1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
monitta
4 years ago
5

The users, groups, logins, and roles that have access to a server are called ________________. a. ids b. permissions c. principa

ls d. securables
Computers and Technology
1 answer:
SVETLANKA909090 [29]4 years ago
8 0
<span>The users, groups, logins, and roles that have access to a server are called securables. Correct answer: D
</span><span>A securable is anything that can have permissions granted, denied, or revoked on in SQL Server, while p</span>ermission is used to grant a user account access to a database.

You might be interested in
your computer running Windows 10 is doing some very strange things with operating system you are fairly certain it is not a hard
AlekseyPX
It might be a virus, when my computer starts going crazy i just bought a fixme stick and they work amazing or trying getting an expert to fix it if it worse
6 0
3 years ago
Read 2 more answers
I can't find my grandson someone help
Artemon [7]

Answer:

i'm right here

Explanation:

grandma

8 0
3 years ago
Read 2 more answers
Match the careers with the career clusters.
creativ13 [48]
<h2>Answer and Explanation:</h2>

The picture shows the right careers with their respective career clusters.

4 0
3 years ago
Read 2 more answers
How are the current and resistance related when the voltage of a circuit is constant?
andreev551 [17]
Since resistance and current are inversely proportional, when the resistance doubles, the current is cut in half.
5 0
3 years ago
Read 2 more answers
Security measures are sometimes described as a combination of physical, technical, and administrative (PTA) safeguards. Which of
attashe74 [19]

Answer:

Measures including device data encryption, anti-malware software, and communications encryption.

6 0
4 years ago
Other questions:
  • What is a negative impact of digital communication
    6·1 answer
  • In a video, a motionless image is called
    7·2 answers
  • What is the solubility of an empty soda can
    10·1 answer
  • А.<br> is the highest education degree available at a community college.
    6·1 answer
  • The members of the IT department have spent two days debating the best approach to roll out the new software update. After allow
    15·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:_________.
    14·1 answer
  • Which language paradigm interacts well with database systems in business environments that use SQL?
    12·1 answer
  • When converting text to a table, which feature should be used?
    12·1 answer
  • Margie has found a stock template to use. She changes a few things about the formatting and then saves the
    7·2 answers
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!