1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
7

What is the approximate boiling point

Computers and Technology
1 answer:
lesantik [10]3 years ago
4 0
For water the approximate boiling point is 100 degrees Celsius.
<span />
You might be interested in
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Kobotan [32]

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

  1. read directories
  2. write to directories
  3. make changes to and delete files, folder and subfolders.
  4. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

  • install  and remove software applications
  • update and or upgrade the computers operating system
  • access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

  1. Oversee, audit, and completely control all other privileges.
  2. forestall cyber attacks on the system from internal users or insiders.
  3. Establish and provide evidence for compliance with regulatory codes

Cheers

8 0
3 years ago
Which browser do most web users use and why do you think that it is that way? Make sure you search online for statistics to conf
oksian1 [2.3K]

Answer:

2b2t

Explanation:

2b2t

4 0
4 years ago
Why am I asked the 4th time to change my email &amp; password?????
dolphi86 [110]
Confirme your email.
3 0
3 years ago
Read 2 more answers
While you are entering a formula in a cell, the cell references and arithmetic operators appear in the _____.
Fofino [41]

Answer:

formula bar

Explanation:

According to my research on Microsoft Excel, I can say that based on the information provided within the question in this situation the cell references and arithmetic operators appear at the top in the section known as the formula bar. This is a toolbar at the top of the Excel software that allows you to add a formula in to cells or charts and is labeled with function symbol (fx).

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

4 0
4 years ago
What is the basic computer application?​
Lena [83]

Answer:

a computer code

Explanation:

fhfdgkykd

8 0
3 years ago
Other questions:
  • "The OSI model has seven layers and the DoD has four. At which layer does SMTP works in both models"?
    15·1 answer
  • What are the two components that make up the chipset?
    15·1 answer
  • Which of the following is a true statement about psychological tests administered by computers? computers make standardization e
    9·1 answer
  • List the seven basic internal components found in a computer tower
    7·1 answer
  • Define a pointer variable named daco that can be used for objects of the class Banana.
    14·2 answers
  • Which tag denotes the end of an element in HTML?
    8·1 answer
  • What is the difference between cyberbullying and bullying.
    5·2 answers
  • What is the difference between DWT and CWT?
    11·1 answer
  • Write a function expand_string(a, pre, suf, num) that takes the parameters a,pre,sub and num appends the prefix pre, and suffux
    13·1 answer
  • _________ analysis is a data mining application that discovers co-occurrence relationships among activities performed by specifi
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!