1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rodikova [14]
4 years ago
6

What term is used to describe a list of security policies that is associated with an object?

Computers and Technology
1 answer:
Artemon [7]4 years ago
5 0

Answer:

An Access control list (ACL) is used to describe a list of security policies that is associated with an object

You might be interested in
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the orga
lawyer [7]

The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

<h3>What are servers?</h3>

A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.

Note that in the case above, The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

Learn more about servers from

brainly.com/question/17062016

#SPJ1

8 0
2 years ago
Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later date?
dalvyx [7]

Answer:

in progress

Explanation:

it is being answered by the person

3 0
3 years ago
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will
erik [133]

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

4 0
3 years ago
The internet backbone is a foundation network linked with _____ that can support very high bandwidth.
slava [35]
The internet backbone is a foundation network linked with fiber-optic cables that can support very high bandwidth. Fiber-optic cables can be compared with an electrical cable because they use the fibers to carry light and transfer information. The fiber-optics within a network help the information travel through the bandwidths at a fast, clear speed. 
8 0
3 years ago
What is hardware?...<br>​
kow [346]

Explanation:

hardware is the physical components that a computer system requires to function

TYSM

7 0
3 years ago
Other questions:
  • Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
    15·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • Write a method so that the main() code below can be replaced by the simpler code that calls method mphandminutestomiles(). origi
    14·2 answers
  • How many bits would be in the memory of a computer with 4kb memory?
    8·1 answer
  • If anything is changed on an already-tested module, regression testing is done to be sure that this change hasn’t introduced a n
    13·1 answer
  • ____ are the in-house equivalent of Internet newsgroups. They use Web- or software-based discussion tools that are available acr
    13·1 answer
  • पुजवय<br>शब्दस्य<br>विरूदायक​
    7·1 answer
  • Sypherpk is good go sub 2 him
    6·2 answers
  • Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
    10·1 answer
  • If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every pla
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!