<em><u>Answer</u></em>
5 hours
<em><u>Explanation</u></em>
The two working together can finish a job in

Also, working alone, one machine would take one hour longer than the other to complete the same job.
Let the slower machine working alone take x hours. Then the faster machine takes x-1 hours to complete the same task working alone.
Their combined rate in terms of x is

This should be equal to 20/9 hours.

Multiply through by;





Factor to get:


It is not feasible for the slower machine to complete the work alone in 4/9 hours if the two will finish in 20/9 hours.
Therefore the slower finish in 5 hours.
A cell is the basic unit for storing data in exel
Answer:
gpresult
Explanation:
Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.
Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.
There are various group policy commands such as;
- rstrui (System Restore tool will run),
- runas (using different permission to run a tool or program),
- tasklist (currently running programs are shown
- gpupdate (Group policies are refreshed)
- gpresult (group policy configurations are displayed for verification)
gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date
Answer: keeps confidential documents secure,
displays a GUI, allocates the computer's resources, and retrieves files
Explanation:
The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.