Question

In: Computer Science

1 . Set-User mjordan–MobilePhone “(808) 555-1234” and Research online the other command parameters to see how...

1 . Set-User mjordan–MobilePhone “(808) 555-1234” and Research online the other command parameters to see how else you could update contact information using the EMS.

2.What do we use the PIPE command for? What is it’s purpose?   explain in your own words what the PIPE command does for us in scripting.

3.Why would organizations mail-enable public folders?

4. What command would grant Anonymous Contributor access to the \Sales public folder

5.How are In-place archives different than PST files?

6.If you right-click on the Inbox, you won’t see the retention policy take affect? Why not?

Solutions

Expert Solution

Ans1-

  • Open the Groups window by clicking on the group icon in the toolbar. (This will open the results tab which displays the 1,000 active groups in your EMS).
  • From the groups window find and select the contact profile that is to be edited.
  • Click Open > Edit.
  • Now the profile is ready to be edited.

Ans 2- A PIPE command is used for redirecting the outputs i.e. transfering standard outputs to some other destination.

Basically , the PIPE command is used in Linux and similar operating systems for further processing of the programs. PIPE provides a temporary connection between two commands and this connection is always uni-directional.

In scripting, this command can be used for listing all files and directories and provide it as an input further.

Ans 3- Mail enabling of public folder is a very effective and efficient way to provide shared access among different people and organisations. It proves to be helpful while collecting and organising the shared information. This is whuy organisations mail-enable public folders.

Ans 4-

  • Allow ' anonymous user to send email to a mail-enabled public folder.'
  • Go to public folder.
  • Select the public folder which you want to be mail-enabled or mail-disabled.
  • Open Details > Mail settings > Enable/Disable.
  • Click 'Yes' (that appears in the warning box) to continue.

Ans 5- Generally, all the pst files are same and equal. The data is stored and retrieved in the same way. The only difference is that when a pst file is not directly associated to a mail account, they are refered to as archives.

Ans 6- Retention policies are an optional feature for a particular account i.e. it may or may not be available for it.

Also they are created and managed by the organisation's administrator and are processed once in a seven days hence you cannot manage them.


Related Solutions

3) Write the awk command that would show the user wmorales (or yourself) that is online...
3) Write the awk command that would show the user wmorales (or yourself) that is online (you have to use a pipe) Output, depending on the system that you are using or the command to find the users online, but it would be similar to: wmorales pts/37 10.32.9.93 13:58 1.00s 0.15s 0.10s w or wmorales pts/8 2020-04-25 12:22 (c-71-59-237-122.hsd1.or.comcast.net) YOUR AWK COMMAND: (10 points hard one) - 4) use who to show the the users on our system that have...
Create a python program that will: prompt a user for a command Command get_data Level 1:...
Create a python program that will: prompt a user for a command Command get_data Level 1: Take one of the commands my_max my_min my_range my_sum mean median mode fib factorize prime Requirements: Your commands should be case-insensitive You should use python lists to store data You should NOT use built-in python math functions, or math libraries to compute these values Tips: Write one function that will convert a string with comma-separated numbers into a python list with the numbers. You...
Problem Solving Set #1 (10 pts each) a. Find the multiplicative inverse of 1234 in GF(4321)...
Problem Solving Set #1 (10 pts each) a. Find the multiplicative inverse of 1234 in GF(4321) using the extended Euclidean algorithm b. Does the multiplicative inverse of 24140 in GF(40902) exist? Prove your answer. c. Is x4 + 1 irreducible over GF(2)? Prove your answer. d. Find (x3 + x + 1)-1 in GF(24 ) mod x4 + x + 1 using the extended Euclidean algorithm e. Find (x3 + x + 1)-1 in GF(28 ) mod x8 + x4...
Lab 1. Java and the Command Prompt a) Visit the Java SE JDK website and see...
Lab 1. Java and the Command Prompt a) Visit the Java SE JDK website and see which version of Java you need to download. b) If granted permissions, try to see how to modify environment variables (PATH and CLASSPATH). c) Open the command prompt/shell. Use cd and dir (ls on UNIX-like systems) commands to navigate your file system and see what files do you have in different locations e.g. on your flash drive. Pay attention to the file extensions. d)...
How are the following valuation parameters related to each other? How do they affect the general...
How are the following valuation parameters related to each other? How do they affect the general free cash flow valuation model? Revenues, Investment, Net operating income, Profitability rate, Growth rate? How were these developments corrected during the resurgence of the LBO market after 1992? What were some of the unsound developments in the LBO market that began to take place in the late 1980s?
QUESTION 1 User can interact with a PC using a command-line interface by issuing commands to...
QUESTION 1 User can interact with a PC using a command-line interface by issuing commands to the program in the form of successive lines of text. True False 1 points    QUESTION 2 A machine code (object code) is generated by an executor for process. True False 1 points    QUESTION 3 In case of all the resources are being used, the new process with a low priority might not get its resource forever. True False 1 points    QUESTION...
1. Allow the user to vote as many times as they indicated there are voters (see...
1. Allow the user to vote as many times as they indicated there are voters (see numVoters). For each voter, you have to display the list ofcandidates and their associated id number (id numbers should start at 1, not 0). A voter votes for a candidate by entering the candidate's id number. 2. You have to devise a method for keeping tracks of the votes. 3. After all the voters have voted, you have to print out the results for...
python practice! 1. Create a function that takes a user choice and one number as parameters...
python practice! 1. Create a function that takes a user choice and one number as parameters and returns the operation result. -Square: print the number square -Sqrt: print the square root of the number -Reverse: reverse the sign of the number (pos or neg) and print it Note: Detect invalid choices and throw an error message – Number can be anything. 2. Create a function that takes a user choice and two numbers (start and end) as parameters. For example,...
Note On Lead User Research describes how the potential of alternative uses of research can be...
Note On Lead User Research describes how the potential of alternative uses of research can be determined methodically. Lead Users are defined as consumer groups who lead with respect to cutting edge applications of important markets and technical trends. Stages of a Lead User study are discussed which include project planning, trends/needs identification, preliminary concept generation, and final concept generation. Questions What are the characteristics of Lead Users? What are the three types of Lead Users? What resource commitments are...
I am curious to see how the amount of 'theft' from online purchases compares to that...
I am curious to see how the amount of 'theft' from online purchases compares to that of in store theft. Have you had a positive or negative customer service experience from a web based business?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT