1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
34kurt
3 years ago
5

What should you call a person who has permission to bypass the security of a computer to access it

Computers and Technology
1 answer:
Sav [38]3 years ago
7 0

Answer:

Administrator

Explanation:

Such permission to bypass the security of a computer to access it is being given to only the administrator. No other user is allowed to have such privileges. And there is only one administrator in a team, and this is the standard as only then the security of a network of computers, and a particular computer can be ensured. And the correct answer to this question is certainly the Administrator.

You might be interested in
Why do Selection Sort and Insertion Sort’s outer loops run 11 iterations if there are 12 elements in the array?
laiz [17]

Answer:

The final case in selection sort is trivially sorted.

The final iteration in insertion sort is not needed.

Explanation:

For selection sort, you make sub arrays and find the smallest element placing it in the front and repeat until sorted.  This guarantees the final element will already be the greatest element, thus it is trivially sorted.

For Insertion sort, you use the initial element and compare it to the previous element and swap if the current is larger than the previous.  Using this sort, you will always perform n-1 comparisons where n is the total amount of elements in the array.  Thus, there are only 11 iterations for a 12 element array.

Cheers.

3 0
3 years ago
Which phrase best describes a scenario in Excel 2016?
alexira [117]

Answer:

<h2>YEET B </h2>

Explanation:

Sorry

Its B: a type of what-if analysis that allows a user to define multiple variables for multiple functions or formulas

(i think)

3 0
3 years ago
Read 2 more answers
Which of the following is LEAST needed when programming a computer?
PtichkaEL [24]
Computer language is essential
6 0
3 years ago
Im lonnnelllly........................who want to date
blsea [12.9K]
Hey just a word of advice I hope you find someone lovely and someone who’ll enjoy you for you. Don’t look for people on apps like this I made many mistakes and it’s not smart. Have a good day. I get the feeling of loneliness and it sucks
8 0
2 years ago
A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and proc
kow [346]

Answer:

security audit

Explanation:

7 0
3 years ago
Other questions:
  • In a case where electrical current leakage from the circuit occurs,
    7·2 answers
  • Betty took her friends bowling. they rented 4 lane. 10 people need rent shoes and
    12·1 answer
  • Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules
    14·1 answer
  • Is it safe to take apart a computer monitor?
    13·1 answer
  • Monitors display images by using a grid made up of millions of tiny dots, called ________.
    13·1 answer
  • Mac or PC (need opinions please)<br><br> Why did you choose Mac/PC?
    10·2 answers
  • Consider the classes below: public class TestA { public static void main(String[] args) { ​ int x = 2; ​ int y = 20 ​ int counte
    6·1 answer
  • I need help I have questions I need answers in coding html,css,js and python.Fast
    7·1 answer
  • Help plz (will give brainliest)
    9·1 answer
  • Which version of java should i use?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!