How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records, but not allow her to delete the records

Answers

Answer 1
i don’t think that’s possible. giving control to edit records also means giving control to delete them. maybe discuss before hand to build trust and understanding or duplicate the records in case she does delete them

Related Questions

Say you have a long string and you want to collect all of the letters within it without storing duplicates. What would be the most appropriate type to store the letters in?
a. a set
b. a list
c. the original string
d. a dictionary

Answers

A set because sets do not allow duplicated elements

d. Application software are developed by software companies ​

Answers

Answer:

May this help you l think

Explanation:

There are several different types. They can be grouped into four basic categories:

Application development that provides functionality for users to perform tasks. Examples include office productivity suites, media players, social media tools, and booking systems. Applications can run on the user’s own personal computing equipment or on servers hosted in the cloud or by an internal IT department. Media streaming development is one example of application development for the cloud.

2.System software development to provide the core functions such as operating systems, storage systems, databases, networks, and hardware management.

what was the main purpose of napiers bone?​

Answers

Answer:

Napier's bones is a manually-operated calculating device created by John Napier of Merchiston, Scotland for the calculation of products and quotients of numbers. The method was based on lattice multiplication, and also called 'rabdology', a word invented by Napier.

Answer:

The main purpose of napiers bone is to fine products and quotient of divisions.

help me please help me please​

Answers

Answer:

3 one is the answer or 4 one

Answer:

none of the above

Explanation:

Every flip flop will divide the frequency by 2, so you need 2 flip flops.

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.

Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?

Answers

The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.In this method, the subnetting separates the IP address between host and network addresses.The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]

Subnet numbers [tex]\bold{= 13}[/tex]

Calculating the borrow bits:

[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]

a)

Calculating the dotted decimal value for the subnet mask:

[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

Trong phần mềm dự toán ETA, Chi phí xây dựng được thể hiện ở Thẻ/Tab giao diện nào?

Answers

Answer:

iwteosgsgshs hhhhsgkaiauqhbsbshsbwbbws

If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was integrated?​

Answers

To enhance the ICT (Information Communication Technology) used by teachers, I will modify how the ICT was integrated.

The modification of how ICT is integrated will change the culture that places teaching over technology.  Then, teachers will be taught how to use ICT to:

improve learning so that teachers become learning facilitatorsmotivate learners by fostering learning autonomy, making students less dependent on the teacherengage the learners by creating collaborative learningdiminish content learning so that students learn to think, create, and communicate effectivelymake learning a lifetime culture enhance the learning environment so that teachers become collaborators and co-learners with students.

Thus, I will enhance the ICT used by teachers by modifying its integration to achieve better results for both teachers and learners.

Learn more about the importance of ICT here: https://brainly.com/question/13724249

What is a computer system

Answers

Answer:

A computer along with additional hardware and software together is called a computer system. A computer system primarily comprises a central processing unit (CPU), memory, input/output devices and storage devices. All these components function together as a single unit to deliver the desired output.

Explanation:

pls mark brainliest

Which is needed for the specific task of inserting a chart into a report?
O The Controls tab
O The Insert Image command
O The Existing Fields command
O The Property Sheet​

Answers

To add charts in Access to reports, click the “Create” tab in the Ribbon. Then click the “Report Design” button in the “Reports” button group. Unlike other report controls, the chart control uses its own data source to show its data. Therefore, you can insert it into a blank, unassociated report, if desired

3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select

Answers

Answer:

I think a is correct answer.

What is also known as computer Network?

Answers

The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones,servers as well as networking hardware.

Write a program that reads a list of 10 integers, and outputs those integers in reverse. For coding simplicity, follow each output integer by a space, including the last one. Then, output a newline. coral

Answers

def reverse_list (num_list):

try:

if num_list.isdigit() == True:

return num_list[::-1]

elif num_list < 0:

return "Negative numbers aren't allowed!"

except ValueError:

return "Invalid input!"

user_list = list (int (input ("Please enter ten random positive numbers: " )))

print (reverse_list (user_list))

WILL MARK BRAINLIEST

Write a function called quotient that takes as its parameters two decimal values, numer and denom, to divide. Remember that division by 0 is not allowed. If division by 0 occurs, display the message "NaN" to the console, otherwise display the result of the division and its remainder.

(C++ coding)

Answers

https://docs.microsoft.com/en-us/dotnet/api/system.dividebyzeroexception?view=net-5.0#remarks

click in link

The invention of the integrated circuit was the first major advance in computing. The integrated circuit made it possible for all of a computer's electrical components to reside on one silicon chip.

