1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
7

You are the IT administrator for a small corporate network. The employee in Office 1 occasionally needs a previous version of he

r report files. You need to configure her computer so that you can restore the computer to a point in time if needed. In this lab, your task is to complete the following:
Turn on system protection on the C: volume and set a maximum of 5% of disk space for system protection. Turn on system protection on the D: volume and set a maximum of 5% of disk space for system protection. Create a manual restore point. When naming the restore point, choose your own name for the restore point.
Computers and Technology
1 answer:
ladessa [460]3 years ago
7 0

Answer:

Explanation:

Assuming you have Windows 8 or 10 as the operating system, you would need to do the following. In the search input in the taskbar search for "Create a System Restore Point". In this window, navigate to the System Protection tab. Here, you need to click on the drive you want, we can do C first, and click on the button that says "configure". Here you want to turn on System Protection and set the disk space to 5%. Now click apply and ok and repeat for drive D.

Once that is done you will need to create a manual restore point by clicking the button that says create and giving it the name of your choice.

You might be interested in
Why does dns use udp instead of tcp? if a dns packet is lost, there is no automatic recovery. what are the consequences?
inysia [295]
<span>If a DNS packet using UDP is lost this problem must be handled at the application layer. If an answer is not received after some period of time the specific application may choose to resend the DNS query. I can go much more into detail but this should answer your question. If you need more detail just ask.</span>
6 0
3 years ago
Which of the following is an example of a query with an explicit location? Select all that apply. True False [walmart boston], E
Bond [772]

Answer:

Explanation:

True [walmart boston], English (US)

True  [libraries in san francisco], English (US)

False [coffee shops nearby], English (US)

True [best buy New York], English (US)

6 0
4 years ago
Read 2 more answers
A character with a point size of 10 is about 10/72 of one inch in height. <br> a. True<br> b. False
spayn [35]
<span>The answer to the question stated above is:
A character with a point size of 10 is about 10/72 of one inch in height. This statement is true.
</span><span>
>>>Point size </span><span>is a graphics directive that specifies which points which follow are to be shown if possible as circular regions with diameter</span>
6 0
3 years ago
In theory, the use of a software firewall as a replacement for a network appliance can work as long as the host OS's network com
loris [4]

Answer: Virtual firewall

Explanation: Virtual firewall is the firewall system that is implemented on the virtual environment . These maintain the protection of the  network by the filtration of the network traffic.

This firewall is used as the replacement for the network because they have easy cloud to cloud movement.They also maintain the security by disapproving of the risky communications. It is also easy tom maintain and update.

5 0
3 years ago
What test must you pass to get you're operators licence
Alina [70]
Behind the wheel, the Florida driving test, turn about, shifting gears, parking, backing up, stop quickly, stop signs, signal & turns
5 0
4 years ago
Other questions:
  • Peer to peer software can do the following except
    9·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    5·1 answer
  • You are assigned to modify an existing Webpage by adding several tables that contain precise wording. The Webpage has had severa
    14·1 answer
  • In cell F15, insert a function that will automatically display the word Discontinue if the value in cell D15 is less than 1500,
    6·1 answer
  • Write a program that reads in your question #2 Python source code file and counts the occurrence of each keyword in the file. Yo
    11·1 answer
  • A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.
    8·1 answer
  • Making an analogy between Freudian theory and the brain networks described in an earlier chapter in the text, primary process th
    10·1 answer
  • 3. Write a program that inputs 4 hexadecimal digits as strings (example 7F), converts the string digits to a long – use strtol(i
    11·1 answer
  • 3. Fire and police protection is the main responsibility of
    15·2 answers
  • What is 1 of the rules for naming variables?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!