1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
5

The conflict between the user's goal for unfettered access to data and the security administrator's goal to protect that data is

an issue of ______________.
Computers and Technology
2 answers:
rewona [7]3 years ago
8 0

Answer: Access control

Explanation:Access control is the type of security facility that is provided to the systems in an organization. The functions carried out in maintaining the security of the system is done by authenticating , authorizing and identification of the users and related components . They are secured using the PINs , passwords, bio-metric scan etc.

The situation of the user wanting to have a unrestrained access towards data as well as maintaining the security is the done by access control.

Mariulka [41]3 years ago
8 0

Answer:

Access control

Explanation:

Access control is a principal part of information security that directs who's permitted to access and utilize organization data and resources.

It is a security strategy that manages who or what can view or utilize resources in a figuring domain.

Physical access control limits access to grounds, structures, rooms and physical IT resources. Coherent access control limits associations with PC systems, framework documents and information.

You might be interested in
Alex's woodworking shop is trying to design a web page with Cascading Style Sheets (CSS). Alex would like create the new design
guajiro [1.7K]

Answer:

1. C) Embedded Style

2. C) User Agent Style

Explanation:

1. Alex will use Embedded style to create styles that apply only to the HTML document that the style was created. With Embedded styling; the rules can be embedded into the HTML document using the <style> element.

2. Since Alex has forgotten to give any style for all of his pages, the style that will be applied to his pages is User Agent Style. User Agent Style is the default style of a browser. The browser has a basic style sheet that gives a default style to any document and this style is called User Agent.

8 0
3 years ago
_______________involves engineers building up a 3D geometry piece by piece.
zloy xaker [14]

Answer:

<u>Parametric design</u> involves engineers building up a 3D geometry piece by piece. 2D sketches turn into 3D features, with constraints and relations duly applied to fit the designer's intent.

Explanation:

Hope this helps

8 0
3 years ago
What is a protocol in digital technology plwwes help
anzhelika [568]

Protocol, in computer science, a set of rules or procedures for transmitting data between electronic devices, such as computers. In order for computers to exchange information, there must be a preexisting agreement as to how the information will be structured and how each side will send and receive it.

3 0
3 years ago
A preformatted text box inserted via the text box button on the insert tab is a _______. select one:
Tems11 [23]
The answer is that it is inline object formatted with square text wrapping as its text will flow in the outline square of the given object to be around it that's why it is in line and not to be considered as a floating object formatted with tight or square text wrapping.
3 0
3 years ago
Which of these file types does not share info in a spreadsheet?
slava [35]

Answer:

C) PNG

Explanation:

PNG which is an acronym for Portable Network Graphics is a form of images file format and it does not share info in a spreadsheet. The files that share info on the spreadsheet are the following:

1. Text = .txt

2. Formatted Text = .prn

3. CSV = .csv

4. Data Interchange Format = .dif

5. Symbolic Link = .slk

6. Web page = .html, .htm

7. XML Spreadsheet = .xml

Hence, in this case, the file types that do not share info in a spreadsheet is PNG

7 0
3 years ago
Other questions:
  • Typing a ____________ at the beginning of a word will exclude that word when doing a search.
    8·2 answers
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • To name a computed field, follow the computation with the word ____ and then the name you wish to assign to the field
    8·1 answer
  • New trends, tools, and languages emerge in the field of web technology every day. Discuss the advantages of these trends, tools,
    15·1 answer
  • Aside from human user types, there are non human user groups. Known as account types, __________ are implemented by the system t
    10·1 answer
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
  • The files in James's computer were found spreading within the device without any human action. As an engineer, you were requeste
    11·1 answer
  • Explain in detail, how the Depth Wavelet Transform (DWT) algorithm works, specifically with respect to EEGs (a non-invasive brai
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!