1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
9

To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual

access to files, printers, computers, and applications. What security model should you consider using
Computers and Technology
1 answer:
scoundrel [369]3 years ago
4 0

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

You might be interested in
Arrange the steps in a sequence that you would follow while sorting data in a spreadsheet.
ss7ja [257]

Answer:

  1. In the spreadsheet menu, click the Data option.
  2. Select the column to sort.
  3. In the submenu of Data, click the Sort… option.
  4. In the Sort dialog box, click the “ascending” option for the  first sort criteria.
  5. Click OK.

Explanation:

The correct sequence is as shown above.

3 0
3 years ago
What is difference between RAM and ROM?
Lesechka [4]
Hi pupil here's your answer ::


________________________

RAM ::

● Data can be read and written on the RAM chip at any number of times.

● The operating system, application programs and the user data is stored in Ram only until the computer is powered on.

● Ram is a volatile memory that loses its contents when the computer is switched off.

● The size of RAM makes a difference in the processing, i.e. the bigger size of the RAM the greater is the speed of processing.

ROM ::

● Data can only be read from the ROM chip.

● Only system programs are stored in ROM. It can't be used to store user data and other programs.

● ROM is non volatile memory the data stored in ROM is permanent in nature.

● Size of the ROM has nothing to do with processing.


________________________

hope this helps. . . .
5 0
4 years ago
1. Hypothesis: It is easier to establish an ethical work environment in a non-profit organization than in a for-profit organizat
RUDIKE [14]

Answer:

Explanation:

Nonprofit organizations may have more possibilities to remain ethical because their work is not aimed at capital, but at the welfare of something or some situation.

When money is not involved in organizations, things become more honest and simple.

Usually people involved in nonprofit organizations have a different worldview and want to change reality.

In a non-profit organization, a social good is sought, as opposed to an organization that aims at money, but there are people who only use non-profit organizations as status.

Even though the environment aiming at a change in reality can become a work without ethics and that breaks the social rules.

What makes people truly ethical are people, a for-profit organization can be a more ethical environment than a non-profit organization.

8 0
3 years ago
To rotate text in a cell, select the _____ option in the alignment grouping.
KiRa [710]

Answer:

rotate text is the correct answer

7 0
4 years ago
Can someone please answer these questions! Thank you :)
kolbaska11 [484]
1. Technology is something that makes things easier. 2. Technology help students in someway maybe find information about something the good thing about technology in students is that they can learn more things and the bad thing is that technology can be dangerous for students,
3 0
3 years ago
Other questions:
  • These systems consist of interlinked knowledge resources, databases, human experts, and artificial knowledge agents that collect
    9·1 answer
  • What feature should an administrator use to meet these requirements?
    8·1 answer
  • The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
    5·1 answer
  • which of the following is not a windows accessory? a. sticky notes b. windows 8 c. sound recorder or d. paint
    8·2 answers
  • Mrs. Brown is a teacher at the elementary school. As the school year begins, she sends a couple of email messages to her student
    11·1 answer
  • Write a Python program that prints all the numbers from 0 to 6 except 3
    8·1 answer
  • 26. Universal Containers (UC) has a queue that is used for managing tasks that need to be worked by the UC customer support team
    11·1 answer
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    13·2 answers
  • 3) Controls on a form or report that describe each field—often the field name—in the underlying table
    7·1 answer
  • Which keyboard shortcut would you press to copy cells that are selected in a spreadsheet?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!