1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
2 years ago
7

You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of he

r report files. You need to configure her computer so that you can restore the computer to a point in time if needed. In this lab, your task is to complete the following:
Turn on system protection on the C: volume and set a maximum of 5% of disk space for system protection. Turn on system protection on the D: volume and set a maximum of 5% of disk space for system protection. Create a manual restore point. When naming the restore point, choose your own name for the restore point.
Computers and Technology
1 answer:
ladessa [460]2 years ago
7 0

Answer:

Explanation:

Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.

Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.

You might be interested in
Sino ang pinaka matalino sa math sa buong mundo​
Svetllana [295]

Answer:

lahat ng tao ay matalino kasama ka na dun kaya lang di natin ito inilalabas dahil natatamad tayo

6 0
3 years ago
Read 2 more answers
Write a set of directions that tells an operating system’s dispatcher what to do when a process time slice is over.
tatyana61 [14]
<span> Directions that tells an operating system's dispatcher what to do when a process's time slice is over.Wait for the interrupt handler to be execute. Allow the scheduler to update the process table. Select the process form the process table that has the highest priority, restart the time, and allow the selected process to begin its time slice. Directions that tells an operating system's dispatcher what to do when a process's time slice is over. Signal an interrupt, save the current position, execute the current position, execute the interrupt handler, and switch to the next process until the process or processes is complete. If a process executes an I/O request, the time slice of that process will be terminated because it would waste the remaining time waiting for the controller to perform the request. A situation in a time-sharing system in which a process does not consume the entire time slice allotted to it. Client/server model Defines the basic roles played by the processes as being that of either a client, which makes requests of other processes Components of the email address </span>
6 0
3 years ago
Read 2 more answers
The instructions in a program ...
JulsSmile [24]

Answer:

The instructions in a program can only be expressed using a programming language

7 0
3 years ago
Qla
Olenka [21]

Answer:a

What are the activities a Database Designer will do if using the SDLC to design a Database [10]

Q1b

List the five main components of Access Database and state their uses [1

Explanation:

7 0
3 years ago
We can successfully manage influences in our lives by
Natalija [7]

Answer:

D

Explanation:

8 0
3 years ago
Other questions:
  • Under what conditions might the Justice Department approve a merger between two companies that operate in an industry with a pos
    14·1 answer
  • Modern database tools support ________________, which entails separating data from the programs that manipulate data.
    14·1 answer
  • Which protocol is often used to publish web pages to a web server?
    5·1 answer
  • In Java, a char variable is capable of storing any Unicode character. Write a statement that assigns the Greek letter ^ to a cha
    7·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
    11·1 answer
  • What does a coder do on a daily basis?
    8·1 answer
  • 3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, proces
    13·1 answer
  • drag each type of document to the correct location on the table. Drag each document to its respective category
    7·1 answer
  • When individuals are purchasing a computer, they sometimes might get the most expensive computer they can afford. Why might this
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!