You are the Administrator for a large company that has offices around the world. Each office has employees in the Sales department and each location has created their own Sales folder for storing important Sales related files. You would like to implement a Window Role to minimize the duplication of files within the Sales department. Which File System can you install as a Windows Role to help you accomplish this goal?

Answers

Answer 1

Answer:

Transactional File System

Explanation:

To minimize the duplication of files within the Sales department. Transactional File System can make multiple file system changing, and if there is an error on one of the files then there will be no change.


Related Questions

A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.

Answers

Answer:

button

Explanation:

write an algorithm to print circumference of a circle​

Answers

Answer:

1 Start

2 Read the value of radius r of Circle

3. Give Pi = 3.14

4 Calculate area of Circle = Pi x r x r

5. Calculate Circumference of circle

( You can use either C= 2 X Pi X r Or Area (A) = Pi X r X r Circumference (C) = 2 X Pi X r A/r = Pi X r A/r = C/2 So C = 2 x ( A/r ) 5. Print area and Circumference

6. End.

Which of the following is a responsibility of CTSO membership?

getting all As in your classes

traveling to a national conference

conducting yourself appropriately and professionally

getting a job in your career field after graduation

Answers

Answer:conducting yourself appropriately and professionally

Explanation:

2021 edg

Which of these problems is correct if the numbers are binary numbers?
Group of answer choices

1 + 1 = 2

1 + 1 = 10

0 + 0 = 1

1 + 0 = 10

Answers

Answer:

1 + 1 = 10

Explanation:

2 does not occur in the binary "alphabet"

0 + 0 = 0 in any base, so also in binary

1 + 0 = 1 in any base, so also in binary

The answer is 1 + 1 = 10
1 = 1 in binary numbers, so 1 + 1 = 2 but 2 in binary numbers is 10, 2 doesn’t exist in binary numbers, it is only 1s and 0s so therefore it would be 10.

Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read, and computes the total and average of the input values (not counting zeroes). The program ends when the user enters 0. The average must be displayed as a floating point. All other values must be displayed as an integer. (For Python)

Answers

Answer:

The program was wrote in the version 3.9.5 of python and it's in the homework.txt file.

What are the steps for adding a Watch Window?
Select the cell to watch

Answers

Answer:

How to The Watch Window in Excel

Select the cell you want to watch.

Click the Formulas tab.

Click the Watch Window button. ...

Click the Add Watch. ...

Ensure the correct cell is identified and click Add.

Scroll to the area of the worksheet where you need to add or update values.

Update the cell values.

Pls help me plsssss

Answers

Answer: drawright(30)

Explanation:

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

The process of sending and receiving messages with words defines _____. A. Verbal communication b. Nonverbal communication c. Open communication d. Empty communication Please select the best answer from the choices provided A B C D.

Answers

The process of sending and receiving messages with words defines: A. Verbal communication.

Communication can be defined as a process which involves the transfer of a message from an individual (sender) to another (receiver or recipient), through the use of words, semiotics, symbols and signs, that are mutually understood by both the sender and the receiver.

In English language, there are different types of communication and these include:

Visual communicationNon-verbal communicationWritten communicationListening communicationVerbal communication

Verbal communication is also referred to as oral communication and it refers to the process of sending and receiving messages from one individual to another through the use of words.

Read more: https://brainly.com/question/14810228

Answer:

its a

Explanation:

yw

How do I type fast?

Give me an actual answer...

Answers

Practice!
And a good keyboard I recommend mechanical key boards
But the best way to improving your WPM is definitely practice one way you can practice is playing typeracer it’s pretty fun way

Hope this helps!
Brainliest is much appreciated!

Answer:

Use all 10 fingers and remember where the keys are.

Explanation:

This may take a while to get used to, but just let your hands flow across the keyboard. There really isn't a specific way to do it, but there are websites that'll help you.

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844

What does it mean by does the author create an emotional connection toward the readers?

(Emotional connection reading definition)

Answers

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)

Answers

Answer: There are several different job types in this field.

Explanation: did the test and got it right

Answer:

A or C!

