1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vinil7 [7]
3 years ago
10

A network administrator needs information about the printers that employees can access. Where can he find the information? The a

dministrator will find the information in _____
Computers and Technology
2 answers:
Kaylis [27]3 years ago
6 0
The information can be found on the printserver or terminal serve information where mapped users to the server printers were granted or have access to. On setup of server printers, the administrators allow certain individual access to the terminal server after installing the printer to be made available on the server.
dexar [7]3 years ago
4 0
The employees system info and or in the security clearance level to see if he could also get info that could be sensitive info
You might be interested in
Click _______ to add a new column to a table.
Sophie [7]
The answer is Insert control B

5 0
4 years ago
Read 2 more answers
Q.No.3. A filling station (gas station) is to be set up for fully automated operation. Drivers swipe their credit card through a
scZoUnD [109]

Answer:

Following are the 5 problems, that can arise in this scenario:

Explanation:

  • When the driver swipes its credit or debit card, its connection with both the card company could not be formed due to the poor or ineffective development, therefore the driver may not put any fuel from its vehicle.  
  • It still wants to spend energy even after the card is read as incorrect.  
  • So, its total price to just be debited from the credit or debit card shall be much more and less than the real cost as well as the deduction of both the fuel should be overestimated.  
  • Its information may not adjust when a driver uses its device because the next driver could no matter how long only use the device.
  • Its fuel limit to also be established when the vehicle has stopped its card would be faulty as well as a certain restriction would not cause its device to be misused.
3 0
3 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Identify the correct way to cite the Occupational Outlook Handbook's "How to Become a Dentist" web page.
quester [9]

Answer:

C."How to Become a Dentist." Occupational Outlook Handbook. Bureau of Labor Statistics and US Department of Labor, 29 March 2012. Web. 1 May 2013.

Explanation:

When citing an online publication without a known author, the title of the article is first stated and encapsulated in italics. This is then followed by the name of the website or book. The organization responsible for the write-up is indicated. A comma separates the name of the organization and the date when the article was written. 'Web' is written to show that the material was obtained online. Finally, the date that tells when the article was retrieved is noted.

This guideline applies to both the Modern Language Association and the American Psychological Association citation styles.

6 0
3 years ago
Read 2 more answers
Which of the following is least likely to be a scientific experiment?
enot [183]
It would be the last one, because she isn't recording any type of data over what she is doing and she isn't observing it at all. She simply trimmed the stems of a bouquet of flowers. However, the other options insist that they are recording data and observing, like you would do when performing an experiment. I hope this helps! :)
8 0
3 years ago
Read 2 more answers
Other questions:
  • What finacial behaivor will typically lead to a low credit score
    8·1 answer
  • A(n) _____ is a simple database program whose records have no relationship to one another.
    10·1 answer
  • Each brochure template produces _____ pages of graphics, business information text boxes, and story boxes.
    15·1 answer
  • *blank* is the unauthorized copying and selling or distributing of licensed video games.
    10·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • Which are SD card types? Choose two answers.<br> Macro-SD<br> Max-SD<br> MicroSD<br> MiniSD
    5·2 answers
  • A malicious program that can replicate and spread from computer to computer?
    10·2 answers
  • According to the computer science what isCD ROM is a ​
    8·1 answer
  • Memory and processor both have big impact on the performance of a pc. <br>•true <br>•false <br>​
    12·1 answer
  • program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are c
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!