1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
4 years ago
5

What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view

sb .Mandatory Access Control (MAC)c .Role-Based Access Control (RBAC)d.Constrained user interfaces
Computers and Technology
1 answer:
Lorico [155]4 years ago
4 0

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

You might be interested in
Anyone willing to help with Excel?!!
anastassius [24]

Hi!

I have a slight understanding of excel, it depends on what you need.

8 0
3 years ago
A working model of a new product for testing purposes.
kotykmax [81]
Prototype is a working model for a product only for  testing purposes
6 0
3 years ago
What is pseudocode? O A way of describing a set of instructions in text form using plain english O A diagrammatic representation
Marat540 [252]

The definition of pseudocode is that; A: A way of describing a set of instructions in text form using plain English

<h3>What is Pseudocode? </h3>

In computer science, pseudocode is defined as a plain language description of the steps in an algorithm or another system.

Now, the way Pseudocode works is that it often makes use of structural conventions of a normal programming language to be utilized for human reading instead of machine reading.

Pseudocode usually omits details that are essential for machine understanding of the algorithm, such as variable declarations and language-specific code.

Read more about Pseudocode at; brainly.com/question/11623795

8 0
3 years ago
What is the function of ctrl+Q​
vlabodo [156]

Answer:

Ctrl+Q is used to remove a paragraph's formatting

Explanation:

Hope that's the answer you're looking for!

5 0
3 years ago
Consider the following code segment:
lesya [120]
Function demo {

If (value & gt;0);

If-else (...)

If-else (...)
}



I’m not on the computer right now but lemme know if this doesn’t work. Try going to inspect element on your html page and then console log and your issue should show their.
You may need to add a try and catch but idk.
8 0
3 years ago
Other questions:
  • What is the last step when creating a maintenance schedule? develop a reminder system read the manuals log the maintenance compl
    6·1 answer
  • All information is clearly identified and easy to find within the source
    15·1 answer
  • Describe each of the six steps of the selection process as illustrated in chapter 12
    13·1 answer
  • The ________ component of the five-component framework of an information system includes individuals who maintain the data and s
    5·1 answer
  • Fill in the blanks of the SQL Statements: Fund_Id VARCHAR(10) , Donor_id VARCHAR(10) , Count_Of_Receipts INTEGER, Total_Receipts
    15·1 answer
  • What is the build in libary function to compare two strings?​
    15·1 answer
  • In Word, the mailing list is known as the ​
    12·1 answer
  • describe at least five ways in which information technology can help studying subjects other than computing​
    6·1 answer
  • If you were creating a program that would convert Fahrenheit to Celsius, which kind of variable would you want to use? a string
    7·2 answers
  • Using a while loop, create an algorithm extractDigits that prints the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!