Answer:
change the NTFS permissions on the folder that you are sharing
Explanation:
In order to solve this, you are going to need to change the NTFS permissions on the folder that you are sharing. These are permissions that allow or prevent the files in that current system location from being modified. In order to do this, you will need to first, right-click on the folder that you are sharing. Next, click on "Properties" and head to the Security tab. Finally, choose the groups or user names of the individuals who have access and check allow on all the boxes. This will give them full control over the data in the folder.
One of your users suspects that the battery in their notebook computer is failing. You test it by using a known good power adapter to plug it in long enough to receive a full charge. The battery reads that it is fully charged in Windows. You then disconnect the laptop from its power source and wait to see how long the battery lasts. The battery dies after only about 15 minutes. What should you do to resolve to this problem?
A. Assume the battery is failing and replace it.
B. is failing and replace it.Configure the Power Scheme settings to minimize battery usage.
C. Put the battery in another notebook to verify that it’s the battery that is failing.
D. Calibrate the battery to synchronize the power meter to the actual charge capacity of the battery.
Answer:assume the battery is failing and replace it
Explanation:
Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?
Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.
Answer:
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Explanation:
Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;
1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.
2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.
3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).
4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").
5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.
In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.
For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).
The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above
Answer: A. acts as an electrical resistance and causes the connection to heat more.
Explanation:
The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.
In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.
ASAP
The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?
- The Great Depression
- World War I
- World War II
- the popularity of television
The first to answer correctly gets a crown and 5 stars. Please help.
Answer:
The Great Depression and The popularity of television and the event was The Great Animation Strike
Explanation:
you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust
image grayscale
format : format options: recolor : then pick the color
tiền tệ ra đời là kết quả
bruuh, wht is this man saying
is computers takes lots of time to do any mathematical calculations.
Answer:
I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.
Hope this helps you ^^
The program prompts the user for five to ten numbers all on one line, separated by spaces, calculates the average of those numbers, and displays the numbers and their average to the user.
The program uses methods to:
1) get the numbers entered by the user all on one line separated by spaces;
2) calculate the average of the numbers entered by the user; and
3) print the results.
The first method should take no arguments and return a String of numbers separated by spaces.
The second method should take a String as its only argument and return a double (the average).
The third method should take a String and a double as arguments but have no return value.
IF user input is: 20 40 60 80 100
Answer:
import java.util.Scanner;
public class AverageDemo
{
public static String getNumbers()
{
String numbers;
Scanner scn = new Scanner(System.in);
System.out.println("Enter five to ten numbers all on one line, separated by spaces: ");
numbers = scn.nextLine();
return numbers;
}
public static double calcAverage(String numbers)
{
String[] values = numbers.split(" ");
double total = 0;
for (int i = 0; i < values.length; i++)
{
total += Integer.parseInt(values[i]);
}
if (values.length == 0)
return 0.0;
else
return (total / values.length);
}
// Method definition of printResults: print the results
public static void printResults(String numbers, double average)
{
System.out.printf("\nThe average of the numbers %s is %.2f\n", numbers, average);
}
// main method
public static void main(String[] args)
{
// Call the methods
String numbers = getNumbers();
double average = calcAverage(numbers);
printResults(numbers, average);
}
}
Output:
Tristen is teaching her history course. She printed off her presentation so the students could take notes. Wyatt is
teaching a science course. He wants to make sure students who do not have PowerPoint can still view the
presentation. Reed is teaching a math course online. He finds the students are very visual and wants to control the
timing per slide
Which best describes how each teacher handled their presentations?
O Tristen created handouts, Wyatt saved as a PDF, and Reed saved as a video
O Tristen created a video, Wyatt saved as a PDF, and Reed broadcasted.
O Tristen created handouts, Wyatt saved as a video, and Reed saved as a PDF.
O Tristen created a video, Wyatt broadcasted, and Reed saved as a video
Since Tristen want her students to take notes on her presentations, she should have some sort of handout.
Because Wyatt, wants to ensure that students who do not have PowerPoint can still view his presentations, converting it into a pdf is best.
Since Reed's students are very visual, converting his slides into a video will make it better for students who want to spend some time assessing some of the graphs or equations.
Thus, A is the best choice.
Abdullah wants to send sessitive data. Abdullah wants to make sure that only ahmed can see and read this. How can abdullah protect this data, so that ahmed can only access it. By using this information make an algorithm.
Answer:
Use an encryption algorithm
Explanation:
An encryption algorithm can be used to hide the message from parties in-between or any third parties that might want to intercept the message being sent by Abudullah to Ahmed.
Encryption algorithms use cryptographic methods to encrypt or code data such that only the sender and receiver of that data have the keys to properly decode/decrypt these messages/data.
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network
You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?
