1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
2 years ago
11

What service determines which resources a user can access along with the operations that a user can perform?.

Computers and Technology
1 answer:
sweet [91]2 years ago
8 0

The authorization services determine which resources a user can access along with the operations that a user can perform.

<h3>What is authorization service?</h3>

The authorization service makes sure the user has permission to access a certain resource. Role-based access control (RBAC) and list-based access control are two methods for authorizing (LBAC).

The process of granting anyone permission to use a resource is called authorization.

The description may sound bizarre, but there are numerous actual examples that may help you comprehend what authorization means and how to utilize it with computer systems.

Thus, the authorization services determine which resources a user can access along with the operations that a user can perform.

Learn more about the authorization services here:

brainly.com/question/10436962

#SPJ4

You might be interested in
Who created the first photograph
Tems11 [23]
Nicephore Niepce created the first photograph.
8 0
3 years ago
Read 2 more answers
Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the w
AleksAgata [21]

Answer and Explanation:

Using javascript:

function dayof_theweek(){

var TodayDate = window. prompt("enter today's date in the format 'year, month, day' ");

var Datenow=new date(TodayDate);

var Dayofweek=Datenow.getday();

var Days=["monday","Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"];

if(Dayofweek==indexOf(Days[Dayofweek]))

{

document.createTextnode(Days[Dayofweek]);

}

}

The program above uses a date object which uses the method getday to get the day of the week(get day returns an integer from 0 to 6).we then use a comparison operator == to test the condition that returned value Dayoftheweek is same with the index of the array Days and then print to a html document. The program may need improvements such as the fact that errors may arise when proper input isn't given, and therefore must be handled.

8 0
2 years ago
25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
Veronika [31]

Answer: don't know sorry

Explanation:

5 0
2 years ago
Read 2 more answers
Why is it difficult to enforce laws against intellectual theft?
LiRa [457]

Answer:

A-because most of the victims of intellectual theft are individuals  

Explanation:

Its definitely the first, and not B., C, or D,

Countries are no barrier in catching the theft, as almost all the countries now have issued the online identification number of each of their citizens. However, some of them are in the process. Hence, for next one - two years we can add add the B as well:

B-because much intellectual theft is committed in other countries

However, as this work is complete, the B option will not be an issue related to intellectual theft analysis and control.

And  C and D are definitely not the part of the answer, as associations like FCC USA, Internet association etc  are technically sound enough, and quite good to fight a case under any law as well.

7 0
3 years ago
The larget social networking site to date is
maks197457 [2]
FB, I would guess.

Sincerely,

Xeno
3 0
3 years ago
Other questions:
  • Functions that are built-in into PHP to perform some standard operations.
    15·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • ____ documents consist of the text to be displayed on a Web page, together with a number of special characters: tags that achiev
    14·1 answer
  • ___________ is an approach to boundary spanning that results from using sophisticated software to search through large amounts o
    8·1 answer
  • What is an orthochromatic film?
    12·1 answer
  • Write a Scientific report modeling a written reasearch paper on big data applications.​
    6·1 answer
  • D is the correct answer
    8·2 answers
  • Karen works in a department store. Her coworker gave diverse cultural backgrounds. Which statement shows that Karen understand t
    14·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • "Rights and duties are two sides of the same coin." Explain with examples​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!