1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
3 years ago
13

The duties of a database administrator include determining which people have access to what kinds of data in the database; these

are referred to as _______ rights.'
Computers and Technology
2 answers:
fomenos3 years ago
7 0

Answer:

Processing Rights.

Explanation:

The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as processing rights. There are other kind of rights too that will be decided by the Database Administrator. The database administrator grants access to different people depending on the usages of the database. There can be different types of data in the database. These are called the Processing rights.

dusya [7]3 years ago
5 0

Answer:

Processing

Explanation:

The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as <u>processing</u> rights.'

Processing describes as the process of a software program manipulating or extracting data from a stored file also it is the actions a processor performs when it receives information.

You might be interested in
What is the name for the individual sections of the ribbon in PowerPoint 20162
Julli [10]

Answer:

Tabs

Explanation:

The ribbon contains the tabs. The tabs contain the command groups which hold commands

IF THIS HELPS PLEASE MARK THIS ANSWER AS BRAINLIEST

6 0
3 years ago
Attackers will sometimes put malware on USB drives and leave them in parking lots
kherson [118]

Answer:

True

Explanation:

a lot of people use this as a way to keep things nice and safe, but sometimes thinks don’t go as planned. Don’t really know how else to answer this lol

6 0
1 year ago
How many generations of computer languages have there been since the middle of the 20th century?
evablogger [386]
4 generations hahahaha
3 0
2 years ago
Read 2 more answers
1.-  POR QUE LOS HUMANOS NOS INTERESAMOS EN ROBOTS CONASPECTO HUMANO?
oksian1 [2.3K]

Answer:

........

Explanation:

s

6 0
3 years ago
Stephen needs to insert a field into a building block that will contain variable data. Which keyboard shortcut can he use to tog
STatiana [176]

Answer:

Alt + F9

Explanation:

The Keyboard shortcut that Stephen can use use to toggle between data and the field codes is Alt + F9. This is in regards to Microsoft Word Fields for both Windows and Mac operating systems. Although ALT + F9 will toggle between these two but for all the fields within the document. If you want to toggle between a single or various fields it would be Shift + F9.

8 0
2 years ago
Other questions:
  • Dan is a Civil Engineer for a company that builds nuclear power plants throughout the world. Which best describes the places he
    14·2 answers
  • True / False<br> Registers are generally optimized for capacity instead of speed.
    14·1 answer
  • Which payment method typically charges the highest interest rates
    15·1 answer
  • If there is a mistake with one of your bank accounts, who should you contact to resolve the issue
    14·1 answer
  • How many bit does four gigabyte has
    8·2 answers
  • Visual culture is an area of academic study that deals with the totality of images and visual objects produced in ____________,
    6·1 answer
  • Write out the base sequence that is added directly after the primer. In order for Moodle to correctly grade this question, write
    11·1 answer
  • Can I get the code for the Edhesive Assignment 3 Chatbox in python? Thanks.
    15·1 answer
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!