1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Troyanec [42]
3 years ago
8

When setting quotas for disk space, what are the two tools for enabling and configuring quotas? and which of the two are the mor

e flexible?
Computers and Technology
1 answer:
lora16 [44]3 years ago
8 0
NTFS quotas
File server resource manager.

A system admin has rights to set NTFS quotas if he or she is concerned with some users monopolizing a small amount of disk space. Activating NTFS quotas helps set a storage limit for users using a particular volume. Out of the two, file server resource manager is the most effective and flexible. It is best recommended to use file server resource manager if you need quotas. It comes with file-type filtering and includes folder-level quotas.
You might be interested in
Explain software piracy and Hacking​
Andru [333]

Answer:

Hacking refers to attempts to gain information from otherwise undisclosed areas. Hacking is the most commonly known computer crime, however, people refer to hacking as committing any criminal act using a computer while this is not the case. ... Piracy refers to the unauthorized duplication of computer software.

Hope this helps!!

Explanation:

8 0
3 years ago
Read 2 more answers
Assume that ip1, ip2, and ip3 have already been declared to be of type "pointer to int". Assume further that each of these point
kaheart [24]

Answer:

void main(){

int *ip1,*ip2,*ip3;

printf("Enter values for ip1 and ip2\n");

scanf("%d\n",ip1);

scanf("%d\n",ip2);

*ip3=*ip1+*ip2;

}

Explanation:

*ip3=*ip1+*ip2;

this statement is used to add the values of two pointer variables and storing it in third pointer variable.

*ip1 --->ip1 gives address location of the variable and *ip1 gives the value stored at that address location

5 0
3 years ago
now, it’s time to process the data. as you know, this step involves finding and eliminating errors and inaccuracies that can get
nikklg [1K]

The thing that a person need to do that might  fix this problem are:

  • Ask a colleague on your team how they've handled similar issues in the past
  • Ask you supervisor for guidance.
<h3>What are errors in quantitative analysis?</h3>

The term error is known to be a word that connote a mistake in a given work. Note that the types of errors in lab measurements are random error, systematic error, and others.

To be able to  remove or correct error, one must have the knowledge of what the error is and when you do not know, it is good you ask others.

Therefore, The thing that a person need to do that might  fix this problem are:

  • Ask a colleague on your team how they've handled similar issues in the past
  • Ask you supervisor for guidance.

Learn more about Error from
#SPJ1

See options below

Sort the spreadsheet so the row with missing data is at the bottom

Ask a colleague on your team how they've handled similar issues in the past

Ask you supervisor for guidance

Delete the row with the missing data point

5 0
2 years ago
How can people efficiently and effectively influence lots of people throughout the world
tatuchka [14]

Answer:

The word efficient denotes the ability to achieve a good goal toward a person, and effectiveness denotes reliable production or achievement.

Explanation:

Many people around the world can set efficient goals, that is, to influence or encourage other people to make good projects or changes in their lives, by example or simply teach them with patience and altruism.

In this way effectiveness will be seen, that is, the product or the achievement precisely when we observe how people undertake new projects in their lives

3 0
4 years ago
Can the constraint checks be executed efficiently when updates are applied to the database?
AlladinOne [14]

Answer:

 In the database system, the constraint are basically used for enforced the referential integrity in the system more efficiently.

It maintain the data logically in the system and it basically prevent the incomplete information and data from residing the database system. Constraints are mainly represent the data columns in the table in which the rules are get enforced in the system.

There are mainly two types of constraints in the database system that are as follows:

  • Key Constraints
  • Foreign key constraints

3 0
3 years ago
Other questions:
  • Really need help with these PLZ
    6·1 answer
  • To help determine which technology to use, Raul creates a table to help him compare the pros and cons of his choices. What part
    15·1 answer
  • Code the function (insertNth list N insValue) which constructs a new list by inserting the specified insValue into the list afte
    6·1 answer
  • When it comes to safety, the choice to be safe is often up to __________?
    8·1 answer
  • What is another term for online data storage?
    5·1 answer
  • What is the printout for the first statement in the main method?
    13·1 answer
  • Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
    13·1 answer
  • What is the cheapest way to add more USB ports to your computer?
    14·1 answer
  • The percentages in the table represent the performance change from the previous month. Consider the impact of each metric on cus
    12·1 answer
  • Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!