1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
15

What type of account gives you permission to perform all operations on a computer, such as creating a child account?

Computers and Technology
1 answer:
QveST [7]3 years ago
7 0

Answer:

An administrator account

Explanation:

An administrator account has full privileges on any operation, including operations that affect other accounts.

You might be interested in
A program execution is called ​
Rama09 [41]

a program execution is called a process

<h3>Explanation </h3>

In the process, they process the data and also execute the data.

What happen in process?

  • First the data came from input, then go to the memory. The process take the data from the memory and process it and divide it, if there's arithmetic data thingy it will go to ALU and the rest to CU. After the data finish being proceed, the data will be sent to CU and executed there, then send back to the memory and go to the output to be shown.

#Sorry my grammar sucks

#Moderators please don't be mean, dont delete my answers just to get approval from your senior or just to get the biggest moderation daily rank.

8 0
3 years ago
In what ways can information be slanted in a news report? List at least five ways.
Sedbober [7]

Answer:

author, journalist and speaker/media trainer this is all I know so

author, journalist and speaker/media trainer

6 0
3 years ago
Read 2 more answers
Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex vv has a limit l(v)l(v)
andrey2020 [161]

Answer:

there would be 14 vertices and 7 edges

Explanation:

6 0
3 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
3 years ago
What is a narrative?
vichka [17]

Answer:

It's B the event that happened in a story

Explanation:

Narrative - a spoken or wirriten account of connections events, a story

3 0
3 years ago
Read 2 more answers
Other questions:
  • 3.A customer has a system with a Gigabyte B450 Aorus Pro motherboard. He wants to upgrade the processor from the AMD Athlon X4 9
    11·1 answer
  • If a method writes to a file it should start out like (fill out the blank, what should you write after the parameters in the met
    12·1 answer
  • "the firewall acts as a proxy for which two types of traffic? (choose two.)"
    14·1 answer
  • While at work, Joe asked Dana to show him how to change the copier paper. Joe kept working as she explained the process, and the
    5·2 answers
  • When activated, an Excel object has all the features of an Excel
    8·2 answers
  • Create the following matrix M: 1 7 13 19 25 ?-3 9 15 21 27 5 11 17 2329By writing one command and using the colon to address ran
    8·1 answer
  • Ismael is examining a report in Access. He needs to access a view that will be used to examine and change the structure of the r
    9·2 answers
  • Can someone help on number 8? Plz
    14·1 answer
  • Protecting data security, privacy, and integrity are important database functions. What activities are required in the DBA's man
    10·1 answer
  • How to fix this? Zoom it in to see it better
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!