1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
13

What happens to an LR if they troll/spam?

Computers and Technology
1 answer:
Mkey [24]3 years ago
8 0
They have a chance of being blocked
You might be interested in
During which part of geologic time were dinosaurs most common?
ANTONII [103]
The answer is C. Jurassic.
6 0
3 years ago
Read 2 more answers
Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
Svetradugi [14.3K]

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

4 0
3 years ago
On Microsoft teams, how do teachers know that you are on a different page?
emmasim [6.3K]

Answer:

they can view if you left the page on the teacher side of the website

Explanation:

i have made a page just for this

6 0
3 years ago
Read 2 more answers
Is it bad to leave external hard drive on for hours
alexandr402 [8]
Yes, because it can cause fires and electrical problems
8 0
3 years ago
A cell that a user is typing words or numbers into is called the ________  cell.
NeX [460]
Cell content or Content value
7 0
3 years ago
Read 2 more answers
Other questions:
  • What is a negative impact of digital communication
    6·1 answer
  • Which of the following characters is not allowed for java variable names
    7·1 answer
  • The ________ is an area where you can position fields to use for filtering the PivotTable and thereby enabling you to display a
    11·1 answer
  • In 1-2 sentences, describe how to change the font.
    8·2 answers
  • ____ includes any attempt to intentionally conduct dishonest activities online.
    5·1 answer
  • One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or
    9·2 answers
  • 5 negative impacts of digital life Explain
    9·1 answer
  • Hide Time Remaining A
    11·1 answer
  • You are now going to prepare some reports for the company. Measurements are in metres and volume
    7·1 answer
  • Question #5
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!