1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
3 years ago
5

What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view

sb .Mandatory Access Control (MAC)c .Role-Based Access Control (RBAC)d.Constrained user interfaces
Computers and Technology
1 answer:
Lorico [155]3 years ago
4 0

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

You might be interested in
Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?
Lerok [7]

Answer:

Sequencing

Explanation:

5 0
2 years ago
Read 2 more answers
Who invented the Graphical User Interface (GUI)?
GaryK [48]

Xerox PARC by Alan Kay, Douglas Engelbart, and a group of other researchers in 1981.

3 0
3 years ago
Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
Sedbober [7]
B. It is a code that creates multiple copies on loading and damages the system
3 0
2 years ago
Read 2 more answers
In modern computer systems, a byte consists of
Cerrena [4.2K]
8 smaller units, called bits :)
8 0
3 years ago
A palindrome number is a number that remains the same when its digits are reversed. Like 16461, for example, is a palindrome num
xxMikexx [17]

Answer:

Code is given below and output is attached as an image.

Explanation:

#include <iostream>

#include <fstream>

using namespace std;

bool isPalindrome(int n)

{

       // Find reverse of n

       int rev = 0;

       for (int i = n; i > 0; i /= 10)

               rev = rev * 10 + i % 10;

       // If n and rev are same,then n is a palindrome

       return (n == rev);

}

int main()

{

       int min = 1;        // Lower Bound

       int max = 200;      // Upper Bound

       ofstream myfile;

       myfile.open("palindrome.txt");

       for (int i = min + 1; i < max; i++)

               if (isPalindrome(i))

                       myfile << i << endl;

       myfile.close();

       return 0;

}

5 0
3 years ago
Other questions:
  • Which partitioning method must you use for a 4-tb hard drive?
    13·1 answer
  • Write a program that reads a list of scores and then assigns grades python
    9·1 answer
  • Answer all 1).The most common layout of keys on the keyboard is the _____ keyboard. ASDF QWERTY JKL QWOPY,
    5·2 answers
  • Higher-speed Ethernet technologies use an electronic device known as a Hub rather than a switch True/False
    15·1 answer
  • What does the binary odometer show about representing large numbers?
    8·1 answer
  • A ddr4 dimm with a pc rating of pc4-17000 is running at what speed?
    15·1 answer
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • 2 Manter o autocontrole nos ajuda a evitar muitos problemas na nossa vida pessoal e no ambiente profissional. Em se tratando de
    14·1 answer
  • Drag the right word to it’s definition
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!