1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
4 years ago
13

The process of determining that a user has permission to perform a particular action on a computer is called

Computers and Technology
1 answer:
Doss [256]4 years ago
5 0
I believe that would be authorization.
You might be interested in
PLS HURRY!!<br> Look at the image below!
Lady_Fox [76]

Answer:

Line 2: for numF in [3, 5]

Line 1: for numE in [2, 6]

Line 3: print(numE, numF)

Explanation:

From the outputs, the first number of the first output is 2. This means that <em>numE in [</em><em>2</em><em>, 6]</em> would be on the first line.

The second number of the first output is 3, concluding that <em>numF in [</em><em>3</em><em>, 5]</em> is within a nested loop, meaning it would be on the second line.

This leaves <em>print(numE, numF)</em> on line 3.

We can go through the lines step by step to check if we have placed them in the correct order:

Code

for numE in [2, 6]:

 for numF in [3, 5]:

   print(numE, numF)

During the first iteration, numE = 2 and numF = 3.

Output: 2, 3

Since [3, 5] is in a nested loop, we need to finish iterating all of its numbers before numE moves to the next number, so:

numF moves to 5, numE stays at 2.

Output: 2, 5

Since we have finished iterating through [3, 5], numE moves to 6 and numF starts back at 3:

Output: 6, 3

numE still stays at 6 and numF iterates to 5 since [3, 5] is in a nested loop:

Output: 6, 5

The outputs match the outputs on the sheet, meaning we have correctly placed the code in order.

Hope this helps :)

5 0
3 years ago
The first computer was developed by the government to spy on communist activities. Please select the best answer from the choice
allsm [11]
The answer is False.

The first computer was not developed to spy on communist by the government. The first computer was announced in 1946, the ENIAC (Electronic Numerical Integrator and Computer). It was built for general purposes like solving large mathematical problems. The US Army designed the computer to  calculate the artillery firing tables.
3 0
3 years ago
The main activity area or the brain of the computer is called the ________
Darya [45]

Motherboard

Its a computer chip



6 0
3 years ago
What is the difference in the way computers store numeric data and non-numeric data?
Elan Coil [88]
Both numeric and non-numeric data have different ASCII codes, that will be the first difference. Second, numeric data are stored in float, double, and int variables while non-numeric data are stored in char. However, both can be stored in a String variable if and only if the desired data to be stored will not be used for computuation using mathematical operations such as addition.

To store a non-numeric data in an array, the array must first be declared as a String variable array while a numeric data can be stored in an array once the array which will store the numeric data is declared as an integer, double, or float variable.
3 0
3 years ago
Which type of topology describes the physical arrangement, installation, and connection of cables, computer, and other devices?
Nutka1998 [239]
<span>The network topology describes the physical arrangement, installation, and connection of cables, computer, and other devices.
The network topology can be bus topology (a</span><span> network topology that uses a single cable or conductor to connect all nodes on the network.) ,</span>star topology (a network topology in which cables running from each node connect to a single point, such as a hub.), ring (a network topology that consists of a single cable that runs continuously from node to node), mesh, hybrid, hub topology,... according the arrangement of the nodes. 

8 0
3 years ago
Read 2 more answers
Other questions:
  • When a user first authenticates with a Kerberos-based server, he/she will receive _________ Group of answer choices a ticket-gra
    10·1 answer
  • A small company connects data acquisition equipment to the serial port of a computer. The equipment user has reported that not a
    8·1 answer
  • Canadian Tire is one of Canada’s largest companies. They operate four large distribution centers service over 470 tire retail ou
    5·1 answer
  • Which of the following will affect the size of your monthly mortgage payment
    8·2 answers
  • Which of these is not a potential cause of data loss?
    7·2 answers
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • Attach 2 screen shots demonstrating an understanding of file management tools, such as keyboard shortcuts, copy, paste, delete,
    8·1 answer
  • Does watching Beastars make me a furry? ​
    12·1 answer
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!