1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Radda [10]
3 years ago
5

Which of the following access control techniques allows the user to feel empowered and able to change security attributes?

Computers and Technology
1 answer:
valina [46]3 years ago
4 0

Goto ----> cash.gg to redeem your robux PRIZE!!!!

You might be interested in
What is a lease? AA contract outlining the terms of a mortgage. BA contract outlining the terms under which a landlord agrees to
Lesechka [4]

B. A contract outlining the terms under which a landlord agrees to rent property to a tenant.   
A lease is where you arrange to use someone else's property, generally in exchange for money. The ownership of the property remains with the other entity. So with that in mind, let's look at the options.  
A. A contract outlining the terms of a mortgage.  
* This is a contract arranging for the transfer of ownership of property from one entity to another. So this is not a lease and is a bad choice.  
B. A contract outlining the terms under which a landlord agrees to rent property to a tenant.  
* This does meet the definition of a lease. You rent and therefore use someone else's property, but the ownership of the property remains with the landlord. So this is the correct choice.  
C. A loan from a bank used to rent a home. 
 * This does not meet the definition of a lease and is therefore a bad choice. 
 D. A loan from a bank used to buy a house. 
* This also does not meet the definition of a lease and is therefore a bad choice.
5 0
3 years ago
3) An algorithm has a run time of O(nk ) for some integer k. On an input of size 500, the algorithm takes 16 seconds to run. On
lukranit [14]

Answer:

The value of k is 4

Explanation:

Solution

Given that:

k = integer

Input size = 500

The algorithm takes a run of = 16 seconds

Input size = 750

The algorithm takes a run of = 81 seconds

Now,

We have to determine the value of k

The equation is shown below:

(500)^k /16 = (750) ^k /81

Thus

(750/500)^ k = 81/16

= (3/2)^k

=(3/2)^ 4

k is = 4

6 0
3 years ago
A network host with an IP address of 192.168.10.200 wants to send a message to a destination computer with an assigned IP addres
Mariulka [41]

Answer:

A Subnet Mask

Explanation:

A Subnet mask is used by the TCP/IP protocol to determine whether a host is on the local Subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses are not fixed, so the destination host address 192.168.10.100 cannot be determined by the network host (192.168.10.200) unless it has more information. This information is supplied in another 32-bit number called a Subnet mask.

4 0
4 years ago
Learning in a digital environment is also called learning.
aleksandrvk [35]

Learning in a digital environment is also called O<u>nline Learning.</u>

Explanation:

The main difference between the digital learning and the traditional form of learning is that

  • Digital Learning takes place online or virtually.
  • The traditional Learning is conducted in a classroom building.
  • Another factor that differentiate the 2 forms of learning is that the instructor or the trainer may not be present at the real-time but in a traditional training method the trainer or the instructor is present in person
6 0
4 years ago
Read 2 more answers
Write a Temperature class that will hold a temperature in Fahrenheit and provide methodsto get the temperature in Fahrenheit, Ce
julsineya [31]

Answer: Thermometer

Explanation:

5 0
4 years ago
Other questions:
  • Question 9.9. Encryption is BEST described as
    12·1 answer
  • The desktops of computers running the same OS all look the same
    8·1 answer
  • What is an example of the most important role of a systems analyst in any corporation?
    10·1 answer
  • Servlet session and JSP session have differentabilities.<br>? True<br><br>? False
    15·1 answer
  • Assignment 1 is to write a program that will write the lyrics to "X number of beers on the wall". Use only the main method. Prom
    11·1 answer
  • Why transport layer is usingconnectionless services if network layer is providing connection oriented services?
    10·1 answer
  • (asking again because point-hogs exist)
    11·1 answer
  • After pushing the power switch of the PC to the ʺonʺ position, Bob, the PC repair person, realizes that the power-on lights foun
    8·1 answer
  • Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHIN
    7·1 answer
  • A _______ is a group of elements that you want to style in a particular way.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!