1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irakobra [83]
3 years ago
12

Select all that apply.

Computers and Technology
2 answers:
Zarrin [17]3 years ago
8 0
Insert menu i think ??

Ierofanga [76]3 years ago
3 0
Insert option the last one
You might be interested in
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
rodikova [14]

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

5 0
4 years ago
What is the Keyboard shortcut to change the case of selected text?
kogti [31]

Answer:

Select the text and then press Shift + F3 until the case you want is applied.

5 0
3 years ago
What is instant messaging
SpyIntel [72]
Instant messaging (IM) is a type of communication where one person can send a message (typically text based) and have another (1 or more) recipient receive the message.
6 0
3 years ago
What is the advantage of defining a target user?
spayn [35]
3) helps the designer develop a website tailored to the desired audience
4 0
3 years ago
Counting calculus students. About A university offers 3 calculus classes: Math 2A, 2B and 2C. In both parts, you are given data
OleMash [197]

Answer:

Part (a) n(A∩B∩C) = 4

Part (b) n(A∪B∪C) = 54

Explanation:

n(A) = no. of students who took Math 2A

n(B) = no. of students who took Math 2B

n(C) = no. of students who took Math 2C

n(A∩B) = no. of students who took both Math 2A and 2B

n(A∩C) = no. of students who took both Math 2A and 2C

n(B∩C) = no. of students who took both Math 2B and 2C

n(A∩B∩C) = no. of students who took all three Math 2A, 2B and 2C

n(A∪B∪C) = no. of total students in a group

∩ represents Intersection and ∪ represents Union

Part (a)

n(A∪B∪C) = n(A) + n(B) + n(C) - n(A∩B) - n(A∩C) - n(B∩C) + n(A∩B∩C)  

Where n(A∩B∩C) represents the number of students who took all three classes and n(A∪B∪C) represents the total number of students in group A

157 = 51 + 80 + 70 - 15 - 20 - 13 + n(A∩B∩C)

Re-arranging the equation to solve for n(A∩B∩C) since we want to find out those students who took all three classes

n(A∩B∩C) = 157 - 51 - 80 - 70 + 15 + 20 + 13

n(A∩B∩C) = 4

So there are 4 students in group A who took all three classes

Part (b)

n(A∪B∪C) = n(A) + n(B) + n(C) - n(A∩B) - n(A∩C) - n(B∩C) + n(A∩B∩C)

This time we are given n(A∩B∩C) students who took all three classes and want to find n(A∪B∪C) that is total number of students

n(A∪B∪C) = 28 + 28 + 25 - 11 - 9 - 10 + 3

n(A∪B∪C) = 54

So there are total 54 students in group B

8 0
3 years ago
Other questions:
  • When you want to print a page from the World Wide Web, select the print command in the _____.
    8·2 answers
  • Give the 16-bit 2's complement form of the following 8-bit 2's complement numbers: (a) OX94 (b) OXFF (c) OX23 (d) OXBCWhich of t
    7·1 answer
  • If needed, you can pull over on the shoulder of the freeway to take a break if you are tired. true or false (drivers ed) need as
    11·1 answer
  • Write a python program that contains a main function and a custom, void function named show_larger that takes two random integer
    15·1 answer
  • When you tap or click the ____ button for a selected graphic, Word provides options for changing how a graphic is positioned wit
    5·1 answer
  • EVERYONE PLS JOIN MY GOOGLE CLASSROOM<br> CODE: clmvjbd
    13·2 answers
  • What law made it illegal to spread contraceptive information and devices?
    6·1 answer
  • If the user loads this graphic in a text only browser how will the browser describe it?
    11·2 answers
  • Point out the wrong statement.
    10·1 answer
  • A(n) ___ is a set of CPUs which work in parallel in an attempt to simulate the way the human brain works, although in greatly si
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!