1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
3 years ago
10

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi

ssions and attributes
Computers and Technology
1 answer:
True [87]3 years ago
8 0

Answer:

Robocopy

Explanation:

The newer and most used command to accomplish this is Robocopy. This code does exactly what is described in the question, it copies the entire structure of the volume in question but still maintains all of its permissions and attributes. It also allows you to copy large datasets at an extremely fast speed, roughly 150 MB/sec. Robocopy can even resume interrupted file transfers without loss of data.

You might be interested in
List 5 items you should keep in mind when developing an app:
Mrac [35]

Answer:

  1. Agree on aims concerning the application.
  2. Read your end users.
  3. Take your IT partners toward the conversations in the beginning.
  4. Program for various announcements.
  5. Choose the technology which you know and will be able to continue.

Explanation:

You should always keep the above five points while developing an app. You should keep your goals in mind that what kind of app you are going to develop and you are taking surveys from end users that what they want after some time in different cycles. Your team should discuss your project time by time about the progress of an app. Your project should be a long term and should almost cover all kind of users.



6 0
3 years ago
Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
lilavasa [31]

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

6 0
3 years ago
What does an industry expect of you as an employee?<br><br> At least 3 please!
Hatshy [7]
Trusting, loyal, and a hard worker. All indristies want employees who won't backstab, works hard, and is loyal to the company
7 0
3 years ago
Read 2 more answers
true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create stat
Vladimir79 [104]

The random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s) is a false statement.

<h3>What is the meaning of random number?</h3>

A random number is a pick of a number made seemingly at random from a certain distribution such that the distribution is reproduced when a large collection of these numbers is chosen. Such numbers must almost always be independent in order to prevent relationships between succeeding numbers.

Therefore, a hardware or software algorithm known as a random number generator produces numbers at random from a finite or infinite distribution. Pseudo-random number generators and real random number generators are the two primary varieties of random number generators.

Learn more about random number generator from

brainly.com/question/10352102
#SPJ1

8 0
1 year ago
#Create a class called Name. Name should have two attributes
prisoha [69]

Answer:

//class Name

class Name {

// attributes gave you 3

String first_name;

String last_name;

int length = 0;

//constructor with 2 parameters

Name(String first_name, String last_name){

}

//methods

public String find_printed_name(){

return first_name + " " + last_name;

}

public void find_sortable_name(){

return last_name + ", " first_name.charAt(0);

}

public static void main(String[] args){

// instantiate the class

Name test_name = new Name("David", "Joyner");

System.out.println(test_name.first_name);

System.out.println(test_name.last_name);

System.out.println(test_name.find_printed_name());

System.out.println(test_name.find_sortable_name());

}

Explanation:

You didn't specify a language so I did it in Java.

You should know how to declare methods in Python.

3 0
3 years ago
Other questions:
  • Which type of security personnel may work for government as well as for private security agencies?
    7·2 answers
  • Please help with this
    5·2 answers
  • You install a teanviewer on your work station at home so that you can access it when on the road. How can you be assured that un
    12·1 answer
  • Identify the benefit of modeling to communicate a solution. ​
    11·2 answers
  • What happens when two computers use the same IP address?
    15·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • What is adobe photoshop?
    10·2 answers
  • Which of the following is an advantage of using
    6·2 answers
  • In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
    6·1 answer
  • The coordinates for the section element need not be defined as long as its position is set to
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!