A computer user with ________ rights can add multiple local user accounts and restrict what account holders have access to

A) supervisor B) IT employee C) administrator D) super user


C

Computer Science & Information Technology

You might also like to view...

Which one of the following laws or regulations interprets sections of the Communications Decency Act to mean that ISPs are not responsible for malicious software transmitted over their services by hackers?

A. Digital Millennium Copyright Act (1998) B. Gramm-Leach-Bliley Act (1999) C. CAN-SPAM Act (2003) D. Green v. America Online (2003)

Computer Science & Information Technology

Which of following codes of an event handler records the exact window position of the mouse pointer as it maneuvers across an element?

A. document.getElementById("element1").onmouseenter = trackPointer;?function trackPointer(e) {var hPos = e.clientX;document.getElementById("element2").innerText; B. document.getElementById("element1").onmouseclick = trackPointer;?function trackPointer(e) {var vPos = e.clientY;document.getElementById("element2").innerText =" (" + hPos + ", " + vPos + ")";} C. document.getElementById("element1").onmousemove = trackPointer;?function trackPointer(e) {var hPos = e.clientX;var vPos = e.clientY;document.getElementById("element2").innerText =" (" + hPos + ", " + vPos + ")";} D. document.getElementById("element1").onmouseup = trackPointer;?function trackPointer(e) {var hPos = e.clientX;document.getElementById("element2").innerText =" (" + hPos + ", " + vPos + ")";}

Computer Science & Information Technology

Case WD 7-1Meredith is the administrative assistant at a large auto dealership. It is time to send out sales letters to customers who have purchased vehicles at the dealership. Meredith isn't sure where to begin. Which tab contains the mail merge commands?

A. Home B. Insert C. References D. Mailings

Computer Science & Information Technology

__________ locks can be changed after they are put in service, allowing for combination or key changes without a locksmith and even allowing the owner to change to another access method (key or combination) to upgrade security.

A. Programmable B. Manual C. Biometric D. Electronic

Computer Science & Information Technology