What is the least file and folder permission necessary to open and run an application? group of answer choices

a. list folder contents

b. read

c. read & execute

d. full control

Answers

Answer 1

The least file and folder permission necessary to open and run an application is "read & execute". This permission allows the user to view and execute the application files, which means they can open and run the application. The correct answer is option c. "read & execute".

The "list folder contents" permission only allows the user to view the contents of a folder but not execute any files within it.

The "read" permission allows the user to view the contents of a file but not execute it.

On the other hand, the "full control" permission grants the user complete control over the file or folder, including the ability to modify, delete, and change permissions.

The correct answer is option c. "read & execute". This permission provides the necessary access to open and run an application without granting unnecessary control or modification capabilities.

To know more about application visit:

https://brainly.com/question/33383447

#SPJ11


Related Questions

how are constants and variables different from each other

Answers

Answer:

variables are letters/shapes that are next to a number and constants are numbers without a variable

Complete each statement by choosing the correct answer from the drop-down menu.

The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.

Integer short and integer long data type:

These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.

Boolean data type:

Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.

Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.

However, for the given scenario in the question,  the float data type can accomodate these values easily.

Answer: Integer, Boolean, Floating-Point!

Explanation:

I did it edge 2020

is this free to ask any question because when i tried to do it it said i have to pay money

Answers

Answer:

Nope, you don't have to pay

Explanation:

All you have to do is create an account. You can have a free account, or you can pay for one, but if you have a free account you can only see so many answers. Then you have to watch an ad to see them. With a paid account you can get all answers without having to watch any ads.

Describe how tuples can be useful with loops over lists and dictionaries, and give Python code examples. Create your own code examples.

Your descriptions and examples should include the following: the zip function, the enumerate function, and the items method.

Answers

Answer:

i dont no

Explanation:

What is the output of this program?

numA = 4
for count in range(2, 5):
numA = numA + count
print(numA)

Output:

Answers

Note that the output of the above program will be 9, 11, and 14.

What is the explanation?

In this program, the initial value of numA is 4. Then, we start a for loop with count starting at 2, and ending at 4. In each iteration of the loop, numA is incremented by the current value of count. Therefore, the first time through the loop, numA is incremented by 2 to become 6.

The second time through the loop, numA is incremented by 3 to become 9, and the third time through the loop, numA is incremented by 4 to become 13. Finally, numA is printed in each iteration of the loop, so the program will output 9, 11, and 14.

Learn more about programs:
https://brainly.com/question/29099843
#SPJ1

which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......

Which are characteristics of a video with a higher
bit rate? Choose all that apply.
fewer frames per second
more frames per second
lower quality
higher quality
larger file size
smaller file size

Answers

Answer:

D and E.

Explanation:

How can I design a digital prototype from a paper prototype?

2 Sentences!!

Answers

To get a digital prototype from a paper prototype, the designer should endeavor to:

Note the design that they want to test and draw them with the use of markers. Then, they can convert these to digital form and run them.

How can a digital prototype be created?

A digital prototype can be created by first understanding the design that is to be created. Designers can either choose to have a digital or paper prototype. The problem with the paper prototype is the fact that it does not allow for user interaction. However, it is still a good way to understand things like color schemes.

So, when a designer gets an idea, he or she can note this on paper and even make some colorings that will allow for a better understanding of the material. Next, they can create the digital form of the design and test run this on a system. When they follow all these steps, they will e able to obtain a better result.

Learn more about prototypes here:

https://brainly.com/question/7509258

#SPJ1

what property msut be set on a menyu item to ahve the user activate that option?

Answers

To make a menu item activate or trigger a specific action when selected by the user, you typically need to set the "onclick" property. The "onclick" property specifies the JavaScript code or function that should be executed when the menu item is clicked.

The view only example

When the user clicks on "Menu Item 1," the myFunction() function is called, which displays an alert box saying "You clicked Menu Item 1!"

Likewise, upon clicking on "Menu Item 2," the invocation of the anotherFunction() function ensues, resulting in the appearance of an alert box containing the relevant message.

Please bear in mind that the specific action or functionality associated with the menu item relies on the JavaScript code or function specified within the "onclick" property. Feel free to customize it to cater to your precise needs.

