1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
6

If a security mechanism offers availability, then it offers a high level of assurance that authorized subjects can ___________ t

he data, objects, and resources.
A. Control
B. Audit
C. Access
D. Repudiate
Computers and Technology
1 answer:
vodka [1.7K]3 years ago
6 0

Answer:

C. Access

Explanation:

Based on the information provided within the question it can be said that the term being mentioned is Access. This is because accessibility of these three things is the main goal of availability. Which is what the security mechanism is offering, therefore the authorized subjects must have complete access to the data, objects, and resources.

You might be interested in
You have been asked to provide an account for an outside consultant, who needs limited access to the network for a very short pe
frutty [35]

Answer:

Guest account

Explanation:

When a consultant is accessing a network for a while and needs limited access to it, A Guest account should be given. This help keep your data and information save both now and in the future.

A guest account is an account with limited access and permission to a network over a specific period of time.

7 0
3 years ago
What is adobe photoshop?
Hitman42 [59]
Its a photoshop that u need to pay for
4 0
3 years ago
Read 2 more answers
Examine these statements about computer software. Which one is false? a Computer software is a collection of coded instructions.
Gnesinka [82]

Answer:

d Computer software used to control a work cell is fundamentally different to business software.

Explanation:

A computer software used to control a work cell is not fundamentally different from a business software. They are different in terms of what they do or the problem they solve or different coded instructions that the computer executes for each of them or maybe different computer languages and hardware requirements. However they are not different fundamentally as they are both computer programs that are based on computer algorithms and code languages or instructions that the computer executes to solve a particular problem.

7 0
4 years ago
Which character is used to begin a comment?
Aloiza [94]
# is used to begin a comment.
8 0
3 years ago
When you are almost done with your soup and want to get at the last little bit, how should you do this 2
pav-90 [236]

Answer:

<u>B. Tip the bowl slightly, then spoon up the last bit</u>

Explanation:

Generally speaking none of the other answers made much of sense.. "tip the bowl from side to side" doesn't help you at all, neither does "Keep spooning as much as you can, then stop eating". Neither of these will help you spoon up the last little bit, <u>the most logical answer is B. "Tip the bowl slightly, then spoon up the last bit"</u>. If this is not the correct answer then it'd be D, but I don't believe/feel that it's "poor etiquette" to "leave the last little bit".

7 0
3 years ago
Other questions:
  • Consider the following methods:
    10·1 answer
  • Today's Apple Mac computers run with the same I-Ternal hardware as the Windows based PC true or false
    5·1 answer
  • Computer trespass can be harmless.<br> a. True<br> b. False
    15·2 answers
  • You are using a PowerPoint template from your school to present your research findings in front of the class. What would you do,
    13·2 answers
  • This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a windows co
    10·1 answer
  • What is the awnser ?
    11·1 answer
  • I don't want my large video files using up all my hard drive space . Can I archive my videos in on DVDs or Blu Rays?
    8·1 answer
  • (in order of a-z)
    12·1 answer
  • Hahaahhaahahuahaahahhahqha
    13·1 answer
  • What is the maximum length of a text field can be?<br>​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!