1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
4 years ago
6

What term is used to describe a list of security policies that is associated with an object?

Computers and Technology
1 answer:
Artemon [7]4 years ago
5 0

Answer:

An Access control list (ACL) is used to describe a list of security policies that is associated with an object

You might be interested in
What is Fill handle?
vesna_86 [32]

Answer: I copied and pasted my answer if you need the website to cite information let me know

Explanation:

Fill Handle is a feature in Excel that enables you to auto-complete a list in a row/column by simply dragging it using your mouse. A basic understanding of fill handle in Excel could save you some time and make you more productive.

6 0
3 years ago
Which of these is NOT a standard part of the outro of a podcast?
Lisa [10]

Answer:

final thoughts

Explanation:

it is generally what we should do so that people can know what your opinion on it at the end

7 0
3 years ago
Explain the role of computers in accounting
Inessa05 [86]

Answer:

A computer helps accountants store and access financial records, make changes and alleviate the need to keep paper files. If paper work is needed, computer files can easily be accessed and printed along with any changes the accountant makes at any given time.

8 0
3 years ago
Who is he can anyone help me​
34kurt
This person is Elon Musk, the owner of Tesla :)
5 0
3 years ago
Read 2 more answers
Suppose we have a linearly separable dataset, and we divide the data into training and validation sets. Will a perceptron learne
Sauron [17]

Answer:

Theoretically Yes

Explanation:

The data given is linearly separable. So, the subset of the data will also be linearly separable. And it will pass for all training dataset. However, you should definitely never expect such thing In any real-life problem because the data is noisy, for a bazilion of reasons, so no model is guaranteed to perform perfectly.

3 0
3 years ago
Other questions:
  • Why do you think LinkedIn has become so popular?
    6·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • I need help with some computer stuff
    8·1 answer
  • What tasks do most operating systems perform?
    15·1 answer
  • You have to sort 1 GB of data with only 100 MB of available main memory. Which sorting technique will be most appropriate?
    5·1 answer
  • Literally no one helps answer my questions so this website is pointless.... : /
    11·1 answer
  • _____the measuring instrument is not necssery​
    10·1 answer
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • Strengths and weaknesses about esport
    10·1 answer
  • Describa la clasificación de los recursos educativos digitales abiertos. vea este video, para hacer eso
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!