1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denpristay [2]
2 years ago
13

The principle of ________ strongly suggests that programs should execute with the least amount of privileges needed to complete

their function.
Computers and Technology
1 answer:
slava [35]2 years ago
4 0

The principle of least privilege strongly suggests that programs should execute with the least amount of privileges needed to complete their function. Hence the name "least priviledge."

You might be interested in
Top/Bottom Rules allow a user to apply conditional formatting to cells that fall within the top or bottom numbers or percentile.
vfiekz [6]

The numbers of  items that the user can include in the rule is the top or bottom 100 items only.

<h3>What is Top/Bottom Rules?</h3>

Top/Bottom Rules is known to be a rule where there is a premade form of conditional formatting which is often used in Excel to alter the set up  of cells in a range.

Note that the Top/Bottom Rules will allow a user to make changes to the top or bottom 100 items only as it only pertains to things that are up and those that are at the bottom.

Learn more about Top/Bottom Rules from

brainly.com/question/1862654

7 0
2 years ago
View the attached pic
mr_godi [17]
The answer is the first one
4 0
3 years ago
Read 2 more answers
Taking a break is necessary while using your computer or any other gadget. What are ways of having a break? Give five examples
mina [271]

Answer:

1) is to stretch or do some workouts

2) is to read

3) is to play outside for an hour

4) is to do gardening

5) is rest

3 0
2 years ago
Read 2 more answers
Who is known as the father of computer? ​
juin [17]

Answer:

Charles babbage ok my boy

8 0
3 years ago
Read 2 more answers
Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.
Marta_Voda [28]

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

7 0
3 years ago
Other questions:
  • How can development in ICT be utilized to speed up the development and integration efforts
    15·1 answer
  • Laura has identified the job she wants, the skills needed for the position, and the areas she needs to improve in order to get i
    10·1 answer
  • How can i become an ailen?
    5·2 answers
  • The person who can give a short defination of subroutine will get the brainliest.
    9·1 answer
  • knowledge contributes vitally to the development of __________ memory, or recollections of personally experienced events that oc
    12·1 answer
  • The sun emits invisible _____&gt; A) electromagnetic waves B) Waves C) Radiation D) Wavelength E) Ultraviolet Light
    8·1 answer
  • Describe your WGU program, including two specific requirements that this degree has for completion.
    14·1 answer
  • Write a function that dynamically allocates an array of integers. The function should accept an integer argument indicating the
    8·1 answer
  • How many passes will it take to find 30 using a binary search?
    6·1 answer
  • A monitor is an output device. Which of the following is not a type of monitor? *
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!