1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katena32 [7]
3 years ago
14

Under which access control system is each piece of information and every system resource (files, devices, networks, and so on) l

abeled with its sensitivity level? A. Discretionary access control B. Resource access control C. Mandatory access control D. Media access control
Computers and Technology
1 answer:
Pani-rosa [81]3 years ago
7 0

Answer:

C. Mandatory access control

Explanation:

In the implementation of computer security, the mandatory access control (MAC) refers to the implementation of a security feature by operating systems. In this method, individual resource owners’ are unable to deny or grant permissions to a resources contained in a file. The criteria in a MAC when defined by the system administrator is implemented and enforced by the OS.

You might be interested in
What is the weirdest thing u saw at school asking teachers and students
patriot [66]
I walked in the bathroom and i see my friends showing eachothers butt.
Also i threw a bag of poop at my friend
5 0
3 years ago
Read 2 more answers
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
what properties are associated with all Microsoft Office files and include author, title, and subject
dolphi86 [110]
<span>The standard properties are associated with all Microsoft Office files and include author, title, and subject.
</span> <span>By default, </span>Microsoft Office<span> documents are associated with a set of these </span>standard properties.<span> They make it easier to organize and identify your documents. </span>
6 0
3 years ago
Which form of online communication happens in real time?
son4ous [18]

Answer:

texting? it happens in real time and is online.

5 0
2 years ago
Samantha was calculating a mathematical formula on an electronic spreadsheet. She used multiple values to recalculate the formul
Bezzdna [24]
<span>Random access memory. This problem requires you to know what the different types of memory are and their relative advantages and disadvantages. Let's look at them and see why 3 are wrong and one is correct. read-only memory: Otherwise known as ROM, this type of memory stores code that can't be over written. Used frequently for constant lookup values and boot code. Since it can't be written to by normal programs, it can't hold temporary values for Samantha. So this is the wrong choice. random-access memory: Otherwise known as RAM, this type of memory is used to store temporary values and program code. It is quite fast to access and most the immediately required variables and program code is stored here. It can both be written to and read from. This is the correct answer. hard disk: This is permanent long term readable and writable memory. It will retain its contents even while powered off. But accessing it is slow. Where the contents of RAM can be accessed in nanoseconds, hard disk takes milliseconds to seconds to access (millions to billions of times slower than RAM). Because it's slow, this is not the correct answer. But it's likely that Samantha will save her spreadsheet to hard disk when she's finished working with it so she can retrieve the spreadsheet later to work on again. compact disk: This is sort of the ROM equivalent to the hard disk. The data stored on a compact disk can not be over written. One way of describing the storage on a compact disk is "Write Once, Read many times". In most cases it's even slower than the hard disk. But can be useful for archiving information or making backups of the data on your computer.</span>
5 0
4 years ago
Read 2 more answers
Other questions:
  • Give the Linux bash pipelined command that would take the output of the "cat /etc/passwd" command (that lists the contents of th
    5·1 answer
  • Assume that a gallon of paint covers about 350 square feet of wall space. Create an application with a main() method that prompt
    9·1 answer
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • To change the caption for a field in a query, click the field in the design grid, click the ____ button on the Design tab, click
    14·1 answer
  • Please write down a java program for below instruction.Min-Heap: Construct a Min_Heap from the following set of integers. Rememb
    5·1 answer
  • Bitmap images are ________ into different software applications.
    9·1 answer
  • What is the meaning of compiler​
    14·1 answer
  • What do you understand by storage devices ? Name any two storage devices.​
    11·2 answers
  • Five technology tools and their uses​
    5·1 answer
  • Why are digital signals an accurate and reliable way to record and send information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!