1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xz_007 [3.2K]
3 years ago
10

G Suite for Education offers which benefits to educators? (Select all that apply.) Select All Correct Responses Android apps ava

ilable on select chromebooks Domain admin can install apps All apps are approved by your organization App permissions reviewed by domain admin for student safety
Computers and Technology
1 answer:
alukav5142 [94]3 years ago
4 0

Answer:

The correct options are;

1) Android apps available on select chrome books

2) Domain admin can install apps

3) App permissions reviewed by domain admin for student safety

Explanation:

Select Chrome books work with android apps including does part of G -Suite for Educators such ,  Class room, Contacts, Drive, Vault,  Docs, For ms, Sheets

Domain administrators can manage school owned devices and applications including installing an app

Part of managing the domain includes the review of per missions for apps for student safety.

You might be interested in
In public-key encryption, the two keys–one for coding and one for decoding–are known as ________.
Feliz [49]
Public key and private key  - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known  by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.
5 0
3 years ago
What is a histogram?
Mice21 [21]

Answer:

I’m pretty sure its C. Can you mark me Brainliest if I am correct? Thank you have a nice day!

Explanation:

8 0
4 years ago
A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular websit
bonufazy [111]

Answer: The man's info has been found and a hacker was trying to make him confirm his passwrd so he can get a hold of it to hack the man further.

Explanation:

3 0
3 years ago
35 points please help!
Ahat [919]

Answer:

Microsoft Poweroint

Explanation:

this software helps people to present their projects.

7 0
4 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • What does CMOS stand for?
    15·2 answers
  • 2. Design a class named Sandwich with data fields for description and price. Include a constructor that requires arguments for b
    14·1 answer
  • _____ is a component of a data model that defines the boundaries of a database, such as maximum and minimum values allowed for a
    12·1 answer
  • Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
    5·1 answer
  • Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructo
    12·1 answer
  • 4. Write technical term for the following statements
    15·2 answers
  • True or False: Nanomemory applies to computers.
    13·1 answer
  • Tax preparation software can help prepare and file your taxes by _________.
    7·1 answer
  • Hannah is editing her brother’s birthday video. She has selected the usable shots and copied them onto her computer. What is the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!