How does setting user permissions increase the security of a system?

Answers

Answer 1

Answer: This can allow for less hackers to acquire your most essential and private information. It will be kept private to you and only others you share with.

Explanation: For example, if I wanted to edit a document without being given the consent to do so this will breach the security of user permissions, but if the individual was to set the document to view only, I would not have access to edit or even change little aspects of it.


Related Questions

Where do you enter characters for a simple search?
Choose the answer.
Navigation Pane
Replace dialog box
Clipboard
Find Pane

Answers

Answer:



Navigation Pane

Jennifer has written a short story for children. What should be her last step before she submits the story for publication?

Answers

Answer: proofreading

Explanation:

The options include:

A. proofreading

B) editing

C) accepting track changes

D) rejecting track changes

Jennifer's last step before she submits the story for publication should be proofreading. Proofreading simply refers to the checking of errors in an article, story or text before such article or text is published.

Proofreading is the final stage when one is writing before it's published. When a story is proofread, spelling, formatting issues, punctuation marks and every other mistakes are checked and removed.

why auto-updates can reduce the risk of a cyberattack?

Answers

Answer:

They help keep your software up to date.

Explanation:

Using Windows for example: With automatic updates, you don't have to search for updates online or worry about missing critical fixes or device drivers for your PC.

You can read more about it here: https://support.microsoft.com/en-us/windows/windows-update-faq-8a903416-6f45-0718-f5c7-375e92dddeb2

I hope this helps you!

What is considered appropriate dress for men and women in the workplace? Select all that apply.

Answers

Answer:

I guess clean, pressured pants or skirt

and

dress shirts and ties

Answer:

the first and last

Explanation:

because you don't want to reveal any things that are inappropriate but you still want to be comfortarible.

who plays oblox .............................

Answers

Answer:

Me

Explanation:

MEEEE!!! i love scary games

is an evaluation method that uses a program that tests another program.
O A customer satisfaction survey
O A test case
O Automated testing
O Print debugging

Answers

automated testing !!!!$

Answer:

automated testing

Explanation:

got it right on edge

What is the solution to the equation ?

Answers

There’s no solution to the equation
The correct answer is option D. No solution

How do you open an application on the macOS?

Answers

Click the Launchpad icon in the Dock, or pinch closed with your thumb and three fingers on your trackpad. Then click an app to open it. You can also type an app's name to find the app in Launchpad, then press the Return key to open it.

Answer:

you can simply click on 'application' in the sidebar to open your default application folder, which contain for each app on your system.you can double click any of the icons in here to open them or take you to do it if currently open.

A citation and its ____________________ can be entered at the same time. [Insert Citations]
Question 4 options:

name

date

source

table of contents

Answers

Answer: source

Explanation:

A citation and its source can be entered at the same time. Hence option c is correct.

What is citation?

Citation is defined as how you disclose to your readers that a particular passage in your work was taken from another source. Identifying the sources you used to obtain your knowledge can demonstrate to the reader that you did thorough investigation. to recognize and respect other scholars' work by giving them due credit.

Select the phrase or sentence you wish to cite by clicking at the end of it, and then select Insert Citations from the Citations & Bibliography group on the References tab. Choose the citation you want to use from the list provided under "Insert Citation."

Thus, a citation and its source can be entered at the same time. Hence option c is correct.

To learn more about citation, refer to the link below:

https://brainly.com/question/1272936

#SPJ2

identify when programmers use an Else statement.
O to use an If statement in its place to make the test answer true.
O to use an expression instead of a conditional statement to make the answer false
O to tell the program to take a different action when the If statement answer is false
O to tell the program to give different information when the test answer is true.

plz help it's an assignment question on edgunuity and i need help. which one is it.

Answers

Answer:

to tell the program to take a different action when the If statement answer is false

Explanation:

if x = 0:

     print('x equals 0')

else:

      print('x equals something else that isnt 0')

Answer:

C. I got it right on edge.

Explanation:

two ways in which some culter views that exist may affect a relationship negatively​

Answers

Answer:

some people say different culture less they get along

Explanation: or more

Display the IP address of the default gateway of this device.

