1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis-greek [22]
3 years ago
12

In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of edi

ting are allowed.
Computers and Technology
1 answer:
KiRa [710]3 years ago
3 0

Answer: drafting

Explanation:

You might be interested in
What is the difference between a try block and a try statement? Group of answer choices There is no difference; the terms can be
telo118 [61]

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not language.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and it is uses 0's and 1's. Coders write the instructions using a programming language.

8 0
3 years ago
What is the significance of both RAID and IP technologies as precursors to the SAN environment?
Dominik [7]

Explanation:SAN(Storage area network) technology is the network technology that is used for the accessing of the block level network towards the storage units. It is made up of the storage components, switches etc.

RAID(Redundant Array of Independent Disks) and IP(internet protocol) is used as the precursor because they work better than the SAN. They have the ability to solve the issue that occur in the SAN technology like complexity,and other faulty issues.They maintain the fault tolerance quality and maintaining the network.

3 0
4 years ago
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
bonufazy [111]

Answer:

Option (B) is the correct answer of this question.

Explanation:

Packet analyzer is a software application or set of infrastructure capable of unencrypted and recording communication that travels through a virtual system of a computer system.A packet analyzer used to detect network activity is recognized as a broadband monitoring system.

A packet analyzer is a code application that is used for monitoring, intercepting, and recording http requests with the help of a virtual interface.

Other options are incorrect because they are not related to the given scenario.

8 0
4 years ago
IaaS providers do not manage the ____
murzikaleks [220]

Answer:

1. C

2. A

Explanation:

IaaS which is also known as Infrastructure as a service is an outsourced cloud computing infrastructure service that offers resources such as storage, server, and network connections. Examples of IaaS providers include organizations like Microsoft’s Azure and Amazon Web Service which is also commonly known as AWS. Azure, AWS are among a list of IaaS providers that offer support through monitoring and management of remote datacenters. Instead of physically purchasing hardware and servers, businesses can opt to host all their services and operations on the cloud.

The PaaS falls between IaaS and SaaS. Most developers and programmers working for big cooperates rely on PaaS to help them code and provide cloud components to applications and software. PaaS makes all the phases of program development and deployment easier and cheap. It can manage what IaaS supports like storage, virtualization, servers, and network connections. In addition, PaaS providers can manage operating systems and databases as well. Note that it is the work of the developers to manage the applications and not the PaaS providers

6 0
4 years ago
During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.
Sedbober [7]

Answer:

developed and tested.

Explanation:

5 0
2 years ago
Other questions:
  • A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the
    11·1 answer
  • Which architect designed the Guggenheim Museum in New York?
    6·2 answers
  • When can you message on brainly? My account says I have to answer more questions first.
    6·1 answer
  • Here's another question!<br><br> What is some iterative programming structure uses?
    13·1 answer
  • What would you have to know about the pivot columns in an augmented matrix in order to know that the linear system is consistent
    13·1 answer
  • What are the characteristics of calendar sharing options in Outlook 2016? Check all that apply.
    13·2 answers
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
  • 20 points!!
    7·1 answer
  • Which game would be classified as an advergame?
    6·2 answers
  • In MS Word we can merga cells true or false​
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!