1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
13

What process identifies and grants access to a user who is trying to access a system? A. Credibility

Computers and Technology
1 answer:
xeze [42]3 years ago
8 0

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
You might be interested in
Explain the differences between developing codes for open-ended questions and for closed ended questions
fenix001 [56]
What is the difference between open ended and closed ended questions?<span>Close-ended questions are those which can be answered by a simple "yes" or "no," while open-ended questions are those which require more thought and more than a simple one-word answer</span>
3 0
3 years ago
What are some useful applications of video games?
vekshin1

Answer:

Steam, Origin, Uplay and epic games

Explanation:

8 0
3 years ago
Web page typically contains _______, which contains the formatting instructions for displaying the web pag
MatroZZZ [7]

The answer in the blank is HTML or also referred to as Hypertext Markup Language as this is always included with the World Wide Web pages for they are always essential and needed. It is because it is a standardized system that would help the resources of the internet that is to be displayed on the page.

6 0
3 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
Karo-lina-s [1.5K]

Answer:

Option 3 i.e., Z-Wave.

Explanation:

The Z-Wave device should be purchased by the company because It is a standard for connectivity, used mainly for smart home devices that use the 2.4 GHz RF band and this is also that device which the company wanted for the 50 meters away from the base station.  

So, It is a device should be purchased by the company.

Other options are incorrect because those devices not accomplish the following requirements.

7 0
3 years ago
One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet co
Natasha2012 [34]

Answer:

True

Explanation:

Using personal computers for internet access has various advantages because of the physical attributes of these computers. One of the major reason that it is good for internet access is its large screen. The large screen allows things to be easily viewed and read. Also, personal computers have a keyboard that helps for easy data entry, as opposed to pads, and other types of devices that may have just touch-pad and data entry may be difficult.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function named print_backward that accepts a String as its parameter and prints the characters in the opposite order. Fo
    12·1 answer
  • A(n) _______ is text or a graphic you can click to jump to another file or to somewhere else in the same file. quizle
    12·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • In Excel, ____ is/are used to place worksheet, column, and row titles on a worksheet.
    11·1 answer
  • Because floating points have decimals, they're more precise and take up more memory than integers.
    6·1 answer
  • If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to
    11·1 answer
  • Name of the electrical tool and their classification
    10·1 answer
  • Look at the slide. How could the slide best be improved? By reducing the number of visual aids by increasing the font size by da
    6·2 answers
  • What is the difference between a threat and an attack?
    7·1 answer
  • Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!