1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
5

18.you need to be able to access a file stored in a shared folder on your network even when you are disconnected from the networ

k.What should you do?
a.configure the folder permissions as Read/Write
b.Make the folder available offline.
C.From Control Panel, use Network and Internet.
d.Type the IP address of the network computer in the Address field of Internet Explorer.
Computers and Technology
1 answer:
Ket [755]3 years ago
3 0

Answer:

d. is my answer please. bye bye

You might be interested in
List the steps to identify address or link window on a phone​
Law Incorporation [45]

Answer: this is how

Explanation: if you are on your phone and a link pops up if it is blue then it is able to be clicked but if it is not blue you can simply copy and paste the link into your web browser.

7 0
3 years ago
PLS HURRY<br> Look at the image below
Nimfa-mama [501]

Answer:

20

Explanation:

During the first iteration for the list [1, 4], numB = 1.

During the first iteration of the list [2, 3], numA = 2.

answer = answer + numA + numB

= 0 + 2 + 1

= 3

Since the list [2, 3] is in a nested loop, we need to first finish iterating the whole list before numB iterates to the next number, so numA = 3 this time and numB still stays at 1.

answer = answer + numA + numB

= 3 + 3 + 1

= 7

Now, numB moves to 4 and numA starts back at 2 again.

answer = answer + numA + numB

= 7 + 2 + 4

= 13

numB still says at 4 and numA moves to 3 since it is in a nested loop:

answer = answer + numA + numB

= 13 + 3 + 4

= 20

print(answer) will print the output 20.

Hope this helps :)

4 0
3 years ago
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet
Luden [163]

Answer:

Explanation:

Asymmetric cryptography, is a cryptographic system that uses two different types of keys both public and private keys. Symmetric cryptography on the other hand uses the same type of key for both encryption. The benefit of using a combination when transferring data across the internet is that Asymmetrical cryptography is necessary to establish a secure connection while symmetrical cryptography can enhance the speed of the data transmission after connection has been established, thus both provide a unique benefit.

7 0
4 years ago
Please tell fast plzzzzzz.​
Vaselesa [24]

Answer:

false well if u know someone u can click it

6 0
3 years ago
21
Tanzania [10]

Answer:

A website that sells computer hardware to large organizations --> .com

A website operated by the state of California --> .gov

The website of the US Coast Guard --> .mil

The website of a group of individuals who work toward protecting gray wolves --> .org

Explanation: I took the test and got it right ;)

5 0
3 years ago
Other questions:
  • Type of media that uses laser technology to store data and programs is
    6·1 answer
  • The______for our newest game keeps changing as we develop our concept and refine our goals.
    11·2 answers
  • A flat panel detector’s detector element size determines what?
    10·1 answer
  • What is difference between rand() and srand() ?
    11·1 answer
  • In the lab, you created a Group Policy Objects Report and a Resultant Set of Policy Report that can be used to __________ the gr
    11·1 answer
  • A(n) _____ website gathers, organizes, and then distributes web content.
    10·1 answer
  • If an image has only 4 colors, how many bits are necessary to represent one pixel’s color? Describe a new custom encoding that u
    8·1 answer
  • PLEASE HELP ME ASAP I HAVE AN EXAM SOON!!!!
    5·1 answer
  • A company is developing a smart TV that connects to a wireless home network. Which technology can best help to establish this co
    11·2 answers
  • Consider the operation of deleting the root of a binary search tree. if the root has one child, then ________.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!