1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yuradex [85]
1 year ago
11

you are the it manager for your company. you have been asked to give the executive group the right to read, change, and assign p

ermissions to document
Computers and Technology
1 answer:
inn [45]1 year ago
5 0

The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

<h3>What do you mean of executive?</h3>

An executive is seen as a kind of a powerful person  and they are the people that are known to be  responsible for making things go on or  run smoothly in any organization.

Therefore, The permission to give the executive group the right to read, change, and assign permissions to document is Give executive Change to shared permissions

Learn more about executive  from

brainly.com/question/838027

#SPJ1

You might be interested in
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Please help me. i will mark you brailiest
Stolb23 [73]

Answer:

Simple, really

Explanation:

3Rd one is pretty easy, all you have to do is read closely.

3 0
2 years ago
Write a menu-based program in C++ for an input restricted dequeue using Linked List consist of
Natali5045456 [20]

Answer:

C++ With Examples

— Input-restricted Deque: In input-restricted, deletion can be done from ... getLast: Retrieves the last item in the queue. ... Now, we insert element 3 at the rear.

8 0
2 years ago
Select the correct answer from each drop-down menu. Kristian is a cybersecurity professional. She is writing a book called The D
Papessa [141]

Data sharing, maintaining security

<u>Explanation:</u>

Kristian is a cybersecurity professional. She is writing a book called The Door Toward Cybersecurity. Organizations should avoid any data <u>sharing or exchange</u> while servers are transmitting information. This will help organizations keep the information intact and maintain <u>security.</u> If any info or data shared when the servers are transmitting the info, then it may lead to the loss of security, and the information gets leaked. So it must be avoided to share while transmission of info using the servers.

3 0
2 years ago
Read 2 more answers
What are the steps to configure user information in a document?
chubhunter [2.5K]

Answer:

file, properties, options, general

Explanation:

4 0
2 years ago
Read 2 more answers
Other questions:
  • A(n) ________ address is a temporary ip address assigned from an available pool of ip addresses.
    12·1 answer
  • What type of hardware and software does Instagram use?
    9·2 answers
  • This question is for one of my classes I am in right now, and the question is:
    8·1 answer
  • Three variables, x, y and z, supposedly hold strings of digits, suitable for converting to integers. Write code that converts th
    7·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • If you have two tasks x and y, with y being a successor to x, if we mark x as undone (because it needs to be redone for some rea
    15·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • Trong ửod muốn trình bày dạng cột càn thực hiện lệnh nào
    13·1 answer
  • Final one bit l y links are a virus that will corrupt your files do not go on it
    15·2 answers
  • Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only t
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!