1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amiraneli [1.4K]
1 year ago
8

What are authorization rules?

Computers and Technology
1 answer:
nasty-shy [4]1 year ago
8 0
An authorization rule specifies the policy that applies to an object and that is based on various conditions, such as context and environment. Each authorization rule has a unique name and can be applied to multiple objects in a domain.
You might be interested in
Myra just got the latest computer game and wants to play it on her desktop. When she plays the game, she notices that it is slug
diamong [38]

Answer:

Ram/cpu/gpu... Many many things she can do

Explanation:

It may be a issue of internet bandwith, if this new game requires a insane ammount of internet then it may run low FPS (frames per second) and make myra's game look slughish,but anouther issue may be the ram or cpu, like if this is a new game and you've always played like simple games, so your running on persay a core i3 or i4, it aint gonna cut it on a newer game, you gonna need a probably core i5 or i7, or be like any sane person and switch to amd, it may be a bit pricy but if you want nice clean gaming, then amd is the way to go

Also while you are at it get a ssd

I hope this helps "-"

8 0
2 years ago
Read 2 more answers
Any suggestions on how to write the following Python code?
Ksju [112]

Answer:

Hi

Explanation:

6 0
2 years ago
Create a for-loop which simplifies the following code segment: penUp(); moveTo(100,120); turnTo(180); penDown(); moveForward(25)
kvasek [131]

Answer:

for(var i=0; i<3; i++) {

  penUp();

  moveTo(100,120);

  turnTo(180);

  penDown();

  moveForward(25);

}

Explanation:

The i variable is the loop dummy. The code block will be executed 3 times.

7 0
2 years ago
List 5 kinds of acquaintances who told Debbie Fields would fail?<br><br> right answer only
Mamont248 [21]
<span><span>1.her husband’s business acquaintances2.Debbi’s mother3.her in-laws4.her friends 5.fellow students at Los Altos Junior College </span>At age 20, Debbi Fields always loved baking cookies and decided that she thought about starting a business. Her family and friends argued that the business would fail but Debbi managed to get a loan. <span>
</span></span>
3 0
3 years ago
Read 2 more answers
What question for attack libraries help answer?
ch4aika [34]

Threat modellers should always look at threat modeling as a 4-step framework that should make sure that a system is safe. This 4-step framework consist of four questions that developers and threat modellers need to ask themselves


A: What are you building?

This is the first step in the 4-step framework. The threat modellers should figure out what they are building. By default, all software development projects consist of specifications and different types of documents. One of the simplest ways of getting an overview is by creating visual models of the system. By taking a look at such diagrams, the threat modellers should be able to get an idea of how extensive the system looks.


B: What can go wrong?

According to some practitioners, it is right to suggest a more detailed list of what can go wrong, instead of using STRIDE. STRIDE is too high level and abstract. Once we’ve looked at different models of the system, the threat modellers should be able to find possible attack patterns that may be a threat against the system.


C: What are you going to do about it or what should you do about those things that can go wrong?

This step consists of deciding what to do with every threat. It is in this step that the developers or the threat modellers need to make a calculated decision on which attacks to mitigate, and which attacks are hard to execute, so obscure, or not that damaging to the system. This step is where threats need to be addressed.


D: Did you do it right or did you do a decent job of analysis? After all possible threats have been considered as not damaging, it is time to re-evaluate the system design and implementation. Threat modeling is considered to be an iterative process. If the validation of a system fails, then the whole process needs to jump back to the first or the second step.




6 0
3 years ago
Other questions:
  • It creates an SQL statement to find the project that has the most employees from the same department. If more than one project m
    11·1 answer
  • Instant messaging is synchronous
    10·1 answer
  • How do I persuade my parents to allow me to have social media? I will be 15 in a week or so, so I am old enough. I'm pulling my
    5·1 answer
  • Is there a way I can put an already made sound that i created over an already made video
    6·1 answer
  • A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords,
    10·2 answers
  • Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum
    6·1 answer
  • BRAINLIEST!!! 20 PNTS!!!! HELPP!!!
    12·1 answer
  • Function _one(array)
    6·1 answer
  • Select the correct answer.
    13·2 answers
  • What number is represented as a binary code of 101110
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!