1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
2 years ago
11

What service determines which resources a user can access along with the operations that a user can perform?.

Computers and Technology
1 answer:
sweet [91]2 years ago
8 0

The authorization services determine which resources a user can access along with the operations that a user can perform.

<h3>What is authorization service?</h3>

The authorization service makes sure the user has permission to access a certain resource. Role-based access control (RBAC) and list-based access control are two methods for authorizing (LBAC).

The process of granting anyone permission to use a resource is called authorization.

The description may sound bizarre, but there are numerous actual examples that may help you comprehend what authorization means and how to utilize it with computer systems.

Thus, the authorization services determine which resources a user can access along with the operations that a user can perform.

Learn more about the authorization services here:

brainly.com/question/10436962

#SPJ4

You might be interested in
Which of the following is used to describe the information used in
aniked [119]

Answer:

D.

Explanation:

Clipher

You can read the instructions

3 0
3 years ago
State four features of information​
Xelga [282]

Answer:

This is your answer

8 0
3 years ago
The amount of data that can be stored on a disk depends in part on_____.
MariettaO [177]
To what it seems like, it’s d
8 0
3 years ago
Consider a physical transmission medium of capacity C bits/sec between two stations that have I bits of information sent/receive
levacccp [35]

Answer:

Check the explanation

Explanation:

when calculating the total time to send the I bits of information or The packet delivery time or latency which can be said to be the amount of time from when the first bit leaves the point of transmission until the last is received. When it comes to a physical link, it can be computed or determined as: Packet delivery time = Transmission time + Propagation delay.

Kindly check the attached image below to get the step by step explanation to the above question.

5 0
3 years ago
Which tables and fields would you access to determine which book titles have been purchased by a customer and when the order shi
enyata [817]

Answer:

To determine which book titles have been purchased by a customer and when the order shipped the following tables and fields would be used.

Table:      

  • CUSTOMERS

Fields

  • Customerno

Table

  • ORDERS

Fields:

  • Orderno
  • Shipdate
  • Customerno

Table:

  • ORDERITEMS

Fields:

  • Orderno

Table:

  • BOOKS

Fields

  • isbn
  • title

BOOKS table contains field like title of the books, so this will help in finding which book titles have been purchased.

CUSTOMERS table keeps information about customers that purchasing an ordering the books. The customerno uniquely identifies each customer so that the order information can be found using the customerno of a specific customer.

ORDERITEMS keeps information about orders via orderno

ORDERS table will keep track about the shipment of orders. Orderno identifies each order, shipdate will help determine when an order is shipped.

7 0
3 years ago
Other questions:
  • Brenda wants to finish her presentation with a summary slide . She wants three key messages to appear on each of the photo clips
    6·2 answers
  • A hacker changing the ip addresses used in conjunction with a particular company’s web site to re-route them to the hacker’s ser
    11·1 answer
  • Prominent is another word for stands out. True False
    13·1 answer
  • A type of memory that is expensive and therefore is often used only in cache memory applications.
    15·2 answers
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Pride Group of Companies is making tremendous profits in different categories of electronic goods. The group of managers have to
    12·1 answer
  • I made a mistake. I'm building my first PC and I bought a Ryzen 7 3800x and planning on getting a 2070 super (if I can). What I
    9·1 answer
  • Add Try/Catch error checking To make sure that the user enters valid values in your program. To catch negative values passed to
    9·1 answer
  • How did the military in the early 1900s move resources?
    7·1 answer
  • 1. As part of your community, your school, and your neighbourhood, how else does ICT have an impact on social
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!