Read morw on  user   activation ere https://brainly.com/question/1380484

#SPJ4

which of the following environments utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? a. production b. test c. staging

Answers

The environments that utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build is option b. test.

Why is a test environment necessary?

Before delivering the program to the user, the testing teams examine its effectiveness and quality in the test environment. It can test a particular section of an application using various data setups and configurations. It is a crucial component of the agile development process.

In a QA environment, intended users can test the finished Waveset application while your upgrade procedure is tested against data, hardware, and software that closely resembles the Production environment.

Therefore, The testing teams evaluate the application's or program's quality in a test environment. This enables computer programmers to find and correct any issues that might affect how well the application functions or the user experience.

Learn more about test environments from

https://brainly.com/question/21902774
#SPJ1

Select the correct answer from each drop-down menu.
When you right-click a picture in a word processing program, which actions can you choose to perform on that image?
You can choose to
an image when you right-click the picture in the word processing program. You can also choose to
an image when you right-click the picture in the word processing program.

Answers

When you right-click a picture in a word processing program, the actions that can you choose to perform on that image are as follows:

Rotate.Resize.

What is a Word processing program?

A Word processing program may be characterized as a kind of advanced typing program that permits a user to track records information and then let the user perform a variety of other things with it.

According to the context of this question, you can opt to rotate an image when you right-click the picture with the utilization of a word processing program. Apart from this, you can also opt to resize an image through the same function of a word processing program.

Therefore, when you right-click a picture in a word processing program, the actions that can you choose to perform on that image are rotated and resized.

To learn more about Word processing programs, refer to the link:

https://brainly.com/question/985406

#SPJ1

Your question seems incomplete. The most probable complete question is as follows:

When you right-click a picture in a word processing program, which actions can you choose to perform on that image?

You can choose

RotateViewCompress

You can also choose to

ReviewResizeBookmark

30
2071 Set D Q.No. 9 Write down the structure of secondary
haloalkane of C3H7X. What happen when the secondary
haloalkane is heated with Na in presence of dry ether? [1+1]
Identify the maior products A and B and
31​

Answers

Oeer is the only one that can make you want it and don't want you for a new thing or you want it for the sake reason it is a good time for

A/an ________is a device used to protect computers against surges and spikes in power.
Sleep and Hibernate are examples of __________.
Regular maintenance on a computer is good for ________.
Bad sectors are sections of the _______ that are physically damaged.
To protect some devices such as flash drives and external hard drives from corruption, it is best to __________ the devices.

Surge Protector
Power-saving modes
Hardware And Software
Hard Disk
Eject

Answers

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

Answer:

1. Surge Protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A Surge Protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both Hardware and Software.

4. Bad sectors are sections of the Hard Disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to Eject the devices.

I hope this helps <3

When you are done reviewing in Print Preview, you have the option to save your document as a new file type. Which file type can be created using Print?

.edu
.exe
.pdf
.ppt

Answers

i believe the answer is .pdf

Answer:

the answer is pdf

Explanation:

It is because the reweing of the print

what is the name of the command that instructs the shell to rebuild the table containing the commands from the directories listed in your search path?

Answers

The name of the command that instructs the shell to rebuild the table containing the commands from the directories listed in your search path is `hash`.

Hash is a command that is used to keep track of all the commands that you run. The shell maintains a list of previously run commands, and when you type a command, it looks up the command in this list before running it. If the command is not found in the list, the shell searches the directories listed in your search path, looking for a file with the same name as the command. If it finds the file, it adds it to the list of commands, and then runs it. If it doesn't find the file, it displays an error message.

In some cases, you might modify the directories listed in your search path, either by adding or removing directories. In such cases, the shell might not find a command that you know is in one of those directories. To force the shell to rebuild the list of commands, you can use the `hash` command. The `hash` command tells the shell to rescan the directories listed in your search path, and rebuild the list of commands. Once the list is rebuilt, the shell will be able to find commands that were previously not found.

Learn more about hash here:

https://brainly.com/question/31082319

#SPJ11

Which interface communicates over a parallel connection?

Answers

The interface that communicates over a parallel connection is parallel data transmission.

What is Parallel communication interface?

