You must be logged in with the ____ account or have sufficient privileges to take away privileges from another user account.

A. base
B. global
C. root
D. source


Answer: C

Computer Science & Information Technology

You might also like to view...

Public-key encryption is also known as ___________ .

A. digital-key encryption B. asymmetric encryption C. one-way time-exchange encryption D. optimal-key encryption

Computer Science & Information Technology

________ reduces programming labor by reusing common objects easily.

A) Inheritance B) Dower C) Parenting D) Settlement

Computer Science & Information Technology

Access is a tool and cannot produce perfect results because it depends heavily on the ________ that is inputted

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ is the destination for cut or copied data

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology