1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
4 years ago
15

User access to network resources falls into one of these two categories: 1) the privilege or right to execute, install, and unin

stall software, and 2) permission to read, modify, create, or delete data files and folders.
Computers and Technology
1 answer:
sladkih [1.3K]4 years ago
7 0

Answer:

The given statement is "True".

Explanation:

Network resources stand for data formats, data, and resources that are accessible via a network that is linked by a group of computers. These services are also known as common resources. For working environments where teamwork is important for success that is necessary.  

  • The main purpose of network resources is to share resources between two connected computers, that are connected by wire or wireless medium.
  • This resource is used to create, modify, and delete files and it also used to manage software.
You might be interested in
Write a program that reads a list of integers into a list as long as the integers are greater than zero, then outputs the smalle
Aleks [24]

n = 1

lst = []

while n > 0:

   lst.append(n := int(input()))

lst.pop(-1)

print(str(min(lst)) +" and "+str(max(lst)))

I wrote this code in python 3.8. I hope this helps

7 0
3 years ago
What does the Merge and Center feature do? Check all that apply.
mote1985 [20]

Answer:

Merging cells combines the selected cells to form a large cell.

Explanation:

To merge cells, select the cells you want to merge and click on Merge & Center in the ribbon. Centering just makes the values/text in the cell centered. Wrapping text means to have the text in a cell not keep going horizontally but be in "paragraph form".

8 0
3 years ago
Read 2 more answers
There are main type of memory
BARSIC [14]

Answer:

Random acess memory (RAM)

Explanation:

8 0
3 years ago
Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
kogti [31]

Answer:

theSum = 0.0#defined in the question.

count=0 #modified code and it is used to intialize the value to count.

data = input("Enter a number: ") #defined in the question.

while data != "": #defined in the question.

   number = float(data) #defined in the question.

   theSum += number #defined in the question.

   data = input("Enter the next number or press enter to quit ") #defined in the question "only some part is modified"

   count=count+1#modified code and it is used to count the input to print the average.

print("The sum is", theSum)#defined in the question.

print("The average is", theSum/count) #modified code and it is used to print the average value.

output:

  • If the user inputs as 1,4 then the sum is 5 and the average is 2.5.

Explanation:

  • The above code is written in the python language, in which some part of the code is taken from the question and some are added.
  • The question has a code that tells the sum, but that code is not print the average value of the user input value.
  • To find the average, some codes are added, in which one count variable which is initialized at the starting of the program and gets increased by 1, when the user gives the value.
  • Then that count divides the sum to print the average.
5 0
3 years ago
When securing a system, why is it important to audit failed attempts to access files?
NARA [144]

Answer:

Auditing failed attempts are important because it helps keep track of the activities which may have been attempts to access the secure files without proper authentication. It is important for the security of the sensitive information in the system.

Auditing ensures the safe and secure environment for a system where all the sensitive and important data remains safe by keeping the unauthorized users from accessing it.

Explanation:

Solution

When a failure auditing is enabled, the every time unsuccessful tries to access the files by a user occurs, an audit entry is generated. the files server auditing is a very crucial step towards securing a system.

With a record of all failed trial made to access the file, investigations in a case of breach in data is quite simple. it also helps is identifying the client computer from which the failed attempts were carried out.

Therefore, file auditing is very necessary in securing a system.

7 0
3 years ago
Other questions:
  • Greg is writing a report on becoming an advertising and promotions manager. Complete the report by correctly filling in the miss
    12·1 answer
  • Yahoo! allows users to create personalized my yahoo! pages. users can add or delete a variety of information from their personal
    8·2 answers
  • Software that manages the resources of the computer is called:
    12·1 answer
  • Why has Unicode become the standard way of converting binary to text?
    12·1 answer
  • How has the use of computers impacted business
    13·2 answers
  • When configuring services, what linux directory typically contains server configuration files?
    8·1 answer
  • To what would you compare the transport layer?
    12·1 answer
  • Attribute variables have the same meaning as participants variables. is this true or false?​
    14·1 answer
  • Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purc
    14·1 answer
  • Noi needs to send some documents to a client in another company. Which device can she use to make digital copies of the paper fi
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!