Answers

Answer:

ipconfig

Explanation:

Type ipconfig and look for a Default Gateway entry that is not blank.

what is two features of the minicomputer?​

Answers

Answer:

It is smaller in size than a mainframe computer. It is less expensive than a super and mainframe computer. It is not much more powerful than the mainframe and supercomputer, but powerful than microcomputers. It supports multiprocessing and multi-tasking.

Explanation:

Write a while loop that produces the following output:
1
2
4
8


please i need help

Answers

Answer:

Explanation is being shown in the file to the link

input data that can be accepted by a function in Python is called as​

Answers

Answer:

Getting User Input from Keyboard

Explanation:

There are two functions that can be used to read data or input from the user in python: raw_input() and input(). The results can be stored into a variable.

Answer:

also know as IDE

Explanation:

Who was responsible for the development of the rocket motor?
-Technical Societies
-Robert H. Goddard
-Germans
-Wernher von Braun
I WILL MARK YOU BRAINLIEST ‼️‼️

Answers

Answer: Robert H. Goddard

Explanation: he developed and flew the first liquid-propellant rocket

Answer:

-Technical Societies

Explanation:

Rocket enthusiasts and rocket clubs were active in Germany, the US, Russia, and other countries. Experimental rockets were designed, tested, and sometimes flown. Some of the experiments used liquid fuel, though solid-fuel rockets were also developed. In 1932, the rocket motor was developed as a reusable method for the flight of a rocket.

Describe white blood cells you see at 10X?

Answers

Answer:

White blood cells are part of the body's immune system. They help the body fight infection and other diseases. Types of white blood cells are granulocytes (neutrophils, eosinophils, and basophils), monocytes, and lymphocytes (T cells and B cells). ... Also called leukocyte and WBC.

Explanation:

The ________________________ option allows one to start a numbered list on any number desired. [Set Starting Number Values]
Question 7 options:

Number Formats

Change List Level

Define New Number Format

Set Numbering Value

Answers

Answer:

Set Numbering Value.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;

I. View Mode.

II. Print Mode.

III. Drift Layout.

A numbered list can be defined as a list of items that are ordered numerically or sorted sequentially.

Basically, it is best suited for steps or procedures that are to be done sequentially or in order i.e in an ascending order. Thus, a numbered list is an ordered list that starts from 1.

The Set Numbering Value option allows one to start a numbered list on any number desired. To automatically create a numbered list in Microsoft Word, you should press 1 followed by a period, leave a space, type a text and then press the enter button.

Which comparison operator means ‘is not equal to’?



!=


==


=#


%

Answers

Answer:

A. !=

Explanation:

== Means equal, != is like a block of that, meaning NOT EQUAL

As per the operators, the comparison operator that means 'is not equal to' is !=.

The comparison operator!= is used to detect whether two values are not equal. It is often used to assess conditions in programming languages and logical expressions.

When used, the operator determines if the values on each side of it are not equal. The expression evaluates to true if they are not equal.

This operator is useful for comparing data and executing various code blocks based on their inequality.

Thus, programmers may use the!= operator to generate branching logic and make decisions depending on the equality or inequality of values, increasing the flexibility and control of their program.

For more details regarding operators, visit:

https://brainly.com/question/29949119

#SPJ6

Predict the future that social media will have on society or the environment.

Answers

Answer:

Social networks are becoming more and more popular. More than 80% of the 4.66 billion people on the planet with access to the internet are social network users… and this share is expected to grow!

Society will drift to technology and rely on it more.

Environment wouldn't be taken cared of, and may be damaged.

Explanation:

Answer:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

Explanation:

The Influence of Social media is being used in ways that shape politics, business, world culture, education, careers, innovation, and more.

QUESTION 4 of 10: What term refers to the basic characteristics of a population segment, such as gender, age, and income?

Answers

272727727272727226282829292
Does it offer multiple choices?

You've just deployed a new Cisco router that connects several network segments in your organization. The router is physically located in a server room that requires an ID for access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer using a Telnet client with a user name of admin and a password of admin. You have used the MD5 hashing algorithm to protect the password. What should you do to increase the security of this device

Answers

Answer:

The answer is "Use SCP to back up the router configuration to a remote location".

