1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
1 year ago
8

Which task would a database administrator preform?

Computers and Technology
2 answers:
Margarita [4]1 year ago
6 0

Answer: Make sure protocols are in place and are being followed.

Explanation: Good luck! Hope this helps!

neonofarm [45]1 year ago
5 0
Sr I don’t know what about it today lol but it’s just a weird thing about to be with my buddy who knows what to say lol
You might be interested in
To change a selected shape’s height or width to a specific value, type the value in the Height or Width text boxes on the
Scrat [10]
Are you trying to change the shape of an item within your program by entering the values into text boxes that become variables?

What language are you using?
5 0
3 years ago
A merge is _____.
Aliun [14]
The process of combining information from a variety of sources
7 0
3 years ago
Read 2 more answers
You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to
NikAS [45]

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

3 0
2 years ago
After sending input in the Chinese language to an AI system, Nina got numerous translations in the English language. Which chall
ad-work [718]

Answer:

i think its translation complexity

Explanation:

8 0
3 years ago
Can someone help me please
Andreyy89
Your anwser will be the last one
6 0
3 years ago
Read 2 more answers
Other questions:
  • 1. Describe an application where a series circuit might work better than a parallel circuit
    11·2 answers
  • Page orientation can be either landscape or _____.
    13·1 answer
  • If a hypothesis is strongly supported by the scientific community based on compelling experiment results, it becomes a————
    10·2 answers
  • There are _______ bits to every byte.
    14·2 answers
  • An example of an asset is:<br><br> A. Time<br> B. Money<br> C. A Car <br> D. All of the above
    5·2 answers
  • What Is an Antivirus?
    14·2 answers
  • (1) Prompt the user for an automobile service. Output the user's input. (1 pt) Ex: Enter desired auto service: Oil change You en
    10·1 answer
  • What type of volcano is Dukono
    14·1 answer
  • Complete the sentence.
    8·1 answer
  • What does BGP use by default to calculate the best route?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!