1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iris [78.8K]
4 years ago
14

What does limited access to a document mean?

Computers and Technology
1 answer:
mr_godi [17]4 years ago
9 0
<h2>Answer:</h2>

Limited access to a document means that:

Option D: It enables a person to read the document but not edit it.

<h2>Explanation:</h2>
  • The access to a document can be limited by applying such properties to it.
  • This action is performed mostly on such computers that are under use of other people. Such as the client-server model. A server can limit the important document in order to maintain integrity.
  • This is done in order to assure that people may get benefited from that specific important document but they don't modify it in order to destroy its integrity.

<h3>I hope it will help you! </h3>
You might be interested in
Word how to create a text box with lines 2013
Crank
U go on your keypad and where the numbers are at next to the 0 u see this ------------------------- so u can make lines with that


I hope this help*static*
4 0
4 years ago
100 POINTS!!!
aleksklad [387]

Answer:

Hmm.. Try researching, I'm sure you'll find something there..

7 0
3 years ago
You receive an instruction from the CIO to create the logical structure of the company from the active directory domains. In ord
SOVA2 [1]

Answer:

A.This can be accomplished using Organizational units (OUs).

Explanation:

This is the statement that best describes how you should accomplish this task. An organizational unit (OU) is a subdivision within an Active Directory. Therefore, this is what will allow you to create the logical structure of the company from the Active Directory domains. When using an OU, you can place users, groups, computers and other organizational units within it. Moreover, each domain is able to create its own organizational unit hierarchy.

4 0
3 years ago
The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.
navik [9.2K]

Answer:

ALU

Explanation:

Arithmetic Logic Unit (ALU) is the part of the microprocessor that performs arithmetic operations, such as addition, subtraction, AND, OR, NOT, XOR etc. ALU is also used for comparison of input numbers.

<u>HOW IT WORKS:</u>

When the code is compiled, the code is converted first to assembly language and then assembly language is converted to machine code.

In Machine language, each arithmetic or logic operation has a specific code known as OPCODE. This opcode tells ALU which operation to perform on the inputs.

6 0
4 years ago
An organization is building a new customer services team, and the manager needs to keep the tream focused on customer issues and
Readme [11.4K]

Answer:

a. Install a web application firewall.

Explanation:

In this scenario, an organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users (employees) are provided with a specific set of tools (software applications) installed, which they must use to perform their duties. However, other tools (software applications) are not permitted for compliance and tracking purposes of employees who flouted the rules made by the management. Also, team members are able to access the internet for purposes such as, product lookups and to research customer issues.

In order to keep the team focused on customer issues and minimize distractions, the security engineer should install a web application firewall.

A web application firewall is an application firewall that can be used for monitoring, filtering, blocking or denial of bidirectional packets (http traffics); to and from websites or web applications.

When a web application firewall is properly implemented and configured by the security engineer, it inspects all http traffics and provides adequate protection against cookie poisoning, security misconfigurations, SQL injection, broken authentication, cross-site scripting (XSS), file inclusion, sensitive data leaks, buffer overflow etc.

Basically, the web application firewall primarily prevents an application layer (layer 7 of the OSI model) attacks.

Hence, to fulfil the manager's requirements, the security engineer should install a web application firewall which basically works as a reverse proxy protecting the web server from vulnerabilities or potential attacks.

7 0
3 years ago
Other questions:
  • True or false words spelling and grammar check is always %100
    7·2 answers
  • All waves consist of a continuous series of _____.
    11·2 answers
  • "what are two elements found in an email address?"
    7·1 answer
  • A block style business letter is:
    5·1 answer
  • Moore's Law states that the processing power of the latest computer chips doubles about every eighteen months. Assuming the grap
    6·1 answer
  • 01110111 01101000 01100001 01110100 00100000 01101001 01110011 00100000 00110001 00101011 00110001
    7·1 answer
  • (Help please I don't know what to choose because it's both text and email but I can only pick one. HELP!!!!!!!!!!)
    6·2 answers
  • Which one of these is the range for a Class C address?
    12·2 answers
  • Relieved to have survived ,henry rolled off the rink________.giving alex a grateful look
    8·1 answer
  • Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!