1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
2 years ago
5

Which of the following access control techniques allows the user to feel empowered and able to change security attributes?

Computers and Technology
1 answer:
valina [46]2 years ago
4 0

Goto ----> cash.gg to redeem your robux PRIZE!!!!

You might be interested in
Write a function called PayLevel that returns a level given an Ssn as input. The level are: "Above Average" if the employee mak
kotykmax [81]

Answer:

Explanation:

Since no further information was provided I created the PayLevel function as requested. It takes the Ssn as input and checks it with a premade dictionary of Ssn numbers with their according salaries. Then it checks that salary against the average of all the salaries and prints out whether it is Above, Below, or Average. The output can be seen in the attached picture below.

employeeDict = {162564298: 40000, 131485785: 120000, 161524444: 65000, 333221845: 48000}

average = 68250

def PayLevel(Ssn):

   pay = employeeDict[Ssn]

   print("Employee " + str(Ssn) + " is:", end=" "),

   if pay > average:

       print("Above Average")

   elif pay < average:

       print("Below Average")

   else:

       print("Average")

PayLevel(161524444)

PayLevel(131485785)

7 0
2 years ago
Natural language generation is focused on?
Mila [183]

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

<em>-</em><em> </em><em>BRAINLIEST</em><em> answerer</em>

6 0
3 years ago
What standard provides a greater degree of security by implementing port-based authentication and blocks all traffic on a port-b
vekshin1

Answer:IEEE 802.1x

Explanation:IEEE(institute of electrical and electronics engineering) is a foremost professional institute/body for electrical and electronics engineering. IEEE 802.1x is the standard developed by IEEE for port based network access control. It was developed to ensure that the client is protected against hackers and Cyber attacks,it can only be open for access after the Client authenticates according to the credentials stored on the authentication server.

5 0
3 years ago
Read 2 more answers
What are the SPEC benchmarks?
Sloan [31]

Answer: Answer

Explanation: benchmarks designed to test the CPU performance of a modern server computer system. It is split into two components, the first being CINT2006, the other being CFP2006 (SPECfp), for floating point testing. SPEC defines a base runtime for each of the 12 benchmark programs

3 0
3 years ago
What are the uses of standalone PCs?
Charra [1.4K]

Answer:

A personal computer that doesn't share network

Explanation:

A desktop or laptop computer that is used on its own without requiring a connection to a local area network (LAN) or wide area network (WAN). Although it may be connected to a network, it is still a stand-alone PC as long as the network connection is not mandatory for its general use.

5 0
3 years ago
Other questions:
  • What are color highlights?
    8·2 answers
  • 1. W jaki sposób można wyrównać tekst po wstawieniu tabulatora?
    6·1 answer
  • Henry has to create software that manages a database of all his clients of his firm. He wishes to run software on another comput
    10·2 answers
  • Most V-type engines use two _______, one attached to each cylinder head.
    11·1 answer
  • In understanding "controlling for" a third variable, which of the following is a similar concept? a. Conducting a replication b.
    10·1 answer
  • True or false?
    15·2 answers
  • Which of the following are common data types? Check all that apply.
    6·1 answer
  • What is IBM compadibles
    5·1 answer
  • You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface elemen
    14·1 answer
  • What is the definition of overflow in binary?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!