This invention became known as the __________.


personal computer


microprocessor


client-server configuration


mainframe computer

Answers

Answer:

micro processor

Explanation:

Output is the act of is the act of entering the data to the computer?​

Answers

Answer:

Output is the act of the computer display information based on your input

Explanation:

Funny thing is that output is the exact opposite of what you just described

If every company is now a technology company, then what does this mean for every student attending a business college

Answers

Answer:

Explanation:

There are all sorts of possibilities for, say, inserting new technologies into existing processes. But most of these improvements are incremental. They are worth doing; in fact, they may be necessary for survival. No self-respecting airline, for instance, could do without an application that lets you download your boarding pass to your mobile telephone. It saves paper, can't get lost and customers want it.

But while it's essential to offer applications like the electronic boarding pass, those will not distinguish a company. Electronic boarding passes have already been replicated by nearly every airline. In fact, we've already forgotten who was first.

Write steps to Delete data from ‘Datagridview’

Answers

Explanation:

private void btnDelete_Click(object sender, EventArgs e)

{

if (this.dataGridView1.SelectedRows.Count > 0)

{

dataGridView1.Rows.RemoveAt(this.dataGridView1.SelectedRows[0].Index);

}

}

1110011*110011 binary multiplication

Answers

122113420121

Explanation:

Answer:

110110101001

Explanation:

You have to multiply them normally and then add then in a binary manner..

Remember these are binary numbers ( 1+1=0,

1+0=1, 0+0=0)

Instructions
Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

iiiio888887776558777u765

How can an IS managers keep up with the endless demand for more software to support new information systems​

Answers

An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.

To think outside the box, the IS manager should try the following strategies:

Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.

Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.

Learn more about information systems here: https://brainly.com/question/1521627

What does filtering a record do?
O It suppress some records and shows others.
O It removes records from the document permanently.
O It sorts all the data in the record.
O It arranges all the information in one column.​

Answers

Answer:

It sorts all the data in record.

Explanation:

third one is verified

convert decimal number into binary numbers (265)10

Answers

Answer:

HELLOOOO

Alr lets start with steps by dividing by 2 again and againn..

265 / 2 = 132 ( rem = 1 )

132 / 2 = 66 ( rem = 0 )

66/2 = 33 ( rem = 0 )

33/2 = 16 ( rem = 1 )

16/2 = 8 ( rem = 0 )

8/2 = 4 ( rem = 0 )

4/2 = 2 ( rem = 0 )

2/2 = 1 ( rem = 0 )

1/2 = 0 ( rem = 1 )

now write all the remainders from bottom to up

100001001

is ur ans :)))

Peter has discovered that the junior administrator has done something to corrupt the firewall rules on one of the Linux machines. He decides to delete all of the rules and recreate them from scratch. What is the first command that Peter should run

Answers

Answer:

the first step Peter must take is to configure the default policies for each of the built-in chains to ACCEPT.

He can do this by running the following:

$     sudo iptables -P INPUT ACCEPT

$     sudo iptables -P FORWARD ACCEPT

$     sudo iptables -P OUTPUT ACCEPT

Explanation:

If he doesn't do this, he stands the risk of being locked out of the server through the SSH.

Having done the above, he can proceed to run the following commands:

$     sudo iptables -t nat -F

$     sudo iptables -t mangle -F

$     sudo iptables -F

$     sudo iptables -X

The above will effectively flush (-F), and delete all non-default chains (-X).

Cheers

Write the Java code for the calculareDiameter method.

Answers

Answer:

* Program to find diameter, circumference and area of circle.

*/

import java.util.Scanner;

public class Circle {

   public static void main(String[] args) {

       // Declare constant for PI

       final double PI = 3.141592653;

       Scanner in = new Scanner(System.in);

       /* Input radius of circle from user. */

       System.out.println("Please enter radius of the circle : ");

       int r = in.nextInt();

       /* Calculate diameter, circumference and area. */

       int d = 2 * r;

       double circumference = 2 * PI * r;

       double area = PI * r * r;

       /* Print diameter, circumference and area of circle. */

       System.out.println("Diameter of circle is : " + d);

       System.out.println("Circumference of circle is : " + circumference);

       System.out.println("Area of circle is : " + area);

   }

}

You want to remind users of the acceptable usage policy that applies to all computer systems in your organization, so you decide to display a message after the user logs in. The full path and filename to the file you would edit is

Answers

It should always be changed to show one message informing customers of the approved user policy which applies to every one computer network within our organization.The "motd" was its filename of a modified version of such a file that displays any messages after logging in.The document should be modified when the message is to be displayed before a user logs in.Please find the attached file for the complete solution.

