Answer:
The answer to this question is "Quickbooks administrator.
Explanation:
The answer is the Quick books administrator because Quick books is a software that is used for accounting developed. It helps us to keep in mind all the expenses in the business and things like invoicing, reporting.In this software, we can add new users and give them permission. If we want to allow Users to access the software.
In the Quickbooks administrator, we can add the user with limited access also. So the correct answer is Quickbooks administrator.
I think it is 3 no? Maybe I dunno but I am confident
The answer is Intumescent. I am pretty sure this is right.
The file that contains full and incremental back-up information for use with the dump/restore utility is <u>/etc/dumpdates.</u>
<u></u>
<h3>What is dump/restore utility ?</h3>
Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape or other storage medium. Subsequent incremental backups can then be layered on top of the full backup.
The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Single files and directory subtrees may also be restored from full or partial backups in interactive mode.
Learn more about incremental backups
brainly.com/question/5849057
#SPJ4
Answer:
A downloaded executable file may contain harmful software know as malware.
Further details:
Malwares:
Malware (a portmanteau for pernicious programming) is any product purposefully intended to make harm a PC, server, customer, or PC network. Malware does the harm after it is embedded or brought somehow or another into an objective's PC and can appear as legitimately executable code, contents, supposed "dynamic substance" (Microsoft Windows), and different types of data. Some sorts of malware are to a great extent alluded to in the media as PC infections, worms, Trojan steeds, ransomware, spyware, adware, and scareware, among different terms. Malware has a malignant expectation, acting against the enthusiasm of the PC client—thus does exclude programming that causes accidental damage because of some lack, which is regularly portrayed as a product bug.
Uses:
Malware is once in a while utilized comprehensively against government or corporate sites to assemble monitored information, or to upset their activity as a rule. However, malware can be utilized against people to pick up data, for example, individual recognizable proof numbers or subtleties, bank or charge card numbers, and passwords.
Answer details:
Subject: Computer and technology
Level: College
Keywords:
• Harmful software
• Malware
• Malware software
• Uses of malware
• Purpose of malware
Learn more to evaluate:
brainly.com/question/4997492
brainly.com/question/4010464
brainly.com/question/1754173