1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
13

With which access control method do system administrators establish what information users can share?

Computers and Technology
1 answer:
monitta3 years ago
8 0

Answer: Mandatory access control

Explanation:

Mandatory access control is defined as the highly uncompromising access control. This access control provides accessing resources of the system under surveillance of  system administrator or operating system.

  • It does not permit access of any subject for operating or functioning on object  without authority.It has the ability to manipulate the control through system administrator.
  • It controls who can share information by accessing, what information can be shared, circumstance of access etc.

You might be interested in
Define self-esteem: A how I feel about myself B how I visualize myself C how I esteem myself
vitfil [10]

Answer:

A how I feel about myself

Explanation:

Self-esteem is your overall opinion of yourself — how you feel about your abilities and limitations. When you have healthy self-esteem, you feel good about yourself and see yourself as deserving the respect of others. When you have low self-esteem, you put little value on your opinions and ideas.

8 0
3 years ago
Instructions
erastova [34]

Answer:

#here is code in python

#read the name

name=input("Enter your name:")

# read the age as integer

age=int(input("Enter your age:"))

#print the output in the required format

print("{} is {} years old.".format(name,age))

Explanation:

Read the name from user and assign it to variable "name".Then read the age from  user and assign it to variable "age". In the next line print the output as required using the format function.

Output:

Enter your Sam                                                                                                                                        

Enter your age:24                                                                                                                                            

Sam is 24 years old.

3 0
3 years ago
Robin wants her presentation to move from one slide to another with special motion effects. Which option should Robin use?
topjm [15]
If this is in power point, then she should use the <em>transitions </em>tab on the ribbon. =)
3 0
3 years ago
Read 2 more answers
1. Conflict resolution is the process of solving disputes and disagreements.
Rufina [12.5K]

1. It should be the use of communication (False)

2.Yes, they do have overall responsibility, so that would be True!

3. B) would be your right answer. If any questions remain, please, don't be scared to comment below

i know things kidz ;3

~chealafi~

4 0
3 years ago
Read 2 more answers
Nancy finds it difficult to locate emails in her Inbox. What action should she take to locate a particular type of email instant
exis [7]
Your answer would be A. Hope this helps!;)

4 0
3 years ago
Read 2 more answers
Other questions:
  • It is a good programming practice to ________ your functions by writing comments that describe what they do.
    7·1 answer
  • (1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle t
    6·1 answer
  • Data ____ travel over the Internet from router to router until reaching their destinations.
    7·1 answer
  • A regular language can not be infinite.<br> True<br> False
    15·1 answer
  • Which feature of the basic input/output system (bios)/unified extensible firmware interface (uefi) would you enable if you wante
    15·1 answer
  • A brown outline around a frame is an indication of which tool?​
    13·1 answer
  • A rectangle indicates a single process.true or false​
    7·2 answers
  • Why do meteorologists use data such as temperature, wind speed, and air
    9·1 answer
  • Ports that expand the options for input, output, and storage, are commonly called ____________ ports.
    14·1 answer
  • _________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!