1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marizza181 [45]
3 years ago
6

In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?

Computers and Technology
1 answer:
max2010maxim [7]3 years ago
8 0

Answer:

The answer is "It uses the section access with in the qlikview script".

Explanation:

QlikView is now QlikSense, it comes with section access, that protects against this danger. It a way of determining, which can display certain details, it is also known as objects, that can be displayed by whom and out of which domain, etc.

  • It can also be configured using the publishing of the company. In the data load script, users can use section access to maintain security.  
  • It uses the data for authentication and authorization within segment access and automatically decreases the information, such that users only have their information.
You might be interested in
Which of the follow represents a form of disruptive technology? Tend to open new markets and destroy old ones A new way of doing
RSB [31]

Answer: All of the above are included

Explanation: Disruptive technology is the created for the manipulation of the business operations and related components significantly.It works by changing the habits of the business system by its more superior standards and ways.

The opening of new market to eliminate the older market, invoking in the marketplace for cheap range of goods and making a new strategy that does not fulfill the demand of the customer are disruptive strategy as they change the regular way of business operation through their techniques.

4 0
3 years ago
What technological changes at the turn of the twentieth century affected american life?
daser333 [38]
The technological changes at the turn of the twentieth century that affected American life include the rise of the internet and mobile devices. The internet signaled the opportunity for immediate access of information. Paired with mobile technology, Americans were able to communicate almost instantly.
5 0
3 years ago
____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
aleksley [76]

Answer: Spread spectrum

Explanation:

In spread spectrum the data to be transmitted is spread over a wider bandwidth rather than fixed bandwidth.

4 0
4 years ago
Which device makes telecommunications possible?
Dmitrij [34]
A. modem or d. voice input. Not a port because a port allows one to insert a peripheral device but not really communicate. I have no idea what an expansion slot is. It could be d. voice input because this allows a person to hold an audible conversation.

But  I'd go for modem because a modem lets you connect devices like laptops, tablets, phones, computers etc. and share data between them. So things like mailing are possible (I THINK)!  <span />
7 0
3 years ago
Element primer a partir del qual es generarà l'energia central solar fotovoltaica
Juliette [100K]
No speak a Spanish ............
7 0
3 years ago
Other questions:
  • Hands-on Assignment To these assignments, refer to the tables in the JustLee Books database. Generate and test two SQL queries f
    10·1 answer
  • What are strategies that you can use to yield web sites that are relevant to your research topic?
    13·1 answer
  • Which programming component provides a temporary, named storage location in computer memory that cannot change during program ex
    6·1 answer
  • Employees of Bodegas &amp; Bistros Inc. (2B) maintain a password-protected social media page to "vent about work." When 2B learn
    12·1 answer
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • A domain name is used to: *
    15·1 answer
  • Of the following choices what was the best thing to do with electronic equipment you no longer want
    7·1 answer
  • Turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is n
    11·1 answer
  • Olivia wants to change some settings in Outlook. What are the steps she will use to get to that function? open Outlook → File →
    7·2 answers
  • describe the role and importance of computers in New Media. Prepare a report on increasing interest and impact of mobile phones
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!