1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nezavi [6.7K]
2 years ago
7

Advanced Electronics has employees who use a company website to share work. By posting on the website, employees are

Computers and Technology
1 answer:
Anna11 [10]2 years ago
7 0

Answer:

B - On the Save & Send tab, select Save to SharePoint, which will allow access to all registered users.

Explanation:

When you send the document to SharePoint, within the SharePoint app you can enable <em>track changes </em>which can be used to track your changes.

You might be interested in
Thanks for help evreybody
ladessa [460]

Answer:

np

Explanation:

7 0
2 years ago
Read 2 more answers
It's not necessary in a field to have .
ozzi

it's not necessary in a field to have .

6 0
2 years ago
What do Business Analysis workers do? Check all that apply.
nlexa [21]

Answer: Recommend solutions to problems & Analyze information and problems.

A business analyst is a person that takes a look at a company's current system and tries to understand how the company works. These analyst seek to find out how the company will be in the future. Their main job is actually to oversee the different projects done by the company and analyze the different projects to determine if it would benefit the company or not.

Since business analysts thrive to understand their company's system, they are often the people who find information and problems that the company may have in the present or in the near future. These workers also recommend solution to problems that the company may have. The analysts are also often working with the IT departments of companies to help with the moving forward of the company's current system.

7 0
3 years ago
Read 2 more answers
What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes
lisabon 2012 [21]

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

8 0
2 years ago
You are running a mission-critical database application in Oracle Cloud Infrastructure (OCI). You take regular backups of your D
kap26 [50]

Answer:

1. Make sure that the database is not active and running while the backup is in progress.

2. Restart the dcsagent program if it has a status of stop or waiting.

Explanation:

Oracle Cloud Infrastructure (OCI) includes Platform as a Service (PaaS), Data as a Service (DaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS), which are mainly used for developing, deploying, integration and extending software applications in the cloud. These Oracle Cloud Infrastructure (OCI) includes cloud computing services such as network, storage, server etc.

As a software engineer running a mission-critical database application in Oracle Cloud Infrastructure (OCI). If you notice a failed database backup status in the console, then you should take the following steps to determine the cause of the backup failure;

- Make sure that the database is not active and running while the backup is in progress.

- Restart the dcsagent program if it has a status of stop or waiting.

3 0
2 years ago
Other questions:
  • Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
    6·2 answers
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission met
    6·1 answer
  • Name that red flag asigment
    15·2 answers
  • Four-pair UTP uses ________ connectors a)snap b)ST or SC c)None of these
    12·1 answer
  • In a graphical user interface, which is a small symbol on the screen whose location and shape changes as a user moves a pointing
    10·1 answer
  • A(n) __________ port, also known as a monitoring port, is a specially configured connection on a network device that is capable
    13·1 answer
  • Julie is trying to decide weather or not to add a color scheme to her presentation and she asks you for your advice u should adv
    9·1 answer
  • They are correct? thank you!
    6·2 answers
  • 8.5 Edhesive Code Practice
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!