Learn more:

user logs: brainly.com/question/7580165

Which website allows you to host your podcast for at a cost that includes your domain name? (Correct answer only)

A. Podbean
B. Blogger
C. WordPress
D. HostGator
E. Buzzsprout

Answers

Answer:

D I think it

Explanation:

Answer:

I think it is HostGator

Explanation:

I took the test and I put Podbean and it was wrong.

Discuss the OSI Layer protocols application in Mobile Computing

Answers

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

hope that helps you

please follow

please mark brainliest

Differentiate between email and NIPOST System

Answers

Answer: NIPOST System is sending mail physical like photos and letters and many items

Email is electronic  mail sent through the internet but you can send it anywhere

Explanation:

the base on which the number n=(34)? is written if it has a value of n= (22)10​

Answers

If I'm understanding the question correctly, you are looking for an integer b (b ≠ 0, b ≠ 1) such that

[tex]34_b = 22_{10}[/tex]

In other words, you're solving for b such that

b ¹ + 4×b ⁰ = 22

or

3b + 4 = 22

Solving this is trivial:

3b + 4 = 22

3b = 18

b = 6

So we have

34₆ = 22₁₀

what is computer with figure​

Answers

Answer:

A computer is an electronic device that accept raw data and instructions and process it to give meaningful results.

Other Questions
Find the value of each expression.30 3 2 Cuando los escritores crean personajes animales con rasgos humanos, esto se llama ... humanizacin moralizacin personificacin dar rasgo Write the changes occurring in the passage through the alimentary canal as a person has ingested roti and dal as a part of his meal our culture, Our Identity" Is 3.824 a rational number? Decide whether each statement is a 'positive' or 'negative effect of deforestation. a) It provides land to grow food or keep farm animals. b) It makes mudslides more common. c) It allows new roads to be built to connect cities. d) It can make the area warmer and windier. e) It can cause extinctions by destroying habitats. f ) It allows more biofuels to be grown to provide energy. g) It increases the amount of soil carried away by rivers. h) It increases the amount of carbon dioxide in the atmosphere. Which of the following situations would warrant seeking immediate help from a mental health professional?A. Your brother tries out for the school play but isn't chosen for any parts. He's given the opportunity to work as a crew member backstage instead, an offer he accepts.B. Your childhood friend is subjected to bullying by a classmate at school. He tells you in confidence that he's approached the school principal, and something will be done soon.C. Your cousin suddenly becomes withdrawn and hostile to you, even though you used to be close. She has a new group of friends, and you've heard rumors that they are drug abusers.D. Your friend is failing her math class, so she decides to hire a tutor to help her bring up her grades and improve her skills in the subject. How did the Great Society differ from the New Frontier?A. The New Frontier focused more on civil rights legislation, while the Great Society focused on expanding welfare.B. The Great Society focused on foreign policy, while the New Frontier focused on domestic policy.C. The Great Society focused on civil rights and fighting poverty, while the New Frontier focused on technology and space exploration.D. None of these choices are correct. Food moved to the back of the mouth by the tongue causes all of the following EXCEPT covering the opening of the larynx by the epiglottis. pressure against the pharynx to initiate swallowing. elevation of the soft palate to seal off the nasal cavity. the swallowing center stimulates successive waves of muscle contraction in the esophagus. churning of the stomach contents. I"M TIMED!!! PLSSSSSSSSSS HELPPPPPPPPPPPDrag and drop the numbers and symbols into the boxes to form an expression that represents this phrase:8 more than quotient of 12 and 6Which Order Do I Put It In? que nos comunica la obra de Vicent van Gogh la noche estrellada Because of the drought, city officials quickly took emergency measures to protect the supply of water.Which word is the adjective? Find the area of a triangle with legs that are: 16 m, 12 m, and 8 m.O A. 16.4 m2B. 54 m2C. 46.5 m2D. 38.2 m2 Your friend is calling from Colombia. Describe to your friend the weather where you livetoday and what season it is. Ask your friend what the weather is like in Colombia. Please writeyour answer in Spanish. why is transportation considerd as an important infrastructures of development? How does climate change impact the Forests of Sumatra? I need help solving these two questionsFor question 4 it also isn't DFor question 7 it also isn't B What should we do if some group tries to split Nepal despite the fulfillment of its deman Pls help its in the picture The expression 2(l + w) is used to calculate the perimeter of a rectangle, where l is length and w is width. If the length is Fraction 2 over 5 unit and the width is Fraction 1 over 5 unit, what is the perimeter of the rectangle in units? Fraction 3 over 5 unit 1 unit 1Fraction 1 over 5 units 2Fraction 3 over 5 units