(Select two).
a. Use shared secret authentication
b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE
c. Configure devices to run in ad hoc mode
d. Use open authentication with MAC address filtering
e. INSTALL A RADIUS SERVER AND USE 802.1X authentication.
Which of the following characterizes pooled interdependence? Multiple Choice Each member has a great deal of discretion in terms of what they do and with whom they interact while collaborating to accomplish the team’s work. Interaction in the team only occurs between members who perform tasks that are next to each other in a sequence. Members interact with a subset of other members to complete the team’s work. Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output. Different tasks are done in a prescribed order, and the group is structured such that the members specialize in these tasks.
Answer:
Group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.
Explanation:
A pooled interdependence arise or occurs when the members of a group are able to function with relative independence and then their combined output or level of productivity is used to significantly augment the group's overall performance.
A characteristic of pooled interdependence is that group members complete their work assignments independently, and then this work is simply "piled up" to represent the group’s output.
An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario
state whether the following statement are true or false
The following statement is true , Please mark me brainliest
monitor is hard copy output device??
false
true
Answer:
false
Explanation:
monitor is an output device but not hard copy. Hard copy is paper
How do we explain the difference between fake news and facts
Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake
Explanation:
What types of customizations have you or would you make to your operating system, and why?
Answer:
Explanation:
I have made a couple of customizations to my OS, which is Windows 10. The first being that I activated dark mode, this feature turns the entire OS into a dark-themed color, including apps and menus. This makes using the computer for extended hours much easier on the eyes. The other very important customization I added was a hover taskbar. This allows me to add many important shortcuts to the taskbar which all appear when I hover over the taskbar. It makes my desktop much cleaner and I have quick and easy access to my most important applications.
Kolom terakhir pada lembar kerja Excel 2019 adalah
Answer:
Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.
in english
Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.
Which of these optical devices is fairly fragile, easy to snap or scratch
1. Flash memory
2. Magnetic tape
3. CD
4. Hard disk
Answer:
CD
Explanation:
The optical device that is fairly fragile and easy to snap or scratch is called; 3: CD
How to identify optical devices?An optical instrument is a device that processes light waves either to enhance an image for viewing or to analyze and determine their characteristic properties.
Now, from the given examples, they all come with protective covers except for the CD. Thus, the CD is the most fragile because it can easily be scratched or snapped.
Read more about Optical Devices at; https://brainly.com/question/23391790
#SPJ9
Help me why did my desktop erase every app I need that please
Answer:
Your computer is affected by a polymorphic or trojan horse virus, so install avast antivirus. Set your computer into safe mode, then open the antivirus
Answer:
your pc has virus
Explanation:
if ur computer is runing slowly what is most likey to slove the problem
Still giving out the brainly thing :)
just answer its as simple as that and you get points :)
Answer:
The answer to that my friend, Is 0 :D
Explanation:
Answer:
4/4
Explanation:
Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions
Answer:
The company's account policy
Explanation:
If there's no common naming system, It's best to go with the company's account policy.
A blog is a Web site of personal or commercial origin that uses a dated log format updated, daily or very frequently, with new information about a particular subject or range of subjects. true or false
why are laptop employment of computer popular these days
Answer:
Because due to pandemic all the offices and employment sector are closed physically and to make their work smoothly people are preferring virtual platforms with the concept of work from home .
I hope it is helpful and mark me as brainlest and follow me plllzzz♥️♥️
4 effect by which we can see several keyframes at once is
a. Onion Skin b. Layer Effect o c. Timeline Effect
5. You can control the speed of animation by increasing or decreasing the value in
a. Timeline a b. Fps Box O ㅁ c. Tools Panel
Write T for True and 'F' for False statements.
1. Pencil2D has autosave option for saving your work after every few minutes
2. The source code of Pencil2D is not available for users.
3. You cannot erase unwanted part of object or drawing on the stage 4. Hand tool is used to quickly move different parts of the stage. 5. Bitmap layer is used for raster graphics, which is made up of pixels.
Fill in the blanks.
1. Pencil2D is used to create animation using and graphics
2. The big white rectangle in the middle of your screen is called the
3. The is used to mark current frame displayed on the stage.
4 You can a layer to clearly identify it in the timeline.
5. Frame is the little in the Timeline, in which we create an image
6. You can fill color in your enclosed drawing or shape with tool.
In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.
Answer:
Data administration.
Explanation:
Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.
Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.
Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on
Answer:
"2009" and clicking "does not equal 2009"
Explanation:
The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes
Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded
Therefore, the correct option is; "2009" and clicking "does not equal 2009"
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings.
Answer:
memo
Explanation:
Aarti, a museum employee, has created a table in access titled “Roman Achitecture”. She has included a field that links users images of buildings
What is the role of memory in a computer
Answer:
Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis. It stores the information your computer is actively using so that it can be accessed quickly.