1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hram777 [196]
3 years ago
5

What does delegating access give someone the permission to do on behalf of the user? Choose two answers.

Computers and Technology
1 answer:
marysya [2.9K]3 years ago
8 0
Delegate access is granted to individuals who will manage certain aspects of Microsoft Outlook for another person. For example, a delegate may have permission to send email messages on behalf of a another person, or to manage a person’s calendar.
You might be interested in
Which command would you use to swap the words hither and yon on any line with any number of words between them? (You need not wo
REY [17]

Answer:

The command i will use in carrying out such function is

Explanation;

Kindly check the attached file for the command as it can not be written fully in the answer box.

3 0
3 years ago
Meta is a penetration testing engineer assigned to pen test the security firm's network. So far, she cannot tunnel through the n
Arte-miy333 [17]

In order to gain repeated and long-term access to the network system in the future, Meta should perform privilege escalation.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, in order to identify, test and check for exploitable vulnerabilities in the following:

  • Web software
  • Host device
  • Network

Hence, a pen test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments of the system.

In Cybersecurity, privilege escalation can be defined as a process that involves the exploitation of a design flaw, software bug or configuration setting in a network, so as to gain repeated and long-term (elevated) access to the network or software application in the future. Thus, Meta should perform privilege escalation to enable her gain repeated and long-term access to the network system in the future.

Read more: brainly.com/question/24112967

7 0
3 years ago
Question 1 of 20 :
tekilochka [14]
With style comes difference. Style is a personal thing that will change among individuals, so B
7 0
4 years ago
Read 2 more answers
Assume that nextWord is a String variable that has been given a String value consisting entirely of letters. Write some Java cod
wel

Answer:

The code example is given below with explanation in c++ language.

Explanation:

Comments will explain what's going on in the code. Below code is already compiled and tested.

#include <time.h>

#include <iostream>

#include <sstream>

using namespace std;

int main(void)

{

//defining start and end time variable

// which will be used to break the infinte loop

   time_t endwait;

   time_t start = time(NULL);

   time_t seconds = 3; // end loop after this time has elapsed

cout<<"Input your number :";

long userNum;

cin>> userNum;

// initializing end time by adding seconds with start time

   endwait = start + seconds;

   // defining outputString which will concatenate all the  

   // divisible numbers in loop

string outputString="";

// bool isCompleted will use to check whether our  

// loop breaks successfully or time is expired.

bool isCompleted=true;

// iterate loop until it comes to 1. as in loop

// the program already displayed the 1 value.

   while (userNum>1)

   {  

  // checking start and end time comparison to  

  // break the infinite loop after some seconds

    if(start >= endwait){

     cout<< "Program end never reached.";

     isCompleted=false;

     break;

 }

 

    userNum=userNum/2;

   // defining stringstream to convert from long to string

    stringstream longToString;

    longToString<<userNum;

  // concatenating all the values

    outputString = outputString + longToString.str()+" ";

   // re initializing the start time with current time.

       start = time(NULL);

   }

   

  // check if while loop breaks successfully then print the

   // series of numbers here.

   if(isCompleted) {

    cout << outputString;

}

   return 0;

}

8 0
3 years ago
Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
Katarina [22]

Answer:

The code is as follows:

for(int j = 0; j < newScores.length-1; j++){  

               newScores[j] = oldScores[j+1];  

           }  

           newScores[oldScores.length-1] = oldScores[0];

Explanation:

This loop iterates through the elements of oldScores

for(int j = 0; j < newScores.length-1; j++){  

This enters the elements of oldScores to newScores starting from the element at index 1

               newScores[j] = oldScores[j+1];  

           }  

This moves the first element of index 0 to the last index of newScores

           newScores[oldScores.length-1] = oldScores[0];

7 0
3 years ago
Other questions:
  • You have a network of 300 users. You are finding that you must frequently restore files from backup that users have accidentally
    13·1 answer
  • A security policy is a
    11·1 answer
  • What are the advantages and disadvantages of malware maintenance?
    12·1 answer
  • The goal expressed in this definition states that data visualization is about ________________ .
    11·2 answers
  • How do you copy and paste plz let me know
    14·2 answers
  • Is it important for a writer to include voice and point of view in writing because...<br> Plz help
    10·1 answer
  • Create a class named Lease with fields that hold an apartment tenant’s name, apartment number, monthly rent amount, and term of
    13·1 answer
  • p3_unzip :: [(a,b)] -&gt; ([a], [b]) Write a function that takes a list of two-tuples and returns a tuple of two lists -- the fi
    9·1 answer
  • What does it mean to be a good cyber citizen?
    8·2 answers
  • Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Referenc
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!