In the Properties dialog box for each folder, the top pane shows the: groups or users with permission to access the folder. groups or users that do not have permission to access the folder:______ A. Degree to which each user or group may interact with the folder and its contents.
B. Degree to which each user or group may interact with other users.

Answers

Answer 1
Answer:

Answer: groups or users with permission to access the folder.

Explanation:

Properties dialog box simply contains the options that allow one to modify a document's look. To do this on the computer, one has to click on the 'Document Properties' which is located in the top-left side of the Document Panel. Then, one will select "Advanced Properties" option and the Properties dialog box will come up on the screen.

In the Properties dialog box for each folder, it should be noted that the top pane shows the groups or users with permission to access the folder while the bottom pane simply shows the degree of interactions of the user or group with the folder and the folder contents.


Related Questions

what are "open source" programming language? Give examples of open source languages. Discuss the pros and cons of open source language.
For selection purposes, it is critical that application items have a proven relationship between a selection device and some relevant criterion. This is called
Which business application uses electronic tags and labels to identify objects wirelessly over short distances? A. Radio-frequency identificationB. Global positioning systemsC. Geographic information systemsD. Location-based services
Which statement is written correctly?
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.A. digital signalsB. contiguous signalsC. ramp signalsD. exponential signals

.Although SQL is a language, you donât use it to write applications? (true, false)

Answers

Answer:

True

Explanation:

SQL stands for structured  query language , which is used to query Relational Database Management systems like SQLServer. This is not for writing applications like business layer where we use some programming languages.SQL is meant for data layer to perform CRUD operations against database.

CRUD operations :

Create

Read

Update

Delete

we can perform above operations on database by using SQL query language

"Packet switches have multiple links attached to them. For each attached link the packet switch has a/an ____________, which stores packets that the router is about to send into that link."link buffer

access buffer

output buffer

transmission buffer

none of the above

Answers

Answer: Output buffer

Explanation:

Each packet switches contain multiple links which are attached to it and for individually attached link the output buffer basically store packets. Then, the router send these packets into multiple links.

In output buffer, if the packets are transmitted into the links but it finds that the link is busy with the another packet for transmission. Then, that particular packet needs to be wait in output buffer.

Therefore, the output buffer is the correct option.

The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.

Answers

Answer:

strVar.replace(pos, n, str);

Explanation:

The strVar.replace() is a javascript function of searching and replacing a string for a defined value, whereby it finds and returns a new string where the defined values are replaced.

For example: to return a string where "Trump" is replaced with "Biden":

We have

var str = "Welcome Trump!";

var res = str.replace("Trump", "Biden", str);

Hence, in this case, the correct answer is strVar.replace(pos, n, str);

The computer output for integer programs in the textbook does not include reduced costs, dual values, or sensitivity ranges because these variables are not meaningful for integer programs. TrueFalse

Answers

Answer:

The answer is True

Cloud storage refers to the storage of data on ______.a. your mobile device.b. your desktop computer.c. an external drive.d. a server on the Interne.

Answers

The correct answer is:

Cloud storage refers to the storage of data on a server on the internet.

Every organization relies on data, In our daily job, we all make use of a huge amount of data(either in gigabytes or terabytes). And if you have a lot of files on your computer, it's probable that your computer may lose momentum and slow down, resulting in bad performance. While there are several external storage options available for storing and backing up your data, these devices are not infallible. Any incident, such as theft, or damage, might result in the loss of vital data.

This is where Cloud Storage comes into play. Cloud storage is a handy and dependable method of storing and retrieving information on the internet.

It is a cloud computing system in which data is stored on the server-side of the Internet and is managed and operated by a cloud computing provider. 

Therefore, from the above explanation, we can conclude that the correct Option is D

Learn more about Cloud Storage here:

brainly.com/question/23073532?referrer=searchResults

Answer:

D.  server on the internet

Explanation:

Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers like Wireshark and capturing packets c. using rootkits and privilege escalation to get to the kernel processes d. using a virus and destroying the computer that stores authentication information.

Answers

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.