1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
2 years ago
13

What process identifies and grants access to a user who is trying to access a system? A. Credibility

Computers and Technology
1 answer:
xeze [42]2 years ago
8 0

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
You might be interested in
Discuss about the main frame computer​
Nimfa-mama [501]

Answer:

Mainframes (also called "big iron")[1] are powerful computers used for large information processingjobs. They are mainly used by governmentinstitutions and large companies for tasks such as census, industry and consumer statistics, enterprise resource planning, and financial transaction processing. Mainframe computers are specially used as servers on the World Wide Web (WWW). They are distinct from supercomputers.

7 0
2 years ago
You can us the (BLANK) symbol when you want to automatically add a set of numbers together in a spreadsheet
sleet_krkn [62]

Answer:

Σ

Explanation:

What symbol can you use when you want to automatically add a set of numbers together on excel?

✓ Σ This is the Greek letter Sigma. It is used to start the Autosum facility.

5 0
1 year ago
Jenny needs to record the names of 30 students, write down the subjects they studied, and note their grades in each subject afte
Marina86 [1]
The correct answer for this question is this one: "She can rename the 2 worksheet by right clicking the sheet tab. After right clicking the mouse, select Rename Sheet and type the preferred name of the sheet."  Hope this helps answer your question and have a nice day ahead.
5 0
3 years ago
Read 2 more answers
A programmer is debugging an action-adventure game they have just created.
svlad2 [7]

By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.

<h3>How does a programmer debug a program?</h3>

Debugging as defined in computer programming  is known to be a kind of a  multistep procedure which involves the act of knowing a problem, and also isolating the origin of the problem, and lastly one can correct the issue or know a way to work around the issue.

Note that the last step of debugging is to test the correction that was made or one can  workaround and make sure that it works or functions well.

Hence, By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.

Learn more about debug  from

brainly.com/question/15079851

#SPJ1

4 0
8 months ago
A(n) ________ is software and/or hardware that monitors system and network resources and activities and notifies network securit
enyata [817]

Answer:

intrusion detection system

Explanation:

intrusion detection system

IDS or the intrusion detection system is the software and/or hardware system which can be used to monitor for detecting suspicious network activities and monitoring the system and notifying teams when there are attempts to break the secure network infrastructure.

5 0
3 years ago
Other questions:
  • Create a dictionary named letter_counts that contains each letter and the number of times it occurs in string1. Challenge: Lette
    14·1 answer
  • Given a positive real number, print its fractional part.
    14·1 answer
  • .____________ is a way to identify and differentiate goods andservices through use of a name or distinctive design element.
    10·1 answer
  • Using JavaScript, how does a web page react when the user enters a wrong email ID in a registration form?
    9·1 answer
  • Simplify 0.2×0.03055 to 3 decimal places​
    15·2 answers
  • One of the functions of an IDE is to check for: flowchart errors. Syntax errors. memory errors X input and output.​
    12·2 answers
  • BRAINLIEST FOR CORRECT ANSWERS PLS HELP
    7·2 answers
  • Are there any apps in the App Store that allow people to ask a question about any topic and have skilled professionals answer it
    6·1 answer
  • What’s Discord Packing?
    8·2 answers
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!