1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Simora [160]
3 years ago
12

You have several marketing documents that are published through AD RMS. However, you have three new marketing employees that req

uire additional training before they should be able to access these documents. These employees should have all other rights and permissions as members of the Marketing group. What should you do to prevent these users from accessing these rights-protected documents?
Computers and Technology
1 answer:
snow_lady [41]3 years ago
5 0

Answer:

Document unauthorized

Explanation:

this way new employees will not try to open

You might be interested in
If you save a Word file as a Web page, what type of file will it be?
Mnenie [13.5K]

Answer:

When you save a Microsoft Word document as a Web page (on the File menu, click Save as Web Page), Word automatically converts the page to HTML (Hypertext Markup Language), the language used by Web browsers to read Web pages.

Explanation:

7 0
3 years ago
Write a program to generate the 1,8,27,64,125,226,343,512,729,1000 series.​
ehidna [41]

Answer:

class series

{

public static void[]

main[string args[]]

{

into, I, n=4;

for(i=1;i<=n;i++)

{

d=i*i*i;

system. out. print(d+",");

}

}

}

Explanation:

java?

4 0
3 years ago
In what type of attack does the attacker send unauthorized commands directly to a database?
Delvig [45]
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.
4 0
4 years ago
A(n) ________ is a light-sensitive material used to make a chip.
RSB [31]
The photoresist is a light-sensitive material used to make a chip. Photoresists can likewise be uncovered by electron shafts, creating an indistinguishable outcomes from introduction by light. The primary distinction is that while photons are consumed, storing all their vitality without a moment's delay, electrons store their vitality bit by bit, and scramble inside the photoresist amid this procedure.
3 0
4 years ago
If you are working in a word-processing program and need to learn about its features, the best place to get assistants is from t
Hoochie [10]

Answer:

A

Explanation:

plz mark me brainlies

7 0
3 years ago
Read 2 more answers
Other questions:
  • para que sirve los siguientes sistemas operativos : a. Windows 10 b. Apple yosemite c. linux Ubuntu d. Android marshmallow e. IO
    9·1 answer
  • What important practice can help prevent hardware trouble?
    6·1 answer
  • Which if the following is an effect of intellectual property theft?
    6·2 answers
  • Which of the following is a difference between a centralized communication network and a decentralized communication network? a.
    15·1 answer
  • How can parents be health educators in family​
    13·1 answer
  • Int [] val = { 3, 10, 44 };
    13·1 answer
  • Assume that word is a variable of type string that has been assigned a value. Write an expression whose value is a string consis
    14·1 answer
  • 8.7 lesson practice question 1
    13·1 answer
  • Write a program that accepts a whole number as
    5·1 answer
  • I WILL MARK BRAINLEST
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!