5 I don’t think it’s good. I thought it was boring.
Answer:
D. HIPAA (Health Insurance Portability and Accountability Act)
Explanation:
HIPAA which stands for Health Insurance Portability and Accountability Act, is an act designed by the US government in 1996 to guard patients' confidential health information and also implement policies and procedures to safeguard it. The act contains the required information and instruction for handling patients' medical health information. The law however gives patients (or their representatives) the right to access these information which as a matter of fact must be made available within 30 days from the day of request.
PS: Not sure why the option D in the question contains ' FTF '. I have taken it to be a typo because without it, the option is in itself complete.
The option that is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.
<h3>What are servers?</h3>
A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.
Note that in the case above, The option that is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.
Learn more about servers from
brainly.com/question/17062016
#SPJ1
<h2>
Answer:</h2>
Authorization specifies what a user can do, and access control enforces what a user can do.
<h2>
Explanation:</h2>
Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.
Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.