Parallel communication is a technique for transmitting several binary digits (bits) at once in data transmission.

This distinction is one method to describe a communications link in contrast to serial communication, which only transmits one bit at a time.

Therefore, note that there are numerous data bits are delivered over multiple channels at once when data is sent utilizing parallel data transmission. As a result, data can be transmitted significantly more quickly than with serial transmission techniques.

Learn more about parallel connection from

https://brainly.com/question/7888809
#SPJ1

What is phishing? Answer

Answers

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.

Suppose we used an internet addressing protocol that used 4 bits to encode a single address. How many devices would be supported on the internet? how many unique addresses would there be?.

Answers

The number of unique addresses that can be supported on the devices with 4 bits will be 16.

What is an internet protocol?

An internet protocol is a protocol that describes the structure of an internet address and then allocates a unique address to each internet-connected device.

However, we need to understand that one bit can only support four addresses.

Therefore, we can conclude that the number of unique addresses that would supported by 4 bits will be 16.

Learn more about Internet protocol here:

https://brainly.com/question/18215126

explain the uses of computer in police department​

Answers

Answer:

Not only can police officers store records and reports in online databases, but they can also use computers and hard drives to store thousands of images, reports and videos. Computers make mass storage possible, and enable giant online databases that can accurately ID suspects anywhere in the country.

COMPUTER IN POLICE DEPARTMENT

EXPLANATION:

Not only can police officers store records and reports in online databases, but they can also use computers and hard drives to store thousands of images, reports and videos. Computers make mass storage possible, and enable giant online databases that can accurately ID suspects anywhere in the country.

HOPE THIS WILL HELP U. AND PLZ MARK ME AS A BRAINLIEST.

Question 11
1 pts
You need to find the square root of a value. Which of the following functions would you
use?
int
fabs
pow
O sqrt

Answers

Answer:

sqrt

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;

If you need to find the square root of a value. The function you would use is sqrt.

In Computer programming, the sqrt () function is a mathematical tool which allows a user to find the square root value of any numerical value (numbers)

For example the code for finding the square root of a value using Python programming language is;

num = 36

\\This is the value of the original number\\

sqrt = num ** (0.5)

print ("The square root of the number "36" is 6")

Answer:

sqrt

Explanation:

i'm in python

How many subnets can be created from one hex character in an IPv6 address?

Answers

In an IPv6 address, one hex character can create up to 16 subnets. Each hex character represents 4 bits, allowing for 16 possible values

In an IPv6 address, each section is represented by four hex characters. Each hex character represents 4 bits, allowing for 16 possible values (0-9 and A-F). These 16 possible values for one hex character can be used to create subnets.

To understand the number of subnets, it is important to consider the number of bits dedicated to addressing subnets in an IPv6 address. The prefix length determines the number of bits used for subnet addressing. For example, if the prefix length is 4 bits, it means that the first four bits of the address are reserved for subnet identification. As each bit can have two possible values (0 or 1), raising it to the power of the number of bits allocated for subnet addressing gives the number of subnets. In this case, 2 raised to the power of 4 (the number of bits) equals 16, resulting in 16 subnets that can be created using one hex character.

know more about IPv6 address :brainly.com/question/32156813

#SPJ11

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answers

Answer:

Me

Press the Windows key and Print Screen at the same time to capture the entire screen. Your screen will dim for a moment to indicate a successful snapshot. Open an image editing program (Microsoft Paint, GIMP, Photoshop, and PaintShop Pro will all work). Open a new image and press CTRL + V to paste the screenshot.

Explanation:

You need press this button for take a capture

WHO KNOWS HOW TO TAKE A SCREENSHOT ON A HP PAVILION COMPUTER, PLS HELP!!!!!

Answer:

Use the keys win + shift + s

If that doesnt work than I don't know what will

The press relies on everyday citizens for:

O A. deeply researched stories.

O B. corporate funding.

o c. skilled writing and editing.

D. news tips and photos.​

Answers

Answer:

D

Explanation:

Write code using the range function to add up the series 15, 20, 25, 30, ... 50 and print the resulting sum each step along the way.

