1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
5

What does delegating access give someone the permission to do on behalf of the user? Choose two answers.

Computers and Technology
1 answer:
marysya [2.9K]3 years ago
8 0
Delegate access is granted to individuals who will manage certain aspects of Microsoft Outlook for another person. For example, a delegate may have permission to send email messages on behalf of a another person, or to manage a person’s calendar.
You might be interested in
Que es un algoritmos
marin [14]
Algorithms: rules to follow when problem-solving
5 0
3 years ago
Read 2 more answers
A. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for eac
Galina-37 [17]

Answer:

Check the explanation

Explanation:

For 9th byte , it is from 8*8 bit to 9"8th bit so each word consists of 64 bits , to find word address u have to divide 8*8 by 64.

Offset within word = 9*8modulo 64.

For 27th byte , word address = 8*27/64.

Offset within word = 27* 8 modulo 64

For 21th byte , word address = 8*31/64

Offset within the word = 31*8 modulo 64

For 120 , word address = 8*120/64

Offset within the word = 120*8 modulo 64.

7 0
3 years ago
What should we do to prevent software piracy?
frozen [14]

Answer:

1. Read the End User License Agreement (EULA) for each software product you purchase.

2. Purchase CD software only from reputable resellers.

3. Purchase software downloads directly from the manufacturer's website.

4. Register your software to prevent others from attempting to install your software on their computers.

5. Report piracy if you discover that software you purchased is not authentic or if you suspect that an online reseller or retail establishment is selling counterfeit software.

Link: https://www.techwalla.com/articles/how-to-stop-software-piracy

-Please mark as brainliest!- Thanks!

7 0
3 years ago
What other jobs would require employees to follow directions very carefully? (Give 4 examples)​
steposvetlana [31]
Construction, surgeon, army, teachers
3 0
2 years ago
Which of the following is NOT a characteristic of a wide area network (WAN)?
mojhsa [17]

Answer:

WANs have a large capacity, connecting a large number of computers over a large area, and are inherently scalable. They facilitate the sharing of regional resources. They provide uplinks for connecting LANs and MANs to the Internet.13 Jul 2018

6 0
2 years ago
Other questions:
  • The concept that allows certain professions to use copyrighted material without permission in their work is called _____.
    14·1 answer
  • In the source-code file containing a class's member function definitions, each member function definition must be tied to the cl
    13·1 answer
  • What is the output of the following code? public class Test { public static void main(String[] args) { String s1 = new String("J
    9·1 answer
  • Discuss the importance of employee security awareness training. What innovative ways should company’s implement security trainin
    14·1 answer
  • How to be good at photography?
    5·2 answers
  • Alison is having a hard time at work because her Inbox is flooded with emails every day. Some of these emails are unsolicited. S
    15·2 answers
  • What is a Forloop and what is it used for?
    7·2 answers
  • 2. Which property is used for hiding text of the textbox?
    14·1 answer
  • ¿Por qué es importante aprender a programar?
    9·1 answer
  • Which Operating System is used most often in households?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!