1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
13

With which access control method do system administrators establish what information users can share?

Computers and Technology
1 answer:
monitta3 years ago
8 0

Answer: Mandatory access control

Explanation:

Mandatory access control is defined as the highly uncompromising access control. This access control provides accessing resources of the system under surveillance of  system administrator or operating system.

  • It does not permit access of any subject for operating or functioning on object  without authority.It has the ability to manipulate the control through system administrator.
  • It controls who can share information by accessing, what information can be shared, circumstance of access etc.

You might be interested in
Normal view
Amiraneli [1.4K]
Normal View is the place where creating and editing occurs slide panel. This is where you can write or edit kind of information or images you wanted to show in your power point presentation. 
3 0
3 years ago
Read 2 more answers
Go to your Canvas course and locate the Assignment: Writing Prompt 1: Is the Internet making us Meaner?and complete the activity
Maslowich

Answer and Explanation:

The Internet is not changing anything other than making you extreme. The nice become nicer, the mean become meaner, the nice become mean, and the mean become nice. The internet just makes things easier to do. It really isn't a factor in if you are mean or not.

7 0
3 years ago
Read 2 more answers
Which you could use an Excel chart to present your data?
Svetach [21]
Determining what percentage of customer 101 buys product A, and what percentage of the customer buys product B
6 0
3 years ago
Debugging is not testing, but always occurs as a consequence of testing. <br> A) TRUE<br> B) FALSE
kherson [118]
A) True Hope that helps
5 0
4 years ago
Select the correct images. From her stack of photographs, Alice has to pick images that a photographer shot using the sports mod
OLEGan [10]

Answer: i think its the horse the boy hopefully i helped

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Machine language is made up of which following codes
    11·1 answer
  • The physical components of information technology, which can include the computer itself plus peripherals such as storage device
    15·1 answer
  • Write a short program that uses a for loop to write the numbers 1 through 10 to a file
    11·1 answer
  • Why do you think it is necessary to set the sequence in which the system initializes video cards so that the primary display is
    15·1 answer
  • In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
    9·1 answer
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
    10·1 answer
  • Which item is developed last in the cyclical design process
    11·1 answer
  • In cybersecurity, a threat actor is an individual or an entity responsible for cyber incidents against the technical equipment o
    10·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!