1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lelu [443]
3 years ago
7

Waht is the difference between authorization and access control? Access control specifies what a user can do, and authorization

enforces what a user can do Access control proves a user's identify and authorization creates a log of their activities Authorization specifies what a user can do, and access control enforces what a user can do Authorization proves a user's identify and access control creates a log of their activities
Computers and Technology
2 answers:
spayn [35]3 years ago
5 0
<h2>Answer:</h2>

Authorization specifies what a user can do, and access control enforces what a user can do.

<h2>Explanation:</h2>

Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.

Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.

SpyIntel [72]3 years ago
4 0

Answer:

Authorization specifies what a user can do, and access control enforces what a user can do

Explanation:

Authorization is one of three features in information security access control policies, with the other two being authentication and accounting. Authorization is the required credential of a user needed to access the user account. It is used as a access control process on the account usable features.

The access control is a mechanism in information security technology that is used to specify how data should be accessed. It enforces what a user can do in a network

You might be interested in
What is the output of the code below assuming that global variable x has value 2 and global y has value 3? def f1(): return "ab"
Lostsunrise [7]

Answer:

ababababab

Explanation:

The code above is written in python and python uses indentation .So let me rephrase the code accordingly and explain what the code really do.

Note x and y is a global variable which can be used by any of the function declared.  According to the question x and y are 2 and 3 respectively

The first block of code describes a function f1 without any argument but the code should return the string "ab"

def f1():

      return "ab"

The second block of code defines a function f2 and returns the value of f1 multiply by x. This means you are multiplying the string "ab" by 2 which will be equals to abab

def f2():

           return f1() * x

The third block of code declared a function f3 and returns the sum of  f2 and product of f1 and y. using PEMDAS principle the multiplication aspect will be solved first so, ab × 3 = ababab, then we add it to f2  . ababab + abab = ababababab.

def f3():

        return f2() + f1() * y

Finally, we print the function f3 value to get ababababab

print(f3())

If you run the code on your IDE like below you will get  ababababab

x = 2

y = 3

def f1():

      return "ab"  

def f2():

      return f1() * x  

def f3():  

      return f2() + f1() * y  

print(f3())

     

7 0
3 years ago
-What is/are the goal/s of Business Intelligence systems?
8_murik_8 [283]

Answer: Business intelligence system is a system that is used in the field of business and organizations for generations of the strategy and plans to make decision. This system consist of the business intelligence(BI) tools. It creates a connection in the different information/data and takes them to the business organization.

Business intelligence system has goals like:-

  • Increasing daily sales
  • Fast the growth rate of the business
  • improving the rental performance
  • Gaining more profit

5 0
3 years ago
What is after Windows 8.1
MAVERICK [17]

Windows 10. The most well-known Windows operating systems are Windows 7, 8, and 10.

7 0
3 years ago
Read 2 more answers
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
Sati [7]

Answer: Logical Point Blocking

Explanation:

4 0
1 year ago
List the different generation of computers with its main component​
Dennis_Churaev [7]

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

  1. First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.
  2. Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.
  3. Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.
  4. Fourth Generation Computers (1972-2010):In this generation the main component of computers were Microprocessor
  5. Fifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence
4 0
3 years ago
Other questions:
  • What medium allows for electronic delivery of DTP content without the need for any physical media?
    13·1 answer
  • Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
    11·1 answer
  • Suppose that an engineer excitedly runs up to you and claims that they've implemented an algorithm that can sort n elements (e.g
    5·1 answer
  • What can you learn at Udemy.com?
    11·1 answer
  • ____ is the use of networking technology to provide medical information and services.
    14·1 answer
  • Live preview is available on touch screen
    5·1 answer
  • What is one reason that writing effective messages is so important
    11·2 answers
  • Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The fi
    5·1 answer
  • What happens when an arithmetic operator is applied to non-arithmetic data types such as Boolean or character
    7·1 answer
  • This study highlights that people access social networking sites to be
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!