Expected Output
15
35
60
90
125
165
210
260

Answers

Answer:

# initialize the sum to 0

sum = 0

# loop over the numbers in the series

for i in range(15, 51, 5):

   # add the current number to the sum

   sum += i

   # print the current sum

   print(sum)

Explanation:

The first argument to the range function is the starting number in the series (15), the second argument is the ending number (51), and the third argument is the step size (5). This creates a sequence of numbers starting at 15, increasing by 5 each time, and ending before 51. The for loop iterates over this sequence, adding each number to the sum and printing the current sum.

Ask me any questions you may have, and stay brainly!

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

How large does a telsa coil need to be to transmit wireless electricity

Answers

The size of the largest operational Tesla Coil is measured to be 38ft or 12 meters. It transmits about 138kw of electricity.

What is a Tesla Coil?

Nikola Tesla invented the Tesla coil, an electrical resonant transformer circuit, in 1891. It is used to generate high-voltage, low-current, high-frequency alternating current.

During his efforts to construct a "wireless" lighting system with gas discharge light bulbs that would shine in an oscillating electric field generated by a high voltage, high-frequency power source, Tesla devised the Tesla coil.

Tesla coils provide various health risks owing to high voltage radio frequency emission, including skin burns and nervous system and heart damage.

Learn more about Tesla Coil:
https://brainly.com/question/7295601
#SPJ1

Nash's Trading Post, LLC began business by issuing 200000 shares of $5 par value common stock for $21 per share. During its first year, the corporation sustained a net loss of $40000. The year-end balance sheet would show

Answers

The year-end balance sheet for Nash's Trading Post, LLC cannot be determined without additional information.

What would the year-end balance sheet of Nash's Trading Post, LLC show based on the given information about issuing common stock and incurring a net loss?

To determine the year-end balance sheet for Nash's Trading Post, LLC, additional information about the company's financial transactions and account balances is required.

The given information only provides details about the issuance of common stock and the net loss incurred during the year.

A balance sheet is a financial statement that presents a company's assets, liabilities, and shareholders' equity at a specific point in time. It provides a snapshot of the company's financial position.

Without specific information regarding other financial activities, such as expenses, revenues, liabilities, and changes in equity, it is not possible to provide a valid answer with a valid explanation for the year-end balance sheet of Nash's Trading Post, LLC.

Learn more about Trading Post, LLC

https://brainly.com/question/14172075?referrer=searchResults

#SPJ11

Who plays Among Us?

who answered first will get a Surprise! :)​

Answers

Answer:

mE now whats the surprise? :P

Explanation:

Identify six specific skills that a computer software engineer is expected to demonstrate.

Answers

1.) Team work

2.) Disciple

3.). Creativity

4.) Attension To Deatil

5.) Time Mangament

Explanation:

Answer:

A computer programmer needs to demonstrate that they are:

1. A team player

2. Able to meet deadlines

3. Able to solve problems logically and efficiently

4. Able to create programs that fulfill their intended purpose

5. Able to be flexible (do many different types of jobs)

6. Able to adapt to new changes and be able to learn new skills

Explanation:

Computer programmers are tasked with creating software that works effectively with the given hardware and the people using it, and to do that, they have to be very skilled in many areas.

