1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
2 years ago
15

Have all of my coins because i will delete acount there will be part 2, 3 , 4 ,5,6,7,8

Computers and Technology
2 answers:
mars1129 [50]2 years ago
4 0

Answer:

hi i thought you were deleating your acount but thanks for the points i guess

Explanation:

kirza4 [7]2 years ago
3 0
Thank you very much your are awesome
You might be interested in
By arranging users into security groups, it is possible to set permissions at a group-level, avoiding the unwieldy alternative o
Anni [7]

Answer:

The department by department is arranging users into security groups to set permission at a group-level.

Explanation:

Team by team is just formed group method but the team been set will work on based on the project. Once the project is getting over then the team group assigned permission has to be disabled or deleted.

 

Department by department is just good methods where each department will have a list of users and easy to assign the group.

user-by-user. is just assigning the rights of each individual user. But if the user has multiple departments login it will be good advice.

organization-by-organization. It is just assigning rights to complete users list in the organization.  

6 0
3 years ago
This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to hel
igomit [66]

Answer:

Business intelligence.

Explanation:

That concept that applies to that of the selection, incorporation, evaluation, and analysis of companies or business information systems, software, and behaviors. It is direct at promoting good business decision-making.

This is a wide concept of software and technology to capture, store, analyze, and to provide information access to support users make far better strategic decisions.

6 0
2 years ago
RAM memory is considered volatile because this memory is erased when the computer is turned off
Goshia [24]
False because ram is constantly always running
5 0
2 years ago
The computer-like model used to describe the way humans encode, store, and retrieve information is the ________ model.
FinnZ [79.3K]

Answer:

Information processing model

<em>Hope it helps!</em>

3 0
1 year ago
The operation of early electronic computing devices required:
Harrizon [31]

Answer:

c

Explanation:

5 0
2 years ago
Other questions:
  • How can investors receive compounding returns
    13·1 answer
  • Assume that the following variables have been properly declared and initialized.
    12·1 answer
  • Which query will give the following result when it it applied on table 1????!!!!!
    10·1 answer
  • What does the Chart Elements option allow you to change? A. Values B. Color C. Style D. Axis titles
    13·1 answer
  • Which is true about TCP and UDP? Choose two answers.
    15·1 answer
  • What should you rely on to determine when to change your oil? a. Oil color b. 6,000 miles since the last oil change c. Owners ma
    7·1 answer
  • What is the awnser ?
    11·1 answer
  • PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MYQUESTION WHICH IS DUE TODAY!!!!
    14·1 answer
  • Which kind of a person will you be if you prove to be accountable for your actions?
    14·1 answer
  • Many people are scared of the rise of Artificial Intelligence (AI). Do you think computers that are controlled by an AI are some
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!