1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allisa [31]
3 years ago
8

How do I contact an admin

Computers and Technology
1 answer:
Over [174]3 years ago
8 0

Answer:

Contact Brainly Support and Administration at the following link:

brainly.com/app/contact

You might be interested in
Overload the + operator as indicated. Sample output for the given program:
melisa1 [442]

Answer:

FamilyVacation FamilyVacation::operator+(int moreDays) {

FamilyVacation copy = *this;

copy.numDays += moreDays;

return copy;

}

Explanation:

You create a copy (which is simple because the class contains no pointers), then you modify the copy and return it.

7 0
3 years ago
Name 5 different vegetables that are going to waste due to coronavirus issues
Aleks04 [339]

Answer:

u can search that on google

Explanation:

7 0
3 years ago
1.
Andrej [43]
B, b, b, and then c. I'm not sure, though, so you might want to check again.
8 0
3 years ago
Read 2 more answers
Write a paragraph explaining why you think its important to use ethics in computers
hammer [34]

Answer:

cause its gay

Explanation:

6 0
3 years ago
You want to ensure that users are granted only the permissions needed to access data required to perform their jobs. What should
HACTEHA [7]

Answer:

The answer to this question is "Principle of need to know".

Explanation:

In the given statement some information is missing that is the option of the question that can be described as follows:

A. Principle of least privilege

B. Principle of need to know

C. Principle of limited rights

D. Principle of permissions

The need to know principle refers to seeks to prevent "browsing" sensitive data by restricting access to as few people as possible. It is also known as a process, in which the user can set the restriction to access data to other users, and other choices are not correct that can be described as follows:

  • In option A, It is used to access a critical system.
  • In option B, It is used to provides rights to access data.
  • In option D, It is also known as an administrator, that allows users to access data.
7 0
4 years ago
Other questions:
  • What does the octal number 362 represent in the decimal system?
    13·1 answer
  • Occurs when the same data are stored in multiple places
    11·1 answer
  • Nathan notices his computer system is slowing down when he tries to copy documents to it. He also gets a prompt that warns him t
    15·1 answer
  • The physical components of information technology, which can include the computer itself plus peripherals such as storage device
    15·1 answer
  • Why might a government entity choose to offer some information and services online as in e-government
    8·2 answers
  • If you have a charger that’s not from Apple, then could that damaged your iPhone or not?
    5·1 answer
  • Some people argue that developers should not be involved in testing their own code but all testing should be the responsibility
    9·1 answer
  • What is an end user license (EULA) agreement an example of?
    9·2 answers
  • On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
    10·1 answer
  • Size of a request header field exceeds server limit.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!