1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
5

What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view

sb .Mandatory Access Control (MAC)c .Role-Based Access Control (RBAC)d.Constrained user interfaces
Computers and Technology
1 answer:
Lorico [155]3 years ago
4 0

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

You might be interested in
What is the difference between arithmetic and relational operators​
denpristay [2]

Answer:

The arithmetic operator is used by the program to perform simple algebraic operations like addition, subtraction, multiplication, division, etc. Relational operators are the ones that are used to validate a relationship between the two operands as if they are equal, greater than, less than, etc.

4 0
2 years ago
Which is a key component to participating in a school-to-work program? A. Dual enrollment opportunities B. Community service opp
PtichkaEL [24]
The answer is D. Job shadows
5 0
3 years ago
Read 2 more answers
____ will find all records where there is any entry in the field, even if the entry is 0.
Reil [10]
Answer : IS NOT NULL
4 0
3 years ago
Your computer is once again out of hard drive and you want to see which folders are consuming the most space on your drive. Whic
sertanlavr [38]

Answer:

I would say cclrearner

Explanation:

This is what helped me with my computer so it may help you but try which one works for you

7 0
3 years ago
Which type of join is used to show all the entries in the table containing the primary key regardless of whether that
Veronika [31]

Answer:

C)inner or

A)inner for edg 2021

Explanation:

my bad inner might be wrong. Wrong question

5 0
3 years ago
Read 2 more answers
Other questions:
  • A student has five college classes and has to complete reports or projects for each class. The student is in his sophomore year
    15·2 answers
  • What is the output of the following C++ program?
    15·1 answer
  • Which tab is used to insert a hyperlink onto a slide?
    9·1 answer
  • Modify the sentence-generator program of Case Study so that it inputs its vocabulary from a set of text files at startup. The fi
    15·1 answer
  • Explain the strengths and weaknesses you have experienced with content information
    10·1 answer
  • Consider the following code snippet:
    13·1 answer
  • Send me the answers<br>​
    15·1 answer
  • 2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute cons
    9·1 answer
  • Whats the best way to make a video game?
    14·1 answer
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!