1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
-Dominant- [34]
3 years ago
13

The process of determining that a user has permission to perform a particular action on a computer is called

Computers and Technology
1 answer:
Doss [256]3 years ago
5 0
I believe that would be authorization.
You might be interested in
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
stiks02 [169]

Answer:

B. False

Explanation:

External security threat can be defined as any threats coming outside the company's computer network operation, usually carried out with negative or hostile intent for the purpose of stealing information or distracting the flow of operation. For example, Virus Attack

However, given that the question talked about the "management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures."

Hence, this is not an External Security Threat, which means, the correct answer is FALSE.

5 0
3 years ago
What do you think about Naruto?
Natalka [10]

Answer:

AMAZINGGG

Explanation:

because it just is !!

3 0
2 years ago
Read 2 more answers
Program your own file lab7.cpp in which your main() function will test the new data structure. The main() function, Declares an
Stella [2.4K]
Is this a question or just something up here just to be here
3 0
3 years ago
Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?
natali 33 [55]
The answer is c post office protocol version 3 (POP 3)
7 0
2 years ago
PLEASE HELP I WILL MEDAL AND FAN!
ladessa [460]
Hi!

Question 1: George W. Bush.

Question 2: I'm pretty sure it's excessive use of force.

Question 3: About 25 percent.

Question 4: True.

Question 5: To ensure the safety of officers and inmates and to punish those who break the rules.

Question 6: I believe it is false.

Question 7: True.

Question 12: John F. Kennedy.

Question 13: I believe it's False.

Question 15: False.

That's all I know!
4 0
3 years ago
Read 2 more answers
Other questions:
  • Consider a physical transmission medium of capacity C bits/sec between two stations that have I bits of information sent/receive
    6·1 answer
  • Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques
    6·1 answer
  • Which is the most likely reason why scientists change a model?
    12·2 answers
  • To write 10 lines of code on paper:
    10·1 answer
  • The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incomi
    10·1 answer
  • When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\
    13·2 answers
  • What is the next line?
    7·1 answer
  • You used a website to learn about the child-rearing practices in China. Your study is related most to which aspect
    13·2 answers
  • An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
    6·1 answer
  • what types of physical drives does windows disable defragmenting, but provides another method of optimization?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!