1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
2 years ago
11

You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc

ess control model is being used?
Computers and Technology
2 answers:
kifflom [539]2 years ago
7 0

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

<h3>What is role-based access control (RBAC)?</h3>

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: brainly.com/question/14267297

#SPJ12

dusya [7]2 years ago
6 0

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

You might be interested in
What is the full form of PDP​
PtichkaEL [24]

Answer:

<em>Plasma display panel </em>(PDP)

Explanation:

<em>Plasma display panel </em>(PDP) is a type of flat panel display that uses small cells containing electrically charged ionized gases or plasmas, to produce an image. PDP consists of millions of tiny gas-filled compartments, or cells, between two panels of glass with parallel electrodes deposited on their surfaces.

3 0
4 years ago
Write, compile, and execute a C program that calculates and returns the fourth root of the number 81.0, which is 3. (hint: The f
alex41 [277]

Answer:

   result=pow(value,0.25);

   printf("The 4th root is:%2.f",result);

Explanation:

In order to accomplish the task we need a library called math.h.

//4 root code

#include <stdio.h>

#include <math.h> //adding the library math.h

int main()

{  

   double value=81.0,root=0.25,result; //declaring the variables

   result=pow(value,root); //The function Pow will return the power raised to the base number

   printf("The 4th root is:%2.f",result); //print the result

   return 0;

}

3 0
3 years ago
What is the mid-square method?
Rom4ik [11]

Explanation:

Mid-Square Method:-In this method some it takes some digits from the square of a number.This number is a random number.This number can be used as a key for hashing.

This technique is mostly used in hashing so decrease the collision in hash maps.

This method has  a limitation that when we square a large number it may go out of range of integer so we have handle those cases.

8 0
3 years ago
A/an<br> controls the flow of data between a computer and the network.
strojnjashka [21]

Answer:

The NIC (Network Interface Card)  is the computer network component that controls the flow of data between a computer and the network.

Explanation:

5 0
3 years ago
True or false it is possible to insert an external drive that connects to your computer using a usb cable while the computer is
Serggg [28]
True. There's no need to turn the computer off for USB connections.
6 0
3 years ago
Other questions:
  • PLEASE HELP! Which aspect helps you to change the luminescence of your image?
    10·2 answers
  • A(n) ____________ specifies a variable's name and data type.
    5·2 answers
  • 3 applications of cumulative probability distribution in medical field?​
    9·1 answer
  • مسألة لبرنامج الماتلاب لمصفوفة وعمود
    10·1 answer
  • How do you invite someone to a conversation on brainly
    14·1 answer
  • Is this a desktop or a computer, or are they the same thing
    12·1 answer
  • Which unknown factor affects prices in the financial markets?
    9·1 answer
  • Usually it is a rectangular box placeed or underneath your desk​
    15·1 answer
  • What is meant by a control plane that is based on logically centralized control? In such cases, are the data plane and the contr
    8·1 answer
  • Why are business types of profession interrelated?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!