1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
2 years ago
15

if you are using an administrator account during a software installation and you get prompted by the uac, you should

Computers and Technology
1 answer:
N76 [4]2 years ago
7 0
  • If you are using an administrator account during software installation and you are prompted by UAC, all you have to do is click continue and finish the installation.This is because processes that require an administrator access token cannot be silently installed when UAC is enabled, the user must explicitly give consent by clicking yes or by providing administrator credentials.

  • Windows Security can be defined as a built-in application available in Windows 10 that provides a user-friendly interface and tools to manage common security features. An example is Microsoft Defender Antivirus, which offers real-time protection for your computer and data against viruses and many other types of malware. With Windows Security, our computers become more secure and the files on the computer.

Learn more about Windows Security here brainly.com/question/14262072

#SPJ1

You might be interested in
Write an algorithm to find the average of three numbers: 10, 20, 30
STALIN [3.7K]

Language: JavaScript

Answer:

let num = [10,20,30];

average(num);  

function average(num) {

 let sum = 0;

 for(let i in num) {

   sum += num[i];

 }  

 return console.log(sum/num.length);

}

3 0
3 years ago
How are PivotCharts different from regular charts?
AnnZ [28]

Answer:

The answer is a on edge2020.

:D have a great day and stay safe <3.

6 0
3 years ago
What is the difference between a loop and a function?
Eduardwww [97]
Big difference
Loops allow you to execute code multiple times while a condition is true
Functions allow you to “call” a snippet of code whenever you want, and you can pass it arguments that could affect the data it returns
7 0
2 years ago
Read 2 more answers
Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
Ad libitum [116K]

Answer:

1.In the first query the column Z of table xyz wil change and set to its  default value so we use alter command .

Syntax :ALTER TABLE TABLENAME  ALTER COLUMN NAME  SET DEFAULT VALUE

So SQL query is :

ALTER TABLE  XYZ  ALTER Z SET DEFAULT  9999  ;

This query will Change the column Z of a table XYZ to acceptdefault value 9999 .

2.In the second query we delete a table from database so we use DROP    command .

Syntax :DROP TABLE TABLENAME;

So SQL query is :DROP TABLE XYZ;

This query will delete the table from database.

3.In the last query we have to change the column Z from table again we      use alter command .

Syntax:ALTER TABLE TABLENAME  DROP  COLUMN  COLUMNNAME  ;

So SQL query is :

ALTER TABLE XYZ DROP COLUMN Z;

This query will delete column Z from the table XYZ.

8 0
3 years ago
Explain how arrays are stored in memory? Show how arr [5] is stored in the memory. Assume each memory location is one byte long
Black_prince [1.1K]

Explanation:

Array is collection of similar data types it is a linear data structure.Array stores elements in a contiguous memory location.

We have an array arr[5]  of size 5 and it is of integer type.Suppose the starting address of the array is 2000 and each memory location is one byte long.As we know that the size of integer is 2 or 4 bytes we take it 2 bytes.

If the starting address is 2000 that is of index 0 then the address of index 1 is 2000+2=2002.

address of index 2=2004.

address of index 3=2006.

address of index 4=2008.

Since size of int is 2 bytes hence we add two memory location.

8 0
3 years ago
Other questions:
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • Which OS does NOT provide users with a GUI?
    5·1 answer
  • If you receive an email message you suspect is spam, what should you do?
    11·1 answer
  • True or False
    11·1 answer
  • You have been asked to install a WLAN for a small business. You centrally locate the WAP in a large room that contains about 15
    5·1 answer
  • 1. Our Systems are Microsoft Dynamics OLTP, we move data from the Source Systems through Staging to a Data Warehouse. Our report
    12·1 answer
  • Which of the following is adoptable in Mindanao only?​
    5·1 answer
  • Why do we need to know the different Networking Devices?​
    10·1 answer
  • Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
    9·1 answer
  • Which function returns the rank of a value within a dataset, assigning an average rank for tied values
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!