1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
10

Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t

o support automated services, and __________ are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. A. contingent IDs, system accounts B. system accounts, contingent IDs C. systems administrator accounts, contingent IDs D. control partners, system accounts
Computers and Technology
1 answer:
SpyIntel [72]3 years ago
7 0

Answer: B. system accounts, contingent IDs

Explanation:

Aside from human user types, there are non human user groups. Known as account types, (system accounts) are implemented by the system to support automated services, and contingent IDs are accounts that remain non human until individuals are assigned access and can use them to recover a system following a major outage. The system account is refered to as the user account which the operating system creates during installation.

Therefore, the correct option is B.

You might be interested in
Which network type uses a coaxial cable to receive its signal?.
olchik [2.2K]

Answer:

fiber optic

Explanation:

thanks youuuui

6 0
2 years ago
A virus that is embedded in the automatically executing scipts commonly found in word processors, spreadsheets, and database app
schepotkina [342]

Answer:

macro virus

Explanation:

Macro virus -

A micro virus is written in a micro language  , where the programming language is present in the application of software like the powerpoint , excel , microsoft office , word processor , etc.

These virus gets activated as soon as the file is opened and then the virus starts to spread all over the system .

The virus may be send via email , and as soon as the file is opened , the macro virus gets activated.

Hence, from the given information of the question,

The correct term is macro virus.

6 0
3 years ago
Read 2 more answers
Why don't I have friends?
Papessa [141]

Answer:

maybe you do not ask for them i will be your friend.

Explanation:

7 0
3 years ago
Read 2 more answers
The measure of error in keyboardist is called?​
Dimas [21]
Jjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
8 0
3 years ago
Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
abruzzese [7]
"Avoiding sarcasm" and "using appropriate language" make professional online communication more effective. Not all people immediately understand one's sarcasm especially someone you recently knew. They may misinterpret the message you're giving so better say something straightforward to make yourself clear. A place where people can easily gather, the internet can make people against you if you're displaying rude and foul comments. Failure to communicate will then follow. If you follow these two guidelines, you're going to be saved from all the troubles.
8 0
3 years ago
Other questions:
  • Translate each of these statements into logical expressions using predicates, quantifiers, and logical connectives. a) Something
    7·1 answer
  • How works GPS on boats?
    12·1 answer
  • For what kind of shot is a fisheye lens most appropriate?
    8·1 answer
  • design a relational database in EER for bike helmets and their reviews. a bike helmet has a name and color attributes. a bike co
    12·1 answer
  • Describe the job of an Architect.
    5·2 answers
  • You have a team member on a remote project who is not fluent in English and
    15·1 answer
  • What is the Cycle of Dependency?
    14·1 answer
  • Colorful bead bracelet in codehs
    14·1 answer
  • Which of the following best explains how algorithms that run on a computer can be used to solve problems?
    5·1 answer
  • 2.17.5 coders answers
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!