1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
5

Which permission option lets a user view files but not change them?.

Computers and Technology
1 answer:
BARSIC [14]3 years ago
5 0

The read permission allows the user view files but not change them.

<h3>File permission</h3>

Assigning the correct permissions to the files and directories helps prevent data theft because it specify who and what can<em> read, write, modify, and access content</em>. Each file and directory will have three permission categories, these are:

  • Read, write and execute.

The read permission allows the user view files but not change them.

Find out more on file permission at: brainly.com/question/6990309

You might be interested in
Which of the following items is an example of a user application? *
aleksandr82 [10.1K]

Answer:

I would probably say all of the above!

Explanation:

4 0
3 years ago
Read 2 more answers
Describe FIVE significant advantages of web-based applications for an organisation.
masya89 [10]

Answer

There are a lot of advantages of web based applications.

Explanation:

Below are the advantages:

  1. Web based applications can be accessed from device that is connected to the device.
  2. No physical software required to download, install, update or manage which saves a lot of administration work for large companies.
  3. Web based software is compatible with any device or platform. The software is delivered through a browser of the users' choice.
  4. Mobile device applications allow for access to the software when out of the office.
  5. Direct access to latest information for Employees where every they are located.

Apart from these, there are lot more benefits, like quick and easy updates, centralized data where data is secure and easy to backup.  We can reach anybody, anywhere in the world.

Business costs are drastically reduced by spending less time talking to customers over the phone.

Online training can be finished at user's own time and risk.

It's available 24 hours a day, 7 days a week

The software is always up-to-date

8 0
3 years ago
When you identify the data elements in a new database, you typically subdivide data elements into?
DochEvi [55]
When you identify the data elements in a new database, you typically subdivide data elements into <span>the smallest practical component. 

Thank you for posting your question here at brainly. I hope the answer will help you. Feel free to ask more questions.
</span>
4 0
4 years ago
In Excel 2016 a range of cells beginning with cell C5 and going to cell E9 is defined as
Ksivusya [100]
None of the above.
Cell range should be marked as, C5:E9
5 0
3 years ago
Name five services available at banks.
cluponka [151]
Here are some services available at a bank:

Retirement Accounts
Safe Deposit Boxes
Credit Cards
Cash Deposting/Withdrawal 
Financial Management
4 0
4 years ago
Other questions:
  • what would happen if a large number of computer users are attempting to access a web site at the same time that you are
    15·2 answers
  • One of the earliest uses of an electronic digital computer involved ________.
    8·1 answer
  • You are working as a Solutions Architect for a technology company which is in the process of migrating their applications to AWS
    15·1 answer
  • 2. Which company was first able to send a text? (Verizon, AT&amp;T, Cricket???)
    12·1 answer
  • In risk management what does risk evaluation involved
    14·1 answer
  • When you see a/an _______ pointer, this means you can drag the row or column border to change height or width.
    12·2 answers
  • Dad Mystery
    9·2 answers
  • What is the importance of using Onedrive in Windows 10 and how knowledge of it will have an impact in today's workplace?
    7·2 answers
  • What is phishing?
    14·1 answer
  • What is the best description of an unbound control?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!