1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
2 years ago
8

An administrator at ursa major solar is using sharing rules to grant record access to users. which two types of record access ca

n the administrator grant?
Computers and Technology
1 answer:
My name is Ann [436]2 years ago
4 0

Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

<h3>What is read write access?</h3>

This is seen as a kind of device that can both act as a kind of input and output or moves and receive.

Note that it is also seen as digital file that can be updated and deleted and therefore, Based on the above, The two types of record access can the administrator grant are:

C. Read/Write

D. Read Only

Learn more about record access from
brainly.com/question/8798580

#SPJ1

You might be interested in
Can someone please help and answer the 6 questions on the bottom of the page
garik1379 [7]

Ivan rigney

John benson      2

Mark nicholls      4

James  mitchell   7

Paul matthews   13

Neil hooper         8

5 0
3 years ago
Select all the correct answers.
Elden [556K]

Answer: Bulleted or numbered lists, presenting data in tables, and the formatting one.

Explanation: I’m taking the test and i’m pretty sure that’s right, lmk if you got a better answer though!

5 0
3 years ago
Read 2 more answers
So i am taking to edhesive computer science course in my school, and i am confused on 1.6 code practice,
elixir [45]

I included my code in the picture below. Best of luck.

5 0
3 years ago
An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Whic
OlgaM077 [116]

Answer:

'Urgency' is the name of this type of social engineering attack.

Explanation:

Social engineering attack describes a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

In 'Urgency attacks', the attacker uses some sort of emergency or urgent situation to get someone/people to do what they want or divulge a piece of information.

Hope this Helps!

5 0
4 years ago
Will, there be any presents this year
garri49 [273]

Answer:

no why

Explanation:

8 0
3 years ago
Other questions:
  • Assume that x is a double variable that has been initialized. Write a statement that prints it out, guaranteed to have a decimal
    5·1 answer
  • Which of the following is NOT a group on the Slide Master tab?
    6·1 answer
  • What happens when a filter is applied to a database?
    13·1 answer
  • 11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an excepti
    6·1 answer
  • Write the definition of a class Counter containing:
    5·1 answer
  • Plez answer this
    10·1 answer
  • Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.
    13·2 answers
  • Photographs, illustrations, and videos are increasingly created an and viewed in digital formats. True or False​
    5·2 answers
  • So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Some
    9·2 answers
  • What is an example of new technology having a negative impact on sustainability?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!