When making changes to existing font, the user must first _____

Answers

Select the font dialog box
Other Questions
please help i have to transform to passive Ex: 1976: Inauguration officielle de la fondation Mir. La fondation Mir est officiellement inaugure en 1976.a. 1920: Mort du peintre Amadeo Modigliani.b. 1925: Exposition des oeuvres surralistes Paris.C. 1937: Ralisation du tableau Guernica par Pablo Picasso.d. 1950 : Remise d'une rcompense Henri Matisse la XXVe Biennale de Venise.e. 1986: Inauguration du muse d'Orsay. MAX poInts 100 need help pls Compare the adaptations of the plants and animals of a temperate forest and a rainforest. For each of the plants and animals listed, research and describe one adaptation that helps them survive in their environment. Plant/Animal Name. Description of Adaptation..maple tree .wolf . bear Plant/Animal Name Description of Adaptationpitcher plantsloth spider monkey .have a good day :) financial assistance to domestic producers in the form of cash payments, low-interest loans, tax breaks, or product price supports is called a(n) ________. What is the distance between -7/4 and 3/8 on a number line? -2 1/8-1 3/81 3/82 1/8 congress set limits on the amount of time the president can commit troops to foreign lands during military conflicts to a. one year, then the troops must be withdrawn.b. zero, saying that this action is unlawful.c. 180 days, then the executive must consult the congress.d. 90 days, then the executive must seek congressional approv What is the importance of product development do you think that an organized process of development is helping us develop products that the customer needs? 3.26Identify the special name for the angle pair A project has the following estimated data: price =$77 per unit variable costs =$43.12 per unit fixed costs =$6,100 : required return =11 percent initial investment =$13,000; life = seven years. lgnore the effect of taves, a. What is the accounting break-even quantizy? b. What is the cash break-even quantity? c. What is the financial break-even quantity? d. What is the degree of operating leverage at the financial brenk-aven level of output? Which of these scientists made each of the following discoveries anton van Leeuwenhoek, Robert hooke and Rudolf Virchow? Effective project managers have to be able to deal with the contradictory nature of their work. Knowing when to intervene and resolve stalemates involves a(n) _____ contradiction Explain why Mr. Undetwood would lose advertisers and subscriptions from To Kill a Mockingbird In the mid 20th century,how many georgians were living in rural community FAST!! BEST ANSWER GETS BRAINLIEST! 100 POINTS!!!What is this most significant barrier on whether a person actually votes according to rational choice theory? PartisanshipPolitical knowledgeVoter registrationCandidate likability Write a recursive method named power that accepts two integers representing a base and an exponent and returns the base raised to that exponent. For example, the call of power(3, 4) should return 34 or 81 . If the exponent passed is negative, throw an IllegalArgumentException. Do not use loops or auxiliary data structures; solve the problem recursively. Also do not use the provided Java pow method in your solution. i read about fairies book fairies , they can fly put relative pronoun (who , which, whome , that , whose) plllss help What is the difference between health and medical science You start at (4, -3). You move right 1 unit and left 3 units. Where do you end ? Read the following passage from the last chapter of Frankenstein, in which Captain Robert Walton describes the creature's reaction to Frankenstein's death:I entered the cabin where lay the remains of my ill-fated and admirable friend. Over him hung a form which I cannot find words to describe gigantic in stature, yet uncouth and distorted in its proportions. . . .He paused, looking on me with wonder, and again turning towards the lifeless form of his creator, he seemed to forget my presence, and every feature and gesture seemed instigated by the wildest rage of some uncontrollable passion."That is also my victim!" he exclaimed. . . . "Oh, Frankenstein! Generous and self-devoted being! What does it avail that I now ask thee to pardon me? I, who irretrievably destroyed thee by destroying all thou lovedst. Alas! He is cold, he cannot answer me." . . ."Your repentance," I said, "is now superfluous. If you had listened to the voice of conscience and heeded the stings of remorse before you had urged your diabolical vengeance to this extremity, Frankenstein would yet have lived.""And do you dream?" said the daemon. "Do you think that I was then dead to agony and remorse? . . . After the murder of Clerval I returned to Switzerland, heart-broken and overcome. I pitied Frankenstein; my pity amounted to horror; I abhorred myself. But when I discovered that he, the author at once of my existence and of its unspeakable torments, dared to hope for happiness, that while he accumulated wretchedness and despair upon me he sought his own enjoyment in feelings and passions from the indulgence of which I was forever barred, then impotent envy and bitter indignation filled me with an insatiable thirst for vengeance. . . . I had cast off all feeling, subdued all anguish, to riot in the excess of my despair. Evil thenceforth became my good. Urged thus far, I had no choice but to adapt my nature to an element which I had willingly chosen. . . ."Write a short argument to answer the following question: In the passage, whom does Shelley portray as more monstrous: Frankenstein or the creature? Develop your ideas by analyzing Shelley's choice of language in the passage. You are writing an argument, so be careful to include a clear claim and to respond to at least one counterclaim. Also be sure to use specific details from the passage to develop your claim and counterclaim. 2Evaluate w+(-2) - 5 where w =x59and3111043Yo someone help me Given that lim x3 f(x)=3 and lim x3 g(x)=2, evaluate the following. lim x3 (f(x)2g(x)) Give your answer as an integer. Provide your answer below: