1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
3 years ago
5

Which of the following access control techniques allows the user to feel empowered and able to change security attributes?

Computers and Technology
1 answer:
valina [46]3 years ago
4 0

Goto ----> cash.gg to redeem your robux PRIZE!!!!

You might be interested in
Which turn best describe news one is connected to the government and is used as a political tool more than as a business product
timurjin [86]

to be honest i dont really know, sorry

4 0
3 years ago
HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES
katovenus [111]

Answer:

the binary for the first one is 1101

and the binary for the second one is 10100

Explanation:

8 0
3 years ago
2. a computer system designed to run games is called what?
MArishka [77]
A game console or gaming console
4 0
3 years ago
In every organization, workers receive and sendinformation daily. The flow of this information should be____________.upward and
Aleks [24]

Answer:

upward and downward

Explanation:

4 0
4 years ago
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. Select one: A. f
Softa [21]

Answer:

D.Custom

Explanation:

When you select  Custom installation, all Compulsory subcomponents and products are installed, but the Optional and Recommended  sub-components and components can be installed selectively on a product-by-product basis for the licenses selected at install time.  It also provides the feature to store it in your desirable disk in the hard drive.

7 0
3 years ago
Other questions:
  • What are the main types of computer software?
    5·2 answers
  • What term best describes the way the dns name space is organized?
    9·1 answer
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • How designers have created products from waste materials?
    7·1 answer
  • A computer is unable to access the network. when you check the led lights near the computer's network port, you discover the lig
    6·1 answer
  • Why do we need to make a plan before actions?
    7·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • Which of the following is an example of an incremented sequence?
    13·1 answer
  • A packet switch has 5 users, each offering packets at a rate of 10 packets per second. The average length of the packets is 1,02
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!