1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
7

Although you are not a full administrator, you are asked to manage a protected document, allowing customized access to any inter

nal personnel based on their identity.
The access control protocol you put on that file would use which of the following?
Computers and Technology
1 answer:
patriot [66]3 years ago
8 0

Answer:

Discretionary Access Control ( DAC )

Explanation:

  • To achieve the required type of functionality on the document Discretionary Access Control ( DAC ) protocol can be used.
  • As the name suggests this protocol has restricted access that means not all the people has the access for the document / object and also it is discretionary, so the administrator ( owner ) can setup the rights for different individuals to access the document / object based on the requirements.
  • A user with access to the document / object can give access to another user.
You might be interested in
_____ is an information-analysis tool that involves the automated discovery of patterns and relationships in a data warehouse.
Tema [17]
Data mining is an information analysis tool that involves the automated discovery of patterns and relationship in the data warehouse.
<span />
7 0
3 years ago
Initially, later, and finally are examples of what kind of words
Klio2033 [76]
Im pretty sure that the correct answer is Transition words.
3 0
3 years ago
• The technical support department at your company has informed you that you will be receiving a new computer within the next we
alexdok [17]
1) back up your data
2) delete any personal information
3) clear cookies, browsing data, and saved passwords
4) restore any settings you may have changed to original settings
6 0
3 years ago
Select the best option that should be considered when preparing these images to.be used for the web
DerKrebs [107]
The answer is 1) JPEG  2) TIFF   3) BMP.  
<span>The best option that should be considered when preparing these images to.be used for the web :
</span>1) JPG (jpeg) - Used to compress web images to a small file size without
    sacrificing quality
2) TIFF (tiff) - Used for professional print images to save in a uncompressed 
     file format at high resolution.
3) BMP - Used for either web or print because of the ability to save high
    quality images ether compressed or uncompressed.
6 0
3 years ago
Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and internet communic
Naily [24]

Answer:

Fiber-optic cable

Explanation:

Before the cable industry transitioned to fiber-optic cables, for many years, the standard cables used for telephone, cable, and internet communications were coaxial cables. The transition was made possible because the architecture of the fiber-optic cable came with a higher capacity, more extensive bandwidth link. Unlike the coaxial or the twisted pair cable, the fiber-optic is made from glass strands that transmit light signals much quicker and to greater distances. This makes fiber-optic cables the fastest high capacity data transfer link than any other cables to ever exist.

3 0
3 years ago
Other questions:
  • Consider the following recursive method, which is intended to return a String with any consecutive duplicate characters removed.
    11·1 answer
  • Access Control can be defined as putting controls (or countermeasures) in place to help achieve information security goals. Whic
    13·2 answers
  • 1. In your own words, describe the purpose of a for a loop.
    11·1 answer
  • Define the following term. data, database, DBMS, database system, data- base catalog, program-data independence, user wen', DBA,
    12·1 answer
  • Is an electronics standard that allows different kinds of electronic instruments to
    12·1 answer
  • How many times do you return after the dateline ?
    12·1 answer
  • After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password
    10·1 answer
  • An IP address specifically belongs to:
    10·1 answer
  • The unit we use to measure bending moment is...<br> A kg<br> B N<br> C Nm<br> D MPa
    13·1 answer
  • The federal communications commission oversees the programming of which entities?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!