhor: Computador Gamer Fox PC FPS Intel Core i5 8GB (GeForce GTX 1050Ti 4GB GDDR5)
    15·1 answer
  • To inspire unit 1 App
    11·1 answer
  • In the NumPy function, the data preparation technique that is used to help machine learning algorithms is called _________.
    9·1 answer
  • A Python file that contains variables and functions and can be used in other programs is called a
    5·1 answer
  • If you use your computer primarily for telnet into a remote computer, will you have a large long distance telephone bill?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!