1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivanshal [37]
3 years ago
15

mary has access to certain resources because she is in the Research division of her company. She has access to other resources b

ecause she is a manager. Which access control system is probably in use in her company?
Computers and Technology
1 answer:
Gemiola [76]3 years ago
3 0

Answer:

KeyCards

Explanation:

Keycards are able to be stacked with alot of roles

im sorry if im wrong

You might be interested in
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfigura
maks197457 [2]

Answer:

Any of the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

Explanation:

Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.

Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

3 0
3 years ago
A credit card company receives numerous phone calls throughout the day from customers reporting fraud and billing disputes. Most
Veronika [31]

Answer:

3.59 minutes

Explanation:

We solve this question using z score formula

Using Excel

Z-SCORE= (DataPoint-AVERAGE(DataSet))/STDEV(DataSet)

IN EXCEL,

AVERAGE, an excel function that calculates the Average of data set

STDEV.S: calculates the standard deviation while treating the data as a ‘sample’ of a population.

STDEV.P: This function calculates the standard deviation while treating the data as the entire population.

Z score formula = x - μ/σ

x = ?? μ = 2.5 minutes σ = 0.5 minutes

We are asked : If 1.5% of the callers are put on hold for longer than x minutes, what is the value of x?

Hence, Longer than = Greater than =

100 - 1.5%

= 100 - 0.015

= 0.985 ( 98.5%)

Using Excel we calculate = z score for 98.5 percentile

= 2.1701

Z score = x - μ/σ

2.1701 = x - 2.5/0.5

2.1701 × 0.5 = x - 2.5

1.08505 = x - 2.5

x = 1.08505 + 2.5

x = 3.58505

Approximately to 2 decimal places = 3.59 minutes

Therefore, 1.5% of the callers are put on hold for longer than 3.59 minutes.

8 0
3 years ago
What are the elements in a publication called​
Illusion [34]

Answer:

There are several important elements in a magazine layout, such as headline, image, image caption, running head, byline, subhead, body copy, etc. Here, we look into the ten most crucial elements of a magazine layout.

6 0
3 years ago
Read 2 more answers
Which of the following improved networks by increasing speed or by improving the ability for businesses to use networks? Check a
user100 [1]

Answer: ethernet, isdn, gigabit ethernet

Explanation:

7 0
3 years ago
Read 2 more answers
If you set up a network in your home to share your internet connection with several laptops, what type of network have you creat
Alex_Xolod [135]

Answer:

P2P

Explanation:

Originally stood for "Peer to Peer." The "colleagues" are computers in a P2P network that are linked via the Web to each other. By having a central server, files can be exchanged directly among devices on the network. In other words, any machine on a Distributed system becomes both a file server and a client.

3 0
3 years ago
Other questions:
  • What additional information could you add to a sketch to provide other team members with a more accurate design drawing?
    9·1 answer
  • Which studio produced the film the jazz singer the first of many talkies
    11·1 answer
  • Which part holds the "brains" of the computer?
    5·1 answer
  • If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha
    15·1 answer
  • Four kinds of information a writer must document are: _____. A) common knowledge information B) direct quotation summary of a di
    11·1 answer
  • Why do I get everything in English?​
    5·2 answers
  • In what kind of attack can attackers make use of hundreds of thousands of computers under their control in an attack against a s
    7·2 answers
  • The EDI ____________layer describes the business application that i
    9·1 answer
  • What was the strategy the company adopted for ERP implementation?
    12·1 answer
  • what is a simulation? a) simulation is the process of creating dashboards in excel. b) simulation is the process of complex form
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!