1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
6

If you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and doc

uments will be what?
Computers and Technology
2 answers:
hodyreva [135]3 years ago
5 0
<span>If I remember it correct, if you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and documents will be hidden. Or it depends on OS. But in most ways its hidden or masked.</span>
8_murik_8 [283]3 years ago
4 0

ANSWER

If you have access to an ssn, but do not have permission to view certain folders or documents in that ssn, those folders and documents will be

Be hidden. Or it depends on OS. But in most ways its hidden or masked.

Explanation

This is because the visibility and access for any type of data is determined by the interaction of the security controls, based on the key principles:

SSN is any government system that provides monetary assistance to people with enough or no income. For example in US it is it is a program for all retired and disabled people.



You might be interested in
What is a router?
uranmaximum [27]

Answer:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

I believe the answer would be B). A device that sends data to the receiving device

Explanation:

3 0
4 years ago
Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
CaHeK987 [17]

Answer:

The answer is below

Explanation:

Given that the three-point lighting techniques require one to have three sources of lights in a scene. These three lights are known as Back light, key light, and fill light.

The Back light is expected to be placed at the back of the subject. In this scenario, there is a lit fireplace behind the subject, this is serving as the backlight already.

The glow from a window on the subject's left is serving as a Fill light which is not going to be bright as that of the Key lights.

Then Laura would now only need the Key Light. This will be the main light and will be the brightest. Laura will have to place this Key Light on the right side of the subject on the scene, directly at the opposite of the glowing light serving as the Fill light.

6 0
3 years ago
Helppppppppppppppppppp
ddd [48]
Helpppppppppppppppppppp
3 0
4 years ago
Heeeeelp plz ASAP <br> only for smart ppl, pt.2
Akimi4 [234]

Answer: AB E G

Explanation:

4 0
3 years ago
Read 2 more answers
Which of the following is NOT an AWS Cloud Platform Service?
STALIN [3.7K]

Answer:

Service analytics networking

7 0
3 years ago
Other questions:
  • To differentiate the absolute pathnames to files that are located on different drives, html requires you to include the drive le
    8·1 answer
  • Please Help!
    14·2 answers
  • Given the following MIPS Code Fragment:
    14·1 answer
  • Which one of these tasks is part of the pre-production phase of game development?
    5·2 answers
  • A broker statement is an example of an ___ record
    12·2 answers
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • ¿cuáles son los usos que se le pueden dar a una bicicleta?
    6·1 answer
  • Convert pounds to ounces.
    11·2 answers
  • Dragging a mouse over text is called
    9·1 answer
  • ________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulner
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!