1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
2 years ago
11

You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc

ess control model is being used?
Computers and Technology
2 answers:
kifflom [539]2 years ago
7 0

The type of access control model which is being used to allow only managers to access specific data is role-based access control (RBAC).

<h3>What is role-based access control (RBAC)?</h3>

Role-based access control (RBAC) can be defined as a type of access control model that is designed and developed to grant access to an end user, especially based on his or her role in an organization.

This ultimately implies that, the type of access control model which was used to allow only managers access specific data in this organization is known as role-based access control (RBAC).

Read more on access control here: brainly.com/question/14267297

#SPJ12

dusya [7]2 years ago
6 0

Answer:

Role-based access control (RBAC)

Explanation:

RBAC is a strategy of limiting network access based on specific user responsibilities inside an organization. It guarantees that individuals only have access to the information they need to complete their jobs and prevents them from obtaining unnecessary information to them. The job of an individual in the organization dictates the rights that worker is allowed, ensuring that lower-level employees do not have access to confidential data or conduct high-level duties.

Roles in the role-based access control data model are determined by a number of variables, such permission, duty, and job skill. As a result, organizations may specify whether a person is an end user, an admin, or a specialized user. Furthermore, access to computer resources might be limited to certain operations, such as viewing, creating, or modifying data. Limiting network access is critical for firms that have a large workforce, use contractors, or allow access to other parties such as customers and suppliers, making it extremely difficult to adequately manage network access. Organizations that use RBAC are better equipped to data encryption and essential applications.

You might be interested in
Consider the following method: public static void arrayMystery(int[] array) { for (int i = 0; i &lt; array.length - 1; i++) { if
Leya [2.2K]

Answer:

a. input={4,4}

b. input={3,6,6}

c. input={7,8,8,4}

d. input={5,7,7,4,4}

e input={4,6,6,7,9,9}

Explanation:

First understanding the method in the method we are iterating over array upto the second last element and in the loop we are checking that the current element is less than then next array element if it is less then we are assigning the value of next element to the current element.So the outputs are stated above according to the method execution.

3 0
3 years ago
What two variables does mass depend on?
Ber [7]

Answer:       The answer to your question would be A

have a good day

Explanation:

4 0
3 years ago
What OS is most commonly used by businesses? Linux Macintosh Microsoft Windows
alexira [117]
It's often Linux since Linux is free, but it could be Windows.
4 0
3 years ago
1. What does a network allow computers to share?
Veronika [31]

Answer:

1. B 2. D

Explanation:

If computers share processing power, it is just a larger computer.

8 0
3 years ago
can someone tell me what to do i’m kinda stuck and don’t know what he’s telling me to do pls ill give brainlist and points
Alexandra [31]

Answer:

Well a debtor is basically someone owing someone money, basically someone in debt. He’s telling cup head boy to take care of the people who owe him or someone else their or his money. Thats basically it.

8 0
3 years ago
Other questions:
  • After trying multiple times, a coworker is not able to fit a motherboard in a computer case, and is having difficulty aligning s
    11·1 answer
  • In the accompanying figure, the split double arrow mouse pointer____.
    7·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Which software application offers a variety of templates for creating reports, flyers, and newsletters that you can access withi
    12·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? ### &amp;&amp;&amp; %%% """
    14·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • What are the benefits of building redundancy into a network?
    12·1 answer
  • Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyram
    6·2 answers
  • Select the correct answer from each drop-down menu. A company is recruiting for a web designer. What kind of candidate should th
    14·2 answers
  • A loan of $12000 was borrowed from the bank at 14% per annum calculate the interest on the loan at the end of the first year ?​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!