The answer is avoid distractions. <span>Using caller id is part of step to avoid distractions in an effective time management plan. </span><span>Today with caller ID available you can identify your callers. When you are focused on your task at hand and the time you have to accomplish it, you must learn to better control the telephone. </span>
<span>!UML (all of them)
2.Flowchart (more for understanding a real world process of some kind; like a business process)
3.Data model including Bachman (if you don't need to at least understand your data, how it is stored versus a model, i.e., Bachman then you are doing it wrong and your schema could be simplistic)
This is 3 different examples</span>
Answer:
b.used is 2, b.data[0] is 4, b.data[1] is 6
Explanation:
bag b;
b.insert(5); // b has 5
b.insert(4); // b has 5,4
b.insert(6); // b has 5,4,6
b.erase_one(5); // now 5 is removed , b has 4,6
so no:of elements b.used is 2
b[0]=4;
b[1]=6;
<h2>
Answer:</h2>
Authorization specifies what a user can do, and access control enforces what a user can do.
<h2>
Explanation:</h2>
Authorization is simply granting access to an authenticated user of an application. It specifies what a user can and/or cannot do. For example, for a user to access their banking details in an online banking service, they have to be authorized by first authenticating them to prove their identity. Another example is in an organizational system where some users (normally called admins) can access certain database info whereas some other users (normally called the regular users) cannot.
Access control is used to enforce the policies dictated by authorization. In other words, access control enforces the policy of what a user can and/or cannot do. Access control makes authorization possible. It is sometimes called privileges or permissions. For example, the <em>security tab </em>in the operating system of Windows, allow to set access privileges for certain files and/or folders. Another example is in an organizational system where some files on the organization's server are configured in such a way that access to it is restricted and dependent on some further authorization.