1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Assoli18 [71]
3 years ago
5

Only the _________ can add users with passwords and limit user access to selected areas.

Computers and Technology
1 answer:
Iteru [2.4K]3 years ago
8 0

Answer:

The answer to this question is "Quickbooks administrator.

Explanation:

The answer is the Quick books administrator because Quick books is a software that is used for accounting developed. It helps us to keep in mind all the expenses in the business and things like invoicing, reporting.In this software, we can add new users and give them permission. If we want to allow Users to access the software.

In the Quickbooks administrator, we can add the user with limited access also. So the correct answer is Quickbooks administrator.

You might be interested in
In which part is data processing done?
postnew [5]
Data processing is done in cpu of computer
4 0
4 years ago
Sara is a college student studying accounting. She uses a laptop daily for personal and course work. What data might Sara have o
polet [3.4K]

Answer:

Sara: Personal data

Jorge : Personal data + official data.

Wanda: Personal data + students data

Carl: Personal data + official data

Explanation:

Personal data could contain pictures, social security numbers, banking transactions details, passwords, credit card information etc.

Jorge's official data could contain information about various sources that he gets his news from. It could contain password information about his official email. And he connects to the office network, he might pose a threat to the entire network if his PC is infected.

Wanda could leak the student's information. She could also leak her social security numbers, bank details, organization's details etc.

Carl could leak company's information. He can avoid it by staying away from public networks. Installing anti-virus. He should also take great care while accessing various sites and never download harmful files over the internet.

8 0
3 years ago
Por que se dice que las TIC´S son las integracion de las TI y las TC?
Katena32 [7]

La respuesta correcta para esta pregunta abierta es la siguiente.

A pesar de que no se anexan opciones o incisos para responder, podemos comentar lo siguiente.

Se dice que las TIC´S son las integración de las TI y las TC porque ambas actividades se han integrado o fusionado en una solo concepto al momento de juntar las herramientas tecnológicas para almacenar, procesar y mandar información a través de los recursos tecnológicos utilizando los canales o recursos de los medios masivas de comunicación como lo son las redes satelitales o las comunicaciones vía microondas.

Al fusionarse las TI (Tecnologías de la Información) con las TC (Tecnologías de Comunicación), se maximiza la capacidad de enviar una mayor cantidad de información al momento a diferentes lugares del planeta.

4 0
3 years ago
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/I
Fudgin [204]

Answer:

This is the second question like this I've seen. They aren't the greatest.

Explanation:

The question is not good. The answer would be option a, Transport even though it doesn't make a whole lot of sense when you really go into detail.

It could also be option d, Application but I think they're going for the first.

6 0
2 years ago
How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
erma4kov [3.2K]
Almost all of the colonist of Jamestown died before they made it to shore, due to the difficult voyage.
8 0
3 years ago
Other questions:
  • Match the feature to its function. 1. Normal view provide rows of icons to perform different tasks 2. Notes view an area in whic
    15·2 answers
  • Why is two way communication important for the new communications network?
    8·1 answer
  • What item on a business card is generally the most prominent?
    10·2 answers
  • Write algorithm to find (a+b)^2=(a+b)*(a+b)​
    9·1 answer
  • When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variab
    12·1 answer
  • You are the administrator for a small network. You have approximately 50 users who are served by a single Windows server. You ar
    7·1 answer
  • Write a program that creates an integer array with 40 elements in it. Use a for loop to assign values to each element of the arr
    5·1 answer
  • Name 6 examples of how telemedicine is used in healthcare
    7·1 answer
  • the administrator in an Exchange Server needs to send digitally signed and encrypted messages. What should the administrator use
    5·1 answer
  • Explain why the scenario below fails to meet the definition of showrooming.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!