1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAVERICK [17]
2 years ago
13

A user in a small office environment explains to you that his office implements a small Microsoft workgroup. Users commonly shar

e folders with each other. Which access control model is represented in this example
Computers and Technology
1 answer:
Sphinxa [80]2 years ago
6 0

65 DAC is the access control model is represented in the example where a user explains to you that his office implements a small Microsoft workgroup.

<h3>What is DAC?</h3>

DAC is a Microsoft dynamic access control is a tool for governing data in Windows server 2012. It helps in administering the access control settings of the device.

Thus, 65 DAC is the model that is used to represent the example in which a user explains to you that his office implements a small Microsoft workgroup.

Learn more about DAC

brainly.com/question/20216206

#SPJ1

You might be interested in
The measure of the maximum amount of data that can travel through a computer’s communications path in a given amount of time is
STatiana [176]

Answer:

Bandwidth

Explanation:

Bandwidth is the rate of transfer of data in the given time. Its unit is Bit/sec.

It is used to measure the transfer rate of bit in a network.

4 0
4 years ago
On the Format tab, in the Shape Styles group, there is the option to change the _____. a. Shape Effects b. Shape Fill c. Shape O
makvit [3.9K]
Hey there! Hello!

The answer to this problem will be D, "All Of The Above." I've attached a picture that shows the Shape Format tab in Microsoft Word. You can see in the dropdown that there's options for all three of your listed choices: Shape Fill, Shape Outline, and Shape Effects. 

I hope this helped you out! Feel free to ask me any additional questions if you have any. :-)

6 0
3 years ago
Creating a newsletter
pav-90 [236]
This isn’t helpful considering no one knows what type of news letter you want
6 0
3 years ago
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
What software tool can you use to see the applications that are currently running?
Soloha48 [4]

Answer:

You can use the task manager to see what programs are currently running.

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Lucky Sevens. Given a whole number, compute and display how many digits in the number are 7s. For example, the number of 7s in 3
    8·1 answer
  • Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
    8·1 answer
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • Kelvin owns a small trading firm. Recently, he suspected that some of his employees were using fraudulent activities for their p
    5·2 answers
  • How many bytes does a common processor require to represent an integer?
    7·1 answer
  • The merge sort algorithm____________.A. Can be used only on vectors of even length.B. Works by reducing vectors down to the base
    9·1 answer
  • Modify the CountByFives application so that the user enters the value to count by. Start each new line after 10 values have been
    7·1 answer
  • 50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​
    9·1 answer
  • 1. Separate valid and invalid variables:
    9·1 answer
  • In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!