1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
2 years ago
5

The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is

an issue of ______________.
Computers and Technology
2 answers:
rewona [7]2 years ago
8 0

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

Mariulka [41]2 years ago
8 0

Answer:

Access control

Explanation:

Access control is a principal part of information security that directs who's permitted to access and utilize organization data and resources.

It is a security strategy that manages who or what can view or utilize resources in a figuring domain.

Physical access control limits access to grounds, structures, rooms and physical IT resources. Coherent access control limits associations with PC systems, framework documents and information.

You might be interested in
Help me
denis23 [38]

Answer:

a = 6, b = 0

Explanation:

The loop ran 3 times before b == 0. "while ((b != 0)" is essentially saying: 'While b is not equal to 0, do what's in my loop'. Same general thing with "&& ((a / b) >= 0)". The "&&" is specifying that there should be another loop condition, while the rest states: 'as long as a ÷ b is greater than 0, do what's in my loop'. If both of these conditions are met, the loop will run, It will continue this until the conditions are not met. Hope that helped! :)

7 0
2 years ago
Computer spreadsheet is a grid of​
Kruka [31]
Huh we’re, we’re is the computer screen shot
3 0
2 years ago
What would a good digital citizen do in the following situation? Nick sees that his classmate left her email account open on a s
Inessa [10]
1234567898765432123456789876543212345678987654321
3 0
3 years ago
The main workspace of a Windows computer is called the______
andrew11 [14]

Answer:

Desktop

Explanation:

8 0
3 years ago
Is it possible to build a portal in real life?
san4es73 [151]

No because we are not that  far in technology.

3 0
2 years ago
Read 2 more answers
Other questions:
  • What precaution can you take while using a social networking site to prevent a data breach?
    15·1 answer
  • Describe network in terms of the class computer lab
    9·1 answer
  • The numbers on the bottom of a typical check represent all of the following EXCEPT
    14·1 answer
  • Name one app that currently has a positive impact on society and explain why you think it has had a positive effect.
    10·1 answer
  • PLEASE HELP ME!!!!
    12·2 answers
  • Which of the following is NOT a strength of monetary policy?
    15·1 answer
  • When addictions escalate and the individual loses his or her job or drops out of school, _______________.
    12·2 answers
  • Write a program named split_me.py that accepts a string in the format Age.FirstName and returns the value FirstName is Age years
    14·1 answer
  • What is the output for the following code?<br><br> print (5*4+5)
    11·1 answer
  • What are two benefits of defining a function?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!