1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
svetoff [14.1K]
3 years ago
7

Which tab allows you to review the slideshow timings? O Home O View O Review O File

Computers and Technology
1 answer:
disa [49]3 years ago
4 0

Answer:

view

Explanation:

You might be interested in
Question 1 Why should a user seek support when troubleshooting a computer problem is beyond his or her technical knowledge?​
sveticcg [70]

A user must seek support when troubleshooting a computer problem is beyond his or her technical knowledge because: <em>When the user seeks support, the computer problem is solved accordingly and further complications are avoided.</em>

Discussion:

Further computer problems may arise from a computer problem. As such, when a user finds it difficult to troubleshoot a computer problem, the user should seek support since the computer problem is beyond his or her technical knowledge

Read more on troubleshooting:

brainly.com/question/18315517

6 0
3 years ago
Who has gotten a random file link from someone? What file does it contain?
Bad White [126]

Answer:

those are bots , just report those

Explanation:

8 0
3 years ago
Read 2 more answers
What the repeal of online privacy protections means for you?
kvv77 [185]
Online Privacy is well, our privacy while on the internet. If they have repealed that, then we have no privacy while on the internet. I feel like now a days there is no privacy at all anywhere. Everywhere you go, there are cameras watching you. So for them to take away online privacy is pretty messed up.
7 0
4 years ago
Which process is based on repulsion of oil and water?
Tasya [4]
E.........................
4 0
3 years ago
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Kobotan [32]

Answer:

It is essential for the existence of a helicopter administration over all other users on the system.

 

Explanation:

A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.

A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:

  1. read directories
  2. write to directories
  3. make changes to and delete files, folder and subfolders.
  4. alter authorization settings for all files and subdirectories.

Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to

  • install  and remove software applications
  • update and or upgrade the computers operating system
  • access directories and files which normal users cannot and should not.

System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.

Some of their merits include the ability to:

  1. Oversee, audit, and completely control all other privileges.
  2. forestall cyber attacks on the system from internal users or insiders.
  3. Establish and provide evidence for compliance with regulatory codes

Cheers

8 0
3 years ago
Other questions:
  • What does confidentiality of data refer to?
    6·2 answers
  • Why is it important to consider the readability of a Web page when selecting and applying a background color?
    12·1 answer
  • QUESTION 8 Software applications that generate information are located in the first tier of n-tier architectures. True False
    7·1 answer
  • Which biometric technique is considered nearly infallible from a scientific point of view and is increasingly preferred by crimi
    8·1 answer
  • Which option will automatically update copied data?
    12·2 answers
  • Analyze the following recursive method and indicate which of the following will be true.
    7·1 answer
  • In most cases, it is possible to prevent an exception from terminating a program by using the try and except statements. Select
    13·1 answer
  • What are the pros and cons of stone, wood, brick, concrete, steel, and glass for architecture building materials?
    7·2 answers
  • Can anyone help???
    6·2 answers
  • A computer cannot boot if it doesn't have ?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!