1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
4 years ago
11

Who are some of the people who use social media and other internet resources to research candidates

Computers and Technology
1 answer:
bezimeni [28]4 years ago
6 0

Answer:

Digital Citizens

You might be interested in
Select the correct answer from each drop-down menu.
Furkat [3]

First blank :- <em>highlighting</em>

Second blank:- <em>Changing the font size in the cells that contain the </em><em>data</em>

<em> </em><em>hope </em><em>it</em><em> helps</em><em> you</em><em>.</em><em>.</em><em>.</em><em> </em><em>pls </em><em>mark</em><em> brainliest</em>

6 0
3 years ago
Read 2 more answers
A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
irina1246 [14]

The “Allow changes by more than one user at the same time” option.


In a group of users, it is very important to create a shared workbook so that several people are able to update information and track changes in the workbook at the same time. To do so, one should click on the review tab of the excel sheet and select share workbook. On the editing tab of the share workbook dialog box, select the Allow changes by more than one user at the same time check box. Go ahead and click the advanced tab and select option you would want to use and then click OK

 






4 0
3 years ago
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
xz_007 [3.2K]

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

3 0
3 years ago
Which boolean operator (and, not, or or) gives you the least results? *?
Readme [11.4K]
And, as it only includes results with just both terms. Or will give either and not will give everything but.
6 0
3 years ago
What button is marked with the little hollow square at the top of the right window
andrew11 [14]

Next to the close-window-button, is the minimize/maximize button
5 0
3 years ago
Read 2 more answers
Other questions:
  • A list of the slides in a presentation is found here.
    7·2 answers
  • _____ is a feature that records the changes you make to a document.
    12·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • Write a program named SortWords that includes a method named SortAndDisplayWords that accepts any number of words, sorts them in
    10·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • PLSSS HELPP IM DESPERATE!!!
    11·1 answer
  • Which is the correct expansion of the term Internet?
    14·2 answers
  • 2. 25 POINTS!!!!!!!!!
    8·2 answers
  • Write A Code In Python
    8·2 answers
  • Consider an individual who wishes to ensure that their information remains secure and confidential, possibly to secure their per
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!