1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
6

You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database.

It is considered a security risk. What is an appropriate action to reduce the risk?
Computers and Technology
2 answers:
elena-s [515]3 years ago
7 0

Answer:

Authorization levels (privileges) need to be set for the users in the company.

Explanation:

Users need to be classified according to their departments and their position. Each group should see only <em>related</em> data, so their authorizations need to be done accordingly.

Also managers and staff should have different levels of reach to the data. Thus their privileges should set accordingly.

NeX [460]3 years ago
7 0

Answer:

Restrict access privileges on a "<em>need to know"</em> basis.

Explanation:

Every user on the company should have assigned one or more roles based on their work location, activities and/or department.

Then data on the database must have the access permissions restricted to the corresponding roles.

For example a "sales" role might have read and write access to the <em>clients </em>data, but only read access to <em>products </em>data.

You might be interested in
Type the correct answer in the box. Spell all words correctly. How is it possible to access data from any location? Storing data
romanna [79]

Answer:

optical

Explanation:

The earliest of these was the magnetic device. Computer systems began with magnetic storage in the form of tapes (yes, just like a cassette or video tape). These graduated to the hard disk drive and then to a floppy disk.

5 0
3 years ago
3<br> Select the correct answer.<br> What is the output of the following HTML code?<br>Please
maw [93]

Answer: or element_id Specifies the relationship between the result of the calculation, and the elements used in the calculation

form form_id Specifies which form the output element belongs to

name name Specifies a name for the output element

Explanation:

7 0
3 years ago
Read 2 more answers
See if you can do better then I did
never [62]

Answer:

no i can't do better ggs

Explanation:

im not smart (also I did answer the question ;) )

8 0
2 years ago
The following image shows the number of orders Company A received in 2015-2020. A financial analyst wants to calculate the year-
abruzzese [7]

The step that the analyst take to apply the same formula to all adjacent years using the Macabacus’ Fast Fill Right shortcuts  is the use of the  Macabacus Excel Add-in.

<h3>What are the feature in the Formulas menu of the Macabacus Excel add-in?</h3>

The Macabacus Excel Add-in is known to be a formula auditing tools that aids  one to be able to know and correct any kinds of errors and other forms of inconsistencies in the financial models.

Note that it is one that tends to bring up the speed of the modeling process. The Excel add-in is a tool that aid the users to make some reliable links between the financial model and that of the PowerPoint or Word documents.

Hence, The step that the analyst take to apply the same formula to all adjacent years using the Macabacus’ Fast Fill Right shortcuts  is the use of the  Macabacus Excel Add-in.

Learn more about Macabacus from

brainly.com/question/1538272

#SPJ1

8 0
1 year ago
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Als
nika2105 [10]

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

6 0
3 years ago
Other questions:
  • You can type notes of what to cover when presenting the show in the______ pane.
    15·1 answer
  • what evidence supports the claims that the Taj Mahal is a symbol of historical and cultural glory as well as an architectural ma
    8·1 answer
  • What is connectivism and how does it apply to online learning?
    7·1 answer
  • Which group on the Home Tab allows you to add shapes to a PowerPoint slide?
    9·2 answers
  • Write a c++ program to calculate the approximate value of pi using this series. The program takes an input n that determines the
    13·1 answer
  • How is the bootstrap program started?
    6·2 answers
  • ________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
    14·1 answer
  • What are the four different orchestral instrument families?
    6·2 answers
  • Direction: Read each item carefully and choose the letter of the correct answer. Write your answers on a separate sheet of paper
    12·1 answer
  • Name various input and output devices used with computers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!