1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natalija [7]
3 years ago
8

You are the administrator of a Windows network. When creating a new user account, you specify a security clearance level of top

secret so that the user can access classified files. What type of access control method is being used?
Computers and Technology
1 answer:
dezoksy [38]3 years ago
4 0

Answer:

MAC (Mandatory access control)

Explanation:

Mandatory access control is a type of access control.MAC is a strategy that are defined by system administration. MAC access is controlled by administration.  Administrative security access training, security awareness , written policies and procedures, incident response plan , agreements and background checks.                        

You might be interested in
write a program in python to input 3 sides of a triangle. check if the triangle is equilateral, isosceles or scalene. use logica
hjlf
<h2>Type of Triangle - Python</h2>

In Geometry, a triangle is a three-sided polygon with three edges and three vertices. A triangle with vertices A, B, and C denoted ∆ABC.

<h3>Equilateral Triangle</h3>

A triangle is said to be an EQUILATERAL TRIANGLE if all the sides are equal in measure.

<h3>Isosceles Triangle</h3>

A triangle is said to be an ISOSCELES TRIANGLE if any two sides are equal in measure.

<h3>Scalene Triangle</h3>

A triangle is said to be a SCALENE TRIANGLE if none of the sides are equal in measure.

<h3>Here's our program:-</h3>

a = float(input("Enter the length of the first side of a triangle: "))

b = float(input("Enter the length of the

second side of a triangle: "))

c = float(input("Enter the length of the third side of a triangle: "))

if (a == b and b == c and c == a):

print("Equilateral Triangle.")

elif (a == b or b = c or c == a):

print("Isosceles Triangle.")

elif (a != b and b !=c and c != a):

print("Scalene Triangle.")

<h3>else:</h3>

print("Invalid Input.")

6 0
2 years ago
The 169.254.78.9 ip address is an example of what type of ip address
scoundrel [369]
As specified in RFC5735, this is an address from the "link local" block. It is assigned to a network interface as a temporary address, for instance if no static address is configured and the DHCP server is not found.

If you boot your PC without a network cable, you'll probably end up with a 169.254.*.* address.
8 0
3 years ago
​Browser-based database applications differ from traditional applications in that they​ ________.
alukav5142 [94]

Answer:

The correct option to the following question is option A.

Explanation:

Traditional database system is also known as the data warehouses and the relational database system which have been primary way organizations and the businesses have analyzed and stored their data and information for past 20 to 50 years. Traditional application of database systems are designed from ground up to the work with the data that has the primarily structured data.

A Web database or a browser-based database is the database application which is designed for accessed and managed from the Internet. Website or browser operators can be manage the collection of present analytical results-based and data on the data in the Browser-based database application.

8 0
3 years ago
In the following scenario, which is the least
mario62 [17]

Answer:

Size

Explanation:

Connectivity, they need internet to work.

Speed, they need it to work fast.

Storage, they need space to work.

Size, isn't all that important, unlike the rest.

7 0
3 years ago
Which view allows you to make changes to the content of your presentation?
Neporo4naja [7]

Answer:

Share your screen and edits the parts you want. What meet are you using, zoom or something else?

6 0
3 years ago
Other questions:
  • Skylar is viewing her personal and business calendar in a side-by-side fashion, but she would like to view a single calendar tha
    6·1 answer
  • What happens as the key length increases in an encryption application?
    8·1 answer
  • A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9,
    7·1 answer
  • You are given a list of n positive integers a1, a2, . . . an and a positive integer t. Use dynamic programming to design an algo
    10·1 answer
  • When a business is using methods that help it use its time and resources the best they can, what are they exercising?
    11·2 answers
  • Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
    11·1 answer
  • The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices
    11·1 answer
  • This is a python program.
    6·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!