1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maksim231197 [3]
3 years ago
7

What name is given to the process or mechanism of granting or denying use of a resource typically applied to users or generic ne

twork traffic?
Computers and Technology
1 answer:
bearhunter [10]3 years ago
4 0

Answer:

Access control

Explanation:

A computer network connects two or more computer devices to communicate and share resources. When computers or workstations in a network are connected, data can be directly transferred from a source to a target workstation.

In most cases in an enterprise network, there is a need to restrict access to certain information or resources, so access control protocols are used to secure sensitive information from unauthorized view.

You might be interested in
If a domain consists of dcs that are running versions of windows server earlir than windows server 2008, what replication method
xxMikexx [17]
I wish i knew and couldhelp u but i have no diea
5 0
3 years ago
Need answers for 11&12. Due today. Thanks.
GalinKa [24]
What is CAD?

Computer-aided design (CAD) is the use of computer programs or computer systems that aim to create, modify, analyze, optimize and document two or three-dimensional (that is 2D or 3D) graphical representations of physical objects as an alternative to manual drafts and product prototypes. It is widely used in electrical, mechanical, chemical engineering, among others. For example, it is used in electrical engineering to make electrical drawings regarding different projects such as Residential Projects, industrial projects, etc.

What are some of its advantages over other design systems?

CAD is widely used to increase the productivity of the designer as well as improve the quality of design, improve communications through documentation, and to create a database for manufacturing. 
It is used throughout the engineering process. From conceptual product design and layout through assembly analysis to manufacturing method definition. The method  CAD enables and ensures engineers to interactively test design variants with minimal physical prototypes to achieve: 

1. Lower product development costs
2. Greater speed
3. Increased productivity
4. Quality assurance 
5. Accelerated time-to-market

In this technological age, costs, productivity, speed, quality and time are topics very important to companies. These topics are optimized using CAD. Manual drafts and product prototypes translate into a poor productivity nowadays.

What is the difference between servicing and repair?

There are a lot of products that are designed to be fully serviceable and repairable. These products (such as a watch, smartphone, car, etc) are subjected to a wide variety of daily stresses and strains. When a part of the product needs replacing, this is a timely opportunity to ensure that any progressive wear and tear from external elements are addressed. By carefully assessing each product, checking its parts, addressing any worn parts or gaskets, ensures that the product is in perfect working order and that it always functions efficiently. This is related to service.
On the other hand,  if the product has been accidentally damaged, suffered a fault, then it is necessary to repair the product. This is related to repair
So, the difference between servicing and repair is that the first one is related to maintenance and the second one involves fixing things when the product is damaged.

Why are both important in technological products?

Creating the most popular product of the year will make consumers and investors happy. Many of the best-selling products were first in a new category. The purpose of the products is to continue to dominate their markets. So, it is important that they be easy for maintenance and hard to be damaged.
3 0
4 years ago
A must decode this code. I guess is not a Cesar. The last line is a email adress.
Pie
It is a text in Polish language.
Powiedz nam w czym jesteś dobry

Magento
Drupal
DjangoSymfony
Python
PHP
Zaznaczone?
Teraz wyślij formularz z konsoli przeglądarki:

require('jquery')[WON'T TRANSLATE THIS LINE BECAUSE IT IS IMMORAL-> YES, I AM A PROGRAMMER :)) ]



3 0
3 years ago
Q.No.3. A filling station (gas station) is to be set up for fully automated operation. Drivers swipe their credit card through a
scZoUnD [109]

Answer:

Following are the 5 problems, that can arise in this scenario:

Explanation:

  • When the driver swipes its credit or debit card, its connection with both the card company could not be formed due to the poor or ineffective development, therefore the driver may not put any fuel from its vehicle.  
  • It still wants to spend energy even after the card is read as incorrect.  
  • So, its total price to just be debited from the credit or debit card shall be much more and less than the real cost as well as the deduction of both the fuel should be overestimated.  
  • Its information may not adjust when a driver uses its device because the next driver could no matter how long only use the device.
  • Its fuel limit to also be established when the vehicle has stopped its card would be faulty as well as a certain restriction would not cause its device to be misused.
3 0
3 years ago
Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes to st
vovikov84 [41]

Answer:

#include <iostream>

using namespace std;

int main ()

{

int num;

cin>>num;

cout << num<< " " << 2 num << " " << numnum;

return 0;

}

Explanation:

See answer

5 0
3 years ago
Other questions:
  • When you divide a picture into thirds, how many parts do you end up with? *
    14·2 answers
  • The linux command _______ can be used to list the current disk devices connected to the computer.
    8·1 answer
  • What is the first step in the exchange between a web browser and a database?
    7·1 answer
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • By default, Outlook displays messages in the Content pane grouped by the
    13·1 answer
  • Suppose you decide to use the number of times you see any of the area codes of the places Yanay has been to in 50 spam calls as
    9·1 answer
  • Definition of Computer forensics?
    12·2 answers
  • In the earliest stages of human history, what was the only medium?
    10·1 answer
  • It is recommended that systems administrators analyze logs in order to determine if they have been altered because monitoring ca
    14·1 answer
  • Majken is turning 18 years old soon and wants to calculate how many seconds she will have been alive.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!