Explanation:

Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-

- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

to find detailed information about the origin of an email message, look at the ________________.

Answers

Email header. The email header is a code snippet in an HTML email, that contains information about the sender, recipient, email's route to get to the inbox and various authentication details

8.3.7: Exclamat!on Po!nts
Write the function exclamation that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:

Convert the initial string to a list
Use a for loop to go through your list element by element
Whenever you see a lowercase i, replace it with an exclamation point in the list
Return the stringified version of the list when your for loop is finished
Here’s what an example run of your program might look like:

exclamation("I like music.")
# => I l!ke mus!c.

Answers

The function is an illustration of loops.

Loop instructions are used to repeat operations

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def exclamation(myStr):

   #This iterates through the string

   for i in range(len(myStr)):

       #This checks if the current character of the string is "i"

       if myStr[i] == "i":

           #If yes, this converts the string to a list

           s = list(myStr)

           #This replaces i with !

           s[i] = '!'

           #This gets the updated string

           myStr = "".join(s)

   #This returns the new string

   return myStr

       

Read more about similar programs at:

https://brainly.com/question/22444309

Wikis are designed for ________, which is allowing people to contribute more than just posting a response

Answers

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. what type of storage is linnea researching?

Answers

Considering the situation described above, the type of storage Linnea is researching is "NAS."

What is NAS in storage?

NAS is an acronym for Network Attached Storage. It is used as a file-level computer data storage server attached to a computer network.

NAS is usually applied in serving the files over Ethernet. It is cheaper and can be set up quickly.

Different Components of NAS.

Components of Network Attached Storage include the following:

CPUNetwork Interface CardsOperating SystemNFS and CIFS protocol, etc.

Hence, in this case, it is concluded that the correct answer is NAS

Learn more about NAS here: https://brainly.com/question/25705115

In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
If the temperature rises above 23°, the windows are opened.
Draw a flowchart to describe this system.

Answers

Hope this helps solve it

A _____ is a question about the data structured in a way that the DBMS can recognize and process. a. query b. relationship c. tuple d. product

Answers

Answer:

a

Explanation:

A query is a question about the data structured in a way that the DBMS can recognize and process.

What is relationship in DBMS?

A relationship, in the scope of databases, is known to be a kind of scenario where  two relational database tables and one table is known to have a foreign key that is said to references the primary key.

Note that A query is a question about the data structured in a way that the DBMS can recognize and process.

Learn more about query  from

https://brainly.com/question/2569440

#SPJ2

URGENT!! thank you!!!!!

Answers

Answer:

Robots or automatons

Explanation:

Machines that can perform tasks historically performed by humans can improve productivity (they can work non-stop) and of course the environment is safer for workers (work is done by a machine instead) but there is job loss (people who used to do the machine's work are redundant).

codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this

Answers

The listed greetings program is an illustration of Python functions.

The error in the program is that the program is not properly indented.

Python program uses indents to identify blocks of code.

So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:

def greetings(s):

   x = s.split()

   print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")

Read more about Python programs at:

https://brainly.com/question/16240699

You see a whiteboard that has “8-10 years olds, interested in horses” written on it. This is MOST likely a description of:

A.
data management.

B.
target users.

C.
GUI.

D.
iterative development.

Answers

Answer:

B target users

Explanation:

because it targets 8-10 year olds that are interested in horses so it targets that audience range

mightier than the waves of the sea is his love for you

Answers

cool but kinda creepy ngl

Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.

Vivo critique 6 sentences

Answers

Answer:

im sorry i cant understad

9. Which of the following is a disadvantage of cloud storage? * Accessibility (offline/without internet) Reduction of storage cost to organization, Increased possibility for disaster recovery, Efficient management of stored Data​

Answers

Answer:

Accessibility offline

Explanation:

While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal

Answers

The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.

A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.

This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.

In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.

Read more: https://brainly.com/question/5660386

What is data communication.. ​

Answers

What is data communication?

The exchange of data between source and a receiver by way of transmission media such as a wire cable

Hope this helps you!!

