1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
7

Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter

nal personnel based on their identity.
The access control protocol you put on that file would use which of the following?
Computers and Technology
1 answer:
patriot [66]3 years ago
8 0

Answer:

Discretionary Access Control ( DAC )

Explanation:

  • To achieve the required type of functionality on the document Discretionary Access Control ( DAC ) protocol can be used.
  • As the name suggests this protocol has restricted access that means not all the people has the access for the document / object and also it is discretionary, so the administrator ( owner ) can setup the rights for different individuals to access the document / object based on the requirements.
  • A user with access to the document / object can give access to another user.
You might be interested in
In order to access the internet, it is not necessary to have an Internet Service Provider (ISP).
loris [4]

Answer:

False!

Explanation:

You <em><u>have</u></em> to have an Internet Service Provider in order to access the internet! (I also got this right in my test)

<em><u>Hope this helps :]</u></em>

8 0
3 years ago
Read 2 more answers
Discuss different ways to respond to errors, such as notifying the user onscreen, writing to an error log, notifying the develop
Ronch [10]

Answer:

Notifying the errors is always useful .

Explanation:

The errors should always be notified to the developer. It is useful and is important. When we provide notifications on the screen, it helps the user and it can be used to provide feedback. In regard to developmental work, it has to be important and confidential and we use the help of email to inform or notify errors to the organization. This will help the company from negative criticism and helps the company perform better. We can also write an error log when we face the same error again and again even after notifying the developer organization. This helps to put a reminder to the organization that immediate check has to be dome and eliminate the error from the source.

Some disadvantages are if we do not keep timer implementation, the alert keeps on popping on the screen, which is irritable.

4 0
3 years ago
Susan is a network administrator and is setting up her company's network. In the process to determine an open port on a firewall
Dovator [93]

Answer:

poop head is big butt

Explanation:

soorru

4 0
2 years ago
Consider a sequence of 1's and 1's with the property that the sum of any prefix of the sequence is never negative For example th
MrMuchimi

Answer:

Check the explanation

Explanation:

Answer: Solution: Algorithm:

Step 1: Start.

Step 2: Create a stack Step

3: Push an initial stack variable, it will represent that, stack is empty.

Step 4: Get input

             If +1 then push "+1"

             Else if -1 then pop

Step 5: Repeat until all input finish or Stop if empty stack variable popped. Step 6: Stop.

It is a pushdown automata problem.

It can be also represented as:

X =1+1* —1* 1No(+1)>= No(-1)}

4 0
3 years ago
David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..............................................
Tcecarenko [31]

Answer:

David spent $6.24.

Explanation:

5.2 times 1.2

3 0
3 years ago
Other questions:
  • ________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of the
    5·1 answer
  • What term is used to describe the harassment of computer users through various forms of internet communications?
    5·1 answer
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
    9·1 answer
  • g Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator
    10·1 answer
  • What is the smallest amount of information called?
    13·2 answers
  • What are the four steps of the research process?
    13·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
  • Cómo surge y cuál es el objetivo del observatorio de radio y televisión
    11·1 answer
  • Please say me the answer fast its really urgent........ ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!