1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
9

To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual

access to files, printers, computers, and applications. What security model should you consider using
Computers and Technology
1 answer:
scoundrel [369]3 years ago
4 0

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

You might be interested in
An information system is the entire set of __________, people, procedures, and networks that enable the use of information resou
eduard

There 4 options for this question:

a. software

b. hardware

c. data

d. All of the above

Explanation:

The correct answer, in this case, is d. All of the above, because if we want to make complete system information we must have software, hardware, and data, for example:

Social media is a software, and we must have cellphones (hardware) even behind the app there are servers and other kinds of hardware to manage the social media, the data complement all of this, it could be user information, videos, images, etc.

6 0
4 years ago
Blender is used by which video game team member?
prohojiy [21]

Answer:

The 2nd one

Explanation:

6 0
3 years ago
Describe the five components of a computer
Anna [14]

Answer:

Input, Processing, Storage, Output and Communication devices.

Explanation:

Input devices of computer are like Keyboard, Mouse, Scanner. Output devices of a computer are printers, monitors, and headphones.

There are two storages of computer one of them is REM, which can be lost if computer shutdown/closes. Data stays written on the disk until it's erased or until the storage medium fails (more on that later). An example of a communication device is the microphone.

7 0
2 years ago
What happened to motion pictures when television became popular?
Sphinxa [80]
They became more popular and more advanced with their pictures
5 0
4 years ago
Convert 4.5 strides to girth
n200080 [17]

There are 0.5 strides in one girth
so 4.5 strides will be equal to 9 girth
hope it helps
3 0
3 years ago
Other questions:
  • The ____ operation is used to add an element onto the stack.
    15·1 answer
  • Special programs that facilitate communication between a device and the os are called
    12·1 answer
  • You wrote a C application that takes 20 seconds using your desktop processor. An improved C compiler is released that requires o
    6·1 answer
  • A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
    9·1 answer
  • Which model represents any process in general?
    6·1 answer
  • The structure of the atmosphere based temperature changes ​
    5·1 answer
  • How many clients has<br> Accenture engaged globally on blockchain?
    12·1 answer
  • it just said i was blocked from brainly for a sec i was like- dang- then i logged in again then it was back to normal uHhHh can
    8·2 answers
  • Tom wants to find a number so that the sum of the digits of a two-digit number is 7. When reversing the digits, the number shoul
    15·1 answer
  • You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!