What is the full form of MOS

Answers

Answer:

Military occupational speciality

Other Questions
Find f(x)+g(x) f(x)=x^2+6x-5 g(x)=-x^2-3x-1 Using the retail inventory method, if the cost to retail ratio is 70% and ending inventory at retail is $145,000, then estimated ending inventory at cost is $207,143.a. Trueb. False form 5 sentence using have A man is brachydactylous (very short fingers; rare autosomal dominant), and his wife is not. Both can taste the chemical phenylthiocarbamide (autosomal dominant; common allele), but their mothers could not. Give the genotypes of the couple. If the genes assort independently and the couple has four children, what is the probability of all of them being brachydactylous What are the first 5 terms? 14 A curve has equation y=x2 - 6x + 16. Find the coordinates of the two turning points. Which of the following statements explains the importance of carbon in cells? (Choose all that apply)Carbon affects the function of a cell.Carbon is a waste product for a cell.Carbon provides structure for a cell.Carbon maintains the proper temperature in a cell. Write a letter to the chief of the planning commission dragging her/his attention in proper implemention of the stategies adopted to fulfill the obejectives set by current economic plan of nepal. A consumer's weekly income is $250, and the consumer buys 12 bars of chocolate per week. When weekly income increases to $280, the consumer buys 13 bars per week. The income elasticity of demand for chocolate by this consumer is about Help me please and thank you What is the purpose of this sentence in Edwards's sermon?It explains why hell is such a dangerous and scary place.It justifies Edwards's strategy of scaring people into accepting God.It asks the reader to explain what to do when confronted with danger.It suggests that people should save their neighbors if their houses catch on fire. Undershaft. Yes. Cusins. Anything out of the common? Undershaft. Only that there are two things necessary to Salvation. Cusins [disappointed, but polite] Ah, the Church Catechism. Baptism and Undershaft. No. Money and gunpowder. Cusins [surprised, but interested] That is the general opinion of our governing classes. The novelty is in hearing any man confess it. Undershaft. Just so. Cusins. Excuse me: is there any place in your religion for honor, justice, truth, love, mercy and so forth? Undershaft. Yes: they are the graces and luxuries of a rich, strong, and safe life. Cusins. Suppose one is forced to choose between them and money or gunpowder? Undershaft. Choose money and gunpowder; for without enough of both you cannot afford the others. Cusins. That is your religion? Undershaft. Yes. 3. Which of the following statements is true?a ) Video should be used sparingly.b) Video should be avoided whenever possible.c) Video should be used together with text.d) Video should be used as often as possible. ASAP pls help i need the answer immediately What is the common ratio between successive terms in the sequence?1.5, 1.2, 0.96, 0.768,...0 0.8-0.30 0.3O 0.8 Ngn hng pht hnh nhn c b chng t vi mt s ni dung nh sau: Invoice pht hnh ngy 30. 11. 2007, vi s tin 100.000 USD, Packing list k pht ngy 26.12.2007 B/L1, pht hnh ngy 1.12. 2007, ghi ch ngy clean on board l 1.12.2007, cng bc Hi Phng, cng d KOBE, tu S1, chuyn 100. B/L2, pht hnh ngy 4.12.2007, ghi ch ngy clean on board l 3.12.2007, cng bc Hi Phng, cng d OSAKA, tu S1, chuyn 100. Insurance Policy vi s tin 80.000 EUR, c pht hnh 5.12.2007Cho bit:1. L/C quy nh: Ngy pht hnh L/C: 15.11.2007. Ngy ht hn hiu lc ca L/C: 31.12.2007 Tr gi: 100.000 USD Thi hn giao hng cui cng: 15.12.2007 Mua hng theo iu kin CIF L/C dn chiu UCP 600 Khng cho php giao hng tng phn2 Ngy xut trnh chng t l 01.01.2008Yu cu: Ngn hng pht hnh c c php t chi b chng t trn khng? Nu r nguynnhn v sao? Thank you guys fir the help I need help right now this is urgent we -------- solar panels in the schoolyard while you are checking cracks in the water pipes In each figure below, find m