1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eddi Din [679]
3 years ago
5

The conflict between the user’s goal for unfettered access to data and the security administrator’s goal to protect that data is

an issue of _________________.
A. System administration
B. Access control
C. Password protection
D. Social engineering
Computers and Technology
1 answer:
galben [10]3 years ago
7 0
B it is access control
You might be interested in
How do you represent a 3D object with unusual curves in 2D space? CAN SOMEONE HELP PLEASE
levacccp [35]
You have to draw the extra lines out
7 0
3 years ago
Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
Mekhanik [1.2K]
Yes uo daddddy deff uuxk me. har we. dd dads aafddu
6 0
3 years ago
What can be found in the computer tower
8_murik_8 [283]
There are several things.
Some which include of
<span>Hard Disk Drive (HDD)
</span><span>Processor (CPU)
</span><span>Graphics card
</span>and
<span>Memory (RAM)</span>
8 0
3 years ago
Which software application would you use to calculate and manipulate numerical data?
Basile [38]
The Software App That I Would Use Would Be NumericalDataHelp.com ... I Use that all the time ... If you cant find it just search in Google or Firefox Numerical Data Help and then you should be able to find some help there ... I hope that this helped !!! If it did mark me brainiest 
5 0
3 years ago
Does anyone know how I can make this return a double with 2 decimal places?
dolphi86 [110]

hi :)   .,..............

Explanation:

8 0
2 years ago
Other questions:
  • Describe network in terms of the class computer lab
    14·1 answer
  • What are some good job skills?
    12·1 answer
  • Were Al Zink’s actions that of someone trying to be an invisible Sponsor
    14·1 answer
  • The default color scheme is called ____.
    7·1 answer
  • What kind of command can you access from the mini toolbar in Microsoft Word?
    5·1 answer
  • A page with no meaningful content that is full of ads and the webmaster makes money from if someone clicks on them is called____
    7·1 answer
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • Your company has purchased another company that also uses Windows Server 2016 and Active Directory. Both companies need to be ab
    11·1 answer
  • Write code which takes a sentence as an input from the user and then prints the length of the first word in that sentence.
    6·1 answer
  • Why does my roku tv keep disconnecting from the internet.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!