1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
10

Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,

and edit files. The employees at Manuel's company have different _____. access privileges antivirus software broadband firewalls
Computers and Technology
1 answer:
xxMikexx [17]3 years ago
7 0

Answer:

access privileges or privileges

Explanation:

The employees at Manuel's company have different _access privileges _ , based on the situation described.

The permissions to be able to perform some actions on some files are called privileges.  So, some employees have limited privileges (only able to open files, but not to edit them), and other have extended privileges (allowing them to open and edit files).  

Although possible, it's <u>unlikely that the employees have different different antivirus software, broadband connections or firewalls</u>.  And no indication in the situation described lead to think that.

It's unclear in your question if <u>"access privileges</u>" is <u>one or two answer choices</u>.  Usually, we talk about "access privileges" but it would also be just "privileges".   If these are two choices, go for "privileges", since all employees have access to the files,<u> so they don't have different access</u>.

You might be interested in
In testing you find that one of the tables in your database has multiple versions of one of the columns, and updating the inform
emmainna [20.7K]

Answer:

C. i think

Explanation:

C. is my answer........

5 0
3 years ago
What is a number system, and what is the total number of digits used in this system called?
DENIUS [597]
The number system is what is use globally as are way of counting the total number of digits is 9 because you can make any number with characters 1-9
7 0
3 years ago
Comments can be compared to a virtual _____.
Vladimir79 [104]
What's the rest of the question? Like A - B - C - D?
3 0
3 years ago
A product/process is referred to as a key Technology during which of the
Rufina [12.5K]

The correct answer is D. Mature Phase

Explanation:

Most products go through four different phases, this includes the emerging phase, the growing phase, the mature phase, and the decline phase. In each of these phases, the product has a different impact on the general market.

In the case of the mature phase, this occurs once the product is established in the market, which means the product is known by many people and is considered as key or necessary. For example, nowadays smartphones are in the mature phase because these are an important part of the market or are key. Moreover, this phase occurs after the product grows in the market, and before it declines. Thus, a product is a key technology during the mature phase.

5 0
2 years ago
Creating and modifying sets.
dsp73

Answer:

Explanation:

The following Python code asks the user for inputs for the name to remove and add in the set. It then tries to remove the given name from the list. If it fails it prints out to the user saying that the name does not exist. If it does exist then it removes the name and adds the new name. Finally it prints out the current list of names.

male_names = {'oliver', 'Declan', 'Henry'}

name_to_remove = input("Enter name to remove: ")

name_to_add = input("Enter name to add: ")

try:

   male_names.remove(name_to_remove)

   male_names.add(name_to_add)

except:

   print("Name that you are trying to remove does not exist")

print("List of Names: ")

print(male_names)

4 0
2 years ago
Other questions:
  • If you want to emphasize the Greek root of a word in a document, which tool in Microsoft® Word could you use?
    6·2 answers
  • PLEASE HELP
    6·1 answer
  • With modeling and simulation, we model the system and then test the ______________ to gather test predictions.
    7·1 answer
  • Which of the following hacker attacks against wireless networks are virtually undetectable?
    12·1 answer
  • Write an HTML document which contains two text fields, a button, and a div. The first text field should be labeled “Temperature”
    10·1 answer
  • Given the following method static void nPrint(String message, int n) { while (n &gt; 0) { System.out.print(message); n--; } } Wh
    12·1 answer
  • Miguel owns a tile business. He has two employees who work in a small office. One answers phones and schedules appointments. Ano
    11·2 answers
  • Which of these is unused normal, unvisited link ??
    12·1 answer
  • What is the best definition of a network?
    9·2 answers
  • The function's only behavior should be to return the sum of array userVals' elements. What common error does the function make?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!