1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
6

In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
8 0

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

  • It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  
  • It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.
You might be interested in
1. Given two numbers, n and k ( 0< n, k <=12), generate all the pemutations taking k letters from n letters (nPk) consider
mixer [17]
It is 5jsjsjdhhdhdhdhdhdhdhdhdhd
8 0
3 years ago
In the United States there are more women than men, but women are referred to as a minority group? Why are they considered a min
ziro4ka [17]
Cause they make up half the population of the united states of america
7 0
3 years ago
Read 2 more answers
You are writing an email to a potentional employer about a job opportunity. What can you do to make sure the email reflects your
Lina20 [59]
You want to use proper etiquette and be polite, do not call them by their first name and always refer to them as Mr., or Mrs. Use an extended vocabulary and do not talk about yourself.  If you have proper grammar, depending on the job, that can be seen as intelligence. And always use an appropriate closing that is respectful. Such as, Sincerely, John Doe.
4 0
3 years ago
Read 2 more answers
Explain use of information and communication technology in our daily life.
lions [1.4K]

Answer:

It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.

<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>

4 0
3 years ago
A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic.
zzz [600]

Answer:

Search Engine

Explanation:

A search engine is used to crawl most of the web sites based on there content (mostly defined in metadata tag in web pages) in order to search information according to the given query submitted by user. Search Engine will then provides a list of matched results that user want to find.

3 0
3 years ago
Other questions:
  • The _____ is a computer-based test that measures the degree to which you associate particular groups of people with specific cha
    13·1 answer
  • When it comes to saving money, what is a good rule of thumb?
    5·2 answers
  • Being able to express your thoughts in an email is a primary technology skill. True or False
    8·2 answers
  • Which is a good technique for effectively proofreading your presentation?
    7·1 answer
  • Write a client program that writes a struct with a privateFIFO name (call it FIFO_XXXX, where XXXX is the pid that you got from
    11·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label?
    10·2 answers
  • In the language of the World Wide Web, "this page cannot be displayed" means A. your computer's software is damaged. B. the ISP
    10·2 answers
  • 12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the
    8·1 answer
  • Time shifting occurs when
    8·2 answers
  • The network backbone
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!