1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
2 years ago
8

An administrator at ursa major solar is using sharing rules to grant record access to users. which two types of record access ca

n the administrator grant?
Computers and Technology
1 answer:
My name is Ann [436]2 years ago
4 0

Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

<h3>What is read write access?</h3>

This is seen as a kind of device that can both act as a kind of input and output or moves and receive.

Note that it is also seen as digital file that can be updated and deleted and therefore, Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

Learn more about record access from
brainly.com/question/8798580

#SPJ1

You might be interested in
Blogs may refer to any kind of communication over the internet is true​
Sliva [168]

Answer:

Yes It's true but You forgot email

Explanation:

6 0
3 years ago
Compression is the action of storing a piece of data with__________ bits.
soldi70 [24.7K]
The answer is fewer because I know a lot about tech I take classes
8 0
3 years ago
Read 2 more answers
A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016)
BARSIC [14]

Answer:

The Ribbon is composed of three parts: Tabs, Groups, and Commands.

4 0
3 years ago
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Sergeu [11.5K]

Answer:

The answer is D.

Explanation:

because the other answers doesn't make sense.

6 0
3 years ago
True or false you have no control over who views your social network information
cestrela7 [59]
<span>This statement is false. Privacy is a very high-stakes concern for many social networks, who have gone to great lengths to put in place certain restrictions, such as the ability to make ones profile private or hide a profile from certain individuals.</span>
4 0
3 years ago
Other questions:
  • A paradigm innovation occurs when:
    6·1 answer
  • Given an object context for an Entity Data Model named mmaBooks, which of the following statements would you use to add a Custom
    15·1 answer
  • A typist is entering text on keyboard at the rate of 30 words per minute. if each word is 6 characters long on average, what ban
    5·2 answers
  • Do the shape of a sign gives you a clue about the information contained on the sign
    7·1 answer
  • "The _____ of the Open Systems Interconnection (OSI) model generates the receiver’s address and ensures the integrity of message
    6·2 answers
  • A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
    12·1 answer
  • Calculate the number of telephone
    5·1 answer
  • You wrote a program to allow to guess a number chosen randomly.
    10·2 answers
  • A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a c
    11·1 answer
  • Should a UDP packet header contain both Sour Port # and Destination Port #?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!