1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
7

You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of he

r report files. You need to configure her computer so that you can restore the computer to a point in time if needed. In this lab, your task is to complete the following:
Turn on system protection on the C: volume and set a maximum of 5% of disk space for system protection. Turn on system protection on the D: volume and set a maximum of 5% of disk space for system protection. Create a manual restore point. When naming the restore point, choose your own name for the restore point.
Computers and Technology
1 answer:
ladessa [460]3 years ago
7 0

Answer:

Explanation:

Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.

Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.

You might be interested in
The term that refers to the standard computer language for creating web pages is called:
Pavel [41]

Answer:

Language programming Web's programming language

Explanation:

6 0
3 years ago
Which of the following is an HTTP response status type?
andrey2020 [161]

Answer: All of the above

Explanation:

200 OK, 301 permanently moved and 400 bad request all are the Hyper text transfer protocol (HTTP) response status type. The HTTP response status types basically indicated the complete request in the HTTP.

All these given types are the responses and request that are involved in the HTTP status type.

200 OK is one of the request which basically depends upon the HTTP status type success.

301 permanently moved is the response in the URL which are used for permanently change the resources of request.

And 400 bad request is not properly understand by server due to the invalid syntax in the HTTP.

6 0
3 years ago
2) List three (3) negative impact of Technology on society
Nataly [62]

Answer:

1. social media and mobile devices may lead to psychological.

2. They may contribute to more serious health conditions such as depression.

3. The overuse of technology may have a more significant impact on developing children and teenagers.

Explanation:

may this help you have a good day

5 0
3 years ago
What can give working people information about their fields, including conferences and leadership opportunities in those fields?
Juli2301 [7.4K]
<span>What can give working people information about their fields, including conferences and leadership opportunities in those fields?


C: a professional organization </span>
8 0
3 years ago
Read 2 more answers
The display in D1 should read Colin McCain what text function should be used
Kaylis [27]

Answer:

The answer is "SUBSTITUTE(D1,"c","C",1)"

Explanation:

In the given question, some information is missing, that is an option so, the correct option can be described as follows:  

  • Many of us use the Bulletin feature, which is available in MS-Excel.  In these function the SUBSTITUTE is a method, that is used in Builtin to aim the functions to locate a string or character and to replace with the selected module.  
  • In the case of the end-user, it would like to replace "c" with a capital letter "C." And displays cell shifts in D1. This method uses 4 parameters, in which first describes cell reference, second string to located, third replacing string, and fourth its length.
8 0
3 years ago
Other questions:
  • Are there protections for people in terms of what data can be collected by different sites?
    10·1 answer
  • OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communicati
    6·1 answer
  • There was an airplane crash, every single person on board died, but yet two people survived. How is this possible?
    5·2 answers
  • A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provi
    7·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • A motorist is using the AHP to choose a new car from three possible models Arrow, a Bestmobile and a Commuter. The choice will a
    15·2 answers
  • int temp; temp = 180; if ( temp &gt; 90 ) { System.out.println( "This porridge is too hot." ); // cool down temp = temp – ( temp
    9·1 answer
  • What are some of the ways we can resolve IPv4 address shortages? Check all that apply.
    13·1 answer
  • Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology
    8·1 answer
  • Working with text in presentation programs is very ____ using text in other applications.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!