1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
12

Which of the following is true of functions?

Computers and Technology
2 answers:
Stella [2.4K]3 years ago
7 0
The correct answer is C
choli [55]3 years ago
6 0

Answer:

my answer is also c

Explanation:

please mark as brain list

You might be interested in
Which of the following is true about ISO___________.
Svetach [21]

Answer:

The answer is "Option d".

Explanation:

In the given question in option b and option c, there is some typing mistake, but all the options are correct.

ISO is an organization, that is based on Geneva, which is a member of Switzerland. It provides one of the major guidelines for developing entities, that provides technical suggestions on frameworks for data communication.

  • It is used to optimize products with businesses across ranges.
  • The primary aim was to facilitate trade, but in several ways, it focus on enhancing procedures, safety, and quality.
3 0
3 years ago
Which of the following statements is TRUE of business intelligence (BI) systems? Business intelligence systems are primarily use
Scrat [10]

Answer:

D) Business intelligence systems analyze an organization's past performance to make predictions is the correct answer.

Explanation:

  • Business intelligence systems represent systems that help the business in the decision making and strategic making method.
  • BI provides is applications that help in the analysis, collection, and integration of business information.
  • Business intelligence systems help the organization to analyze the business trends and to find the problems that occur in the business that is required to be examined.

5 0
4 years ago
Bailey wants to add file protection to a document she has created. She wants to restrict users from changing the content she has
jonny [76]
Id say (B) File, Permissions, Restrict Editing, Editing Restrictions, Comments, Start Enforcement, then enter her password

However much you may want your reviewers to make comments and suggest changes in a document, there may be times when you want to restrict them from changing the content you have created. To restrict formatting in a document, you can click restrict formatting in the protect section of the review tab and follow the procedure in the answer above.


8 0
4 years ago
Read 2 more answers
Explain which implementation of the protection matrix is more suitable for the following operations___________.
Mars2501 [29]

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

5 0
4 years ago
Select the correct answer.
nevsk [136]
The answer is B or D

3 0
3 years ago
Other questions:
  • #TODO: Define a data structure to keep track of which links are part of / not part of the spanning tree.
    14·1 answer
  • Yan wants to attract customers specifically searching on Google for Time-B-Gone, his company's unique office-support product. Hi
    12·1 answer
  • How many characters does the "short text" have?
    9·1 answer
  • What does the image depict:
    14·1 answer
  • 1) ( IBADE - 2020)A legislação que regula o uso da Internet no Brasil por meio da previsão de princípios, garantias, direitos e
    9·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • In three to five sentences, describe how you would move a slide from the end of the presentation to the second slide.
    7·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • 010101010101011101011
    7·1 answer
  • Which platforms are used for mobile apps? Select 4 options.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!