Explanation:

In the SPC, it is the Secure Copy Protocol that allows information to be stored and securely transmitted. Its SCP doesn't encrypt its digital information by itself; it corresponds to both the Security module which provides authentication or security. It allows the safe transfer of personal documents from either a host machine to a remote server. Its transference protocol "FTP" is quite close, but it adds security and authentication.

Question # 1
Dropdown
Choose the word that matches each definition.
[ ] is the study of designing and building computers and computer-based systems.

Answers

Answer:

Computer engineering

Explanation:

Computer engineering is the answer

it is a JavaScript property used to call a function after a specified time, in milliseconds​

Answers

Answer:

setTimeout is a native JavaScript function (although it can be used with a library such as jQuery, as we'll see later on), which calls a function or executes a code snippet after a specified delay (in milliseconds).

Answer:

setTimeout is a native JavaScript function (although it can be used with a library such as jQuery, as we'll see later on), which calls a function or executes a code snippet after a specified delay (in milliseconds).

Which of the following algorithmic efficiencies would be considered LEAST efficient?

A. Linear
B. Constant
C. Polynomial
D. Exponential

Answers

Answer:exponential

Explanation: I believe

Need answer quick plz.

Fill in the blank with the correct response.

A colleague excitedly tells you she has created a interface component for SPSS, a statistics software program. She

has created a

Answers

Answer:

SPSS

IS THE ANSWER

IHOPEIT WILL HELP YOU

Answer:

wassup with it bro i don't even know the answer and i just want the points

Explanation:

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

1 2

3 4

Question #4

Multiple Choice

Which statement is true about the random and secrets modules?

O Only the secrets module can generate random numbers.

O Both modules can generate random numbers.

Neither module can generate random numbers.

O Only the random module can generate random numbers.

Answers

Answer:

Both modules can generate random numbers.

Explanation:

Both the random and secrete modules are builtin programming modules used for generating random number variables. The random module consists of a number of methods in its module for random. number generation such as seed() ; getstate() ; random() ; choice() ; randrange() ; randint() and so on. Random methids are best for generating random numbers which are to be adopted for simulation or modeling. The secrete modules does the same however, numbers generated are stronger and less predictable than the random number modules. Secrete modules are usually adopted in the generation of authentication token and security pins.

Answer:

Neither module can generate random numbers.

Explanation:

Because I took the quiz and that's the right answer.

write Python statement to do the following tasks (a) create a list that contain the name of 5 student of your class (b) add one more name to the list of 5 students (c)
delete the first name from the list of student​

Answers

Answer:

classroster = ["Bill", "Tyler", "Jake", "Sam", "Joe"]

print("Original Roster: " + str(classroster))

classroster.append("June")

print("Added student: " + str(classroster))

classroster.pop(0)

print("Removed the first student" + str(classroster))

Explanation:

We create a variable named classroster and assign it a list value by using []

We print text with the value of the variable classroster, but we used the str tag to make it a string value

We used classroster.append to add "June" to the end of the list.

We then print the classroster again

We use classroster.pop(0) to remove "Bill" on the list. If we wanted to remove "Tyler" from the list, we would use classroster.pop(1).

If we wanted to remove "Jake" we would use classroster.pop(2)

and so on. goodluck!

Why did the editors choose to rearrange the intercutting between Luke’s story and the Imperials? What effect did this have on the final film?

Answers

Answer:

Though it has its merit, know that the rule is not mandatory. ... A jump cut is a cut in film editing in which two sequential shots of the ... An intercut is a type of edit where two or more actions in distinct ...

