1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
7

Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter

nal personnel based on their identity.
The access control protocol you put on that file would use which of the following?
Computers and Technology
1 answer:
patriot [66]3 years ago
8 0

Answer:

Discretionary Access Control ( DAC )

Explanation:

  • To achieve the required type of functionality on the document Discretionary Access Control ( DAC ) protocol can be used.
  • As the name suggests this protocol has restricted access that means not all the people has the access for the document / object and also it is discretionary, so the administrator ( owner ) can setup the rights for different individuals to access the document / object based on the requirements.
  • A user with access to the document / object can give access to another user.
You might be interested in
The total revenues for a company are $150,223 and the total expenses were 125,766. If you are calculating the net income, which
krok68 [10]

Answer :

Net income =total revenue - total expenses

Net income =150223-125766

Net income =24457

In spreadsheet :

Total revenue = b2

Total expenses = b3

Net income will write in cell b4

So write formula in b4 to find net income :

=b2-b3

And press enter key to show your answer.

7 0
3 years ago
Who is the best Attack on Titan Character?
lions [1.4K]

Answer:

Levi

Explanation:

Levi is just a massive W of a character

4 0
3 years ago
Read 2 more answers
Write a program that prompts the user to enter a point (x, y) and checks whether the point is within the rectangle centered at (
Serga [27]

Answer:

## http://pastebin.com/nQWtHb3B

#use above link for formatted program #Python3

c=[float(cord) for cord in input('Enter a point with 2 coordinate :').split(' ')]

base=[0,0]

w=10

h=5

if((abs(c[0]-base[0])<= float(w)/2) and (abs(c[1]-base[1])<= float(h)/2)):

print('Point (',c[0],', ',c[1],') is in the rectange')

else:

print('Point (',c[0],', ',c[1],') is not in the rectange')

5 0
2 years ago
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential infor
Alex_Xolod [135]

Answer:

eavesdropping

Explanation:

Eavesdropping is as an <em>electronic attack</em> where digital communications are intercepted by an individual whom they are not intended. This is done in two main ways: <em>Directly listening</em> to digital or analog voice communication or the <em>interception or sniffing</em> of data relating to any form of communication.

4 0
3 years ago
What component uses thermal paste to attach the heat sink?
natka813 [3]

Answer:

Thermal Compound/Thermal Grease

Explanation:

Thermal compound, also known as thermal paste and thermal grease, is a material used to fill the microscopic gaps between a computer's CPU and its heat sink. Thermal compound significantly increases the heat sink's ability to cool the CPU, allowing the CPU to run at a higher speed and improve system performance.

6 0
3 years ago
Other questions:
  • The main parts of a lever are the....
    6·2 answers
  • In an AND truth table.
    7·1 answer
  • A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he
    7·1 answer
  • What is the difference between word processing software and email?
    12·2 answers
  • A _________ is a component commonly used in an analog pressure gauge. Use letter keys to select choices A microprocessor B press
    8·1 answer
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • Select the correct answer from each drop down menu
    8·2 answers
  • 1. What are you going to do if someone ask for your personal information online?​
    12·2 answers
  • Which statements about editing an existing Contact in Outlook are true? Check all that apply.
    9·2 answers
  • Which option is typically only used when utilizing self joins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!