1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
3 years ago
9

What is meant by authorization? The decision to allow or deny a subject access to an object. The ability of a subject and an obj

ect to interact. The user, network, system, process, or application requesting access to a resource. A secret combination of characters known only to the subject.
Computers and Technology
1 answer:
USPshnik [31]3 years ago
6 0

Answer: <em>The ability of a subject and an object to interact.</em>

Explanation:

Authorization is known as or referred to as a security mechanism that is used in order to determine the client/user access or privileges levels that are related to the system resources these mostly tend to include computer services, programs, files, data and other application. Authorization is also referred to as something that is preceded by authentication i.e for individuals identity verification.

You might be interested in
A computer with 5 stage pipeline like the one descrive in class delas with conditional branches by stalling for the next three c
trasher [3.6K]

Answer:

It hurts 80%

Explanation:

7 0
3 years ago
1. The________  member function moves the read position of a file.
emmasim [6.3K]

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

8 0
3 years ago
Compare the applications below:
alisha [4.7K]
Both can be the same thing
4 0
3 years ago
Read 2 more answers
________ is a dedicated device designed to manage encrypted connections established over an untrusted network such as the Intern
pantera1 [17]

Answer:

The correct answer to the following question will be Option B (VPN concentrator).

Explanation:

  • Virtual Private Network (VPN) is a virtual, limited-use network generated using protocol encryption and tunneling over physical, public network connections.
  • A dedicated tool for managing VPN connections built over an untrusted network, such as the Internet, is called a VPN concentrator.
  • It's a type of networking system that ensures secure VPN connections are established and messages are transmitted between VPN nodes.

Therefore, Option B is the right answer.

7 0
3 years ago
What is a what if analysis in Excel example?
Sergio039 [100]

Answer:

What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.

Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.

(i really hope this is what u needed)

4 0
3 years ago
Other questions:
  • Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month a
    14·1 answer
  • How can investors receive compounding returns
    13·1 answer
  • When you “listen” to evaluate an online message, which question should you ask?
    11·1 answer
  • Re-write the following arithmetic expressions as Scheme expressions and show the result of the Scheme interpreter when invoked o
    13·1 answer
  • The formatting option functions like space bar. However instead of moving one space at a time, it allows you to move your text i
    7·1 answer
  • 14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by s
    11·1 answer
  • True or false mobile devices need to work within limited screen space
    6·2 answers
  • What charts the cost to the company of the unavailability of information and technology and the cost to the company of recoverin
    15·1 answer
  • Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint sho
    10·1 answer
  • A ________________ is a special type of array that implements a last-in, first-out collection of values.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!