Other Questions
Dr. Nachman and his colleagues collected rock pocket mice across 35 kilometers of the Arizona Sonoran Desert, which included both dark, rocky lava outcrops and light, rocky, granite areas. They recorded substrate color, and coat-color frequencies for each location. Each site was separated from any of the others by at least eight kilometers. The researchers trapped a total of 275 mice. Their data are summarized below (numbers have been slightly modified for the purposes of this worksheet).Field Data SummaryCollecting Site Substrate Color Number of Mice Phenotype Light Dark1 Dark 22 3 192 Light 80 74 63 Light 22 19 34 Dark 28 3 255 Light 58 25 336 Dark 65 9 561. Calculate the overall frequencies of light-colored mice and dark-colored mice caught on light-colored substrates. [to 3 decimal places]2. Calculate the overall frequencies of light-colored mice and dark-colored mice caught on dark-colored substrates. (to 3 decimal places)3. Using the Hardy-Weinberg equation and data from the table above, determine the frequency of the three genotypes on the light, rocky, granite substrate. For genotype frequencies use three decimal places and for calculations using the allele frequencies, you must round the allele frequencies to two decimal places.4. Using the Hardy-Weinberg equation and data from the table above, determine the frequency of the three genotypes on the dark, rocky lava substrate. (to 3 decimals). For genotype frequencies use three decimal places and for calculations using the allele frequencies, you must round the allele frequencies to two decimal places.5. Which fur color seems to have the greatest overall selective advantage? Use data collected from both dark-colored and light- colored substrates to support your answer.6.What environmental change gave a selective advantage for one coat color over another?7. In a separate study, 76 rock pocket mice were collected from four different, widely separated areas of dark lava rock. One collecting site was in Arizona. The other three were in New Mexico. Dr. Nachman and colleagues observed no significant differences in the color of the rocks in the four locations sampled. However, the dark-colored mice from the three New Mexico locations were slightly darker than the dark-colored mice from the Arizona population. The entire Mc1r gene was sequenced in all 76 of the mice collected. The mutations responsible for the dark fur color in the Arizona mice were absent from the three different populations of New Mexico mice. No Mc1r mutations were associated with dark fur color in the New Mexico populations. These findings suggest that adaptive dark coloration has occurred at least twice in the rock pocket mouse and that these similar phenotypic changes have different genetic bases. How does this study support the concept that natural selection is not random?8. To determine if the rock pocket mouse population is evolving, explain why it is necessary to collect fur color frequency data over a period of many years. What type of conflict is presented in this excerpt?A conflict with other characters.A conflict within one character.A conflict with nature.A conflict within society. How genetically modifying affects everything we eat ?HELPPP can someone help me with this please A factory makes rods by cutting plastic pipes that are 5 feet long into eight rods how long is each rod ? Every store employee gets an additional 10% off the already discounted price. If an employee buys an item with an original price of $40, how much is the discount? Explain how you got your answer Answer if your smart Zoey can text 90 words in 4 minutes. At this rate, how many minutes would it take her to text 45 words? Who won the French and Indian war and why? Allah has made the adopted son How does King develop the point that he wasnt invading Birmingham as an outsider? In order for heat to flow there must be... *A. identical tempatures B. a difference in tempaturesC. a difference in altitudeD. an electrical current present Plzz tell my percentage HELP ASAP I WILL GIVE ALL MY POINTS AWAYThe custom of electronic payments began in 1860 when Western Union used the telegram for electronic fund transfer. In 1946, John Biggins, who worked for the Flatbush National Bank in Brooklyn, New York, tried an experiment. His bank issued cards, which customers then used to make purchases. The bank paid stores for the purchases and collected debts from card holders. Biggins Charg-It became the first credit card. Why did the author include this paragraph? What is meant by a hierarchy of values Find the area of the triangle created with the diagonal. Each side length measures 8 feet. Help ASAP please. How many protons are in an atom of copper? How many electrons are in an atom of copper? How many neutrons are in an atom of copper? Round your answer to the nearest whole number.' Having good may help you to make deals more easily?A entertaining B manners C demonstrations D handshaking When plates slide past each other, their jagged edges get stuck. Then, plates release in a sudden jolt. What is that called?Group of answer choicesEarthquakeConvergenceTectonicsVolcano This keypad lock uses 6 letter keys to enter a3-letter code.enter codeWhat would make this lock more safe?1) Making the codes one place longer2) Adding one more letter key Which statement correctly compares 3/5 and 4/10