You must be logged in with the ____ account or have sufficient privileges to take away privileges from another user account.
A. base
B. global
C. root
D. source
Answer: C
Computer Science & Information Technology
You might also like to view...
Public-key encryption is also known as ___________ .
A. digital-key encryption B. asymmetric encryption C. one-way time-exchange encryption D. optimal-key encryption
Computer Science & Information Technology
________ reduces programming labor by reusing common objects easily.
A) Inheritance B) Dower C) Parenting D) Settlement
Computer Science & Information Technology
Access is a tool and cannot produce perfect results because it depends heavily on the ________ that is inputted
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ________ is the destination for cut or copied data
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology