1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
2 years ago
8

An administrator at ursa major solar is using sharing rules to grant record access to users. which two types of record access ca

n the administrator grant?
Computers and Technology
1 answer:
My name is Ann [436]2 years ago
4 0

Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

<h3>What is read write access?</h3>

This is seen as a kind of device that can both act as a kind of input and output or moves and receive.

Note that it is also seen as digital file that can be updated and deleted and therefore, Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

Learn more about record access from
brainly.com/question/8798580

#SPJ1

You might be interested in
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
Which of the following describes the phishing method of information security crime?
Marianna [84]
<span>C. pretending to be someone else when asking for information</span>
3 0
3 years ago
Read 2 more answers
CONCEPTO DE ORGANIGRAMA
inysia [295]
Como the amas si mucho gusto
3 0
3 years ago
Can You Get Commission Shortcut For FREE?
ANEK [815]

Answer:

Yeah if you look it up it says you can get it for free

6 0
3 years ago
6.5 Code Practice: Question 4 Edhesive
tresset_1 [31]

Answer:

Explanation:

print('Enter 10 temperatures')

sum = 0

for i in range(10):

   S = float(input())

   sum = sum + S    

print('The sum is: ',sum)

First, we print a comment asking the ten temperatures, then we declare the variable sum = 0.

We create a for cycle where the user must enter the temperatures, 10 in this case, then we must do the operation, summing the 10 numbers.

In the last step, we print the result with the variable sum.

8 0
3 years ago
Other questions:
  • Your friend, who is a little computer phobic, is going to create his first web page, and he asks you to recommend some software
    13·1 answer
  • Describe shortly about the following Linux directories and theirpurpose,1. lib2. etc3. Boot4. Root5. home
    6·1 answer
  • A section-lined area is always completely bounded or outlined by an?
    11·1 answer
  • What is the voltage drop across R4 in the diagram shown above?
    13·1 answer
  • What is a good way to minimize technical problems with your computer
    10·1 answer
  • The business case for using grid computing involves all of the following except: speed of computation. cost savings. agility. in
    5·1 answer
  • Write a program that displays a menu allowing the user to select air water, or steel. After the user has made a selection, the n
    10·1 answer
  • You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the emai
    6·1 answer
  • Question 1(Multiple Choice Worth 5 points)
    9·2 answers
  • Which of the following recommendations should you follow when placing access points to provide wireless access for users within
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!