1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
finlep [7]
4 years ago
5

What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view

sb .Mandatory Access Control (MAC)c .Role-Based Access Control (RBAC)d.Constrained user interfaces
Computers and Technology
1 answer:
Lorico [155]4 years ago
4 0

Answer:

Constrained user interfaces is the correct answer to the following question.

Explanation:

Because Constrained user interfaces are the secured function that is used for controlling the access of the user to the computer system and also confines the user to access the data but they can access only that data for which they are not restricted. In other words, Constrained user interfaces is that type of restriction for those users who access your data or resources and they can access only that part of data for which they are allowed.

You might be interested in
1. Provide Java code for a simple class of your choice. Be sure to include at least one constructor, two methods and two fields.
Ivanshal [37]

Answer:

Explanation:

public class Main

{

public static void main(String[] args) {

 System.out.println("Test Class:");

 Name name = new Name("Dayanand","Ghelaro");

 System.out.println("First Name : "+name.getFirstName());

 System.out.println("Last Name : "+name.getLastName());

}

}

class Name{

   private String firstName;   // first name field

   private String lastName;    // last name field

   public Name(String firstName, String lastName){

       this.firstName = firstName;

       this.lastName = lastName;

   }// end of constructor

   public String getFirstName(){

       return this.firstName;

   } // end of method

   public String getLastName(){

       return this.lastName;

   }// end of method

}// end of Name class

8 0
3 years ago
Indicate the order that the three files will be processed <br><br> Please answer
defon
The answer is 10 because I looked it up
6 0
4 years ago
Does technology get in the way of learning ?<br> Help Meh ! ♥ Some ideas :D
Nady [450]
Yes, and no, social network can distract a student like YouTube or face book, while it can be used as a tool for studying and to put your google documents in the cloud. plus if a teacher posts homework on his/her website, and you happen to forget the paper bringing it home, you can just simply print it instead of having to explain to the teacher
6 0
3 years ago
Read 2 more answers
Which three items might appear on the project plan when discussing an upcoming website with a design team? (Choose three)
stepladder [879]
Planning and analysis, due dates and payment details .
5 0
3 years ago
Why is it important to use fillings,coating/icing,glazes or decorations for pastry products​
Marizza181 [45]

Answer:

Frosting improves the cake's appearance.

Explanation:

Special occasion cakes become more festive with frosting and decorations; and, Frosting improves the keeping the qualities of the cake by forming a protective coating around it, sealing in moisture and flavor and allowing it to be eaten over a couple of days.

7 0
3 years ago
Other questions:
  • Can someone can help me am dont know how much RAM do i need. I use my pc for work and to watch yt vid. Thanks​
    10·1 answer
  • Which is a network of devices built around a person, typically within 10 meters of range?
    5·1 answer
  • With ________, website programmers can import data from other sources to create new functions and features that we associate wit
    14·1 answer
  • Each time the enter key is pressed, word creates a new paragraph. (points : 2) true false
    7·1 answer
  • An athlete runs every day for five days. Write a program that computes the total distance and average distance ran by the athlet
    10·1 answer
  • An aircraft departs an airport in the mountain standard time zone at 1615 MST for a 2-hour 15-minute flight to an airport locate
    14·1 answer
  • Using your own words, explain how third-party cookies are created. Suppose you are an ad-serving company, and you maintain a log
    9·1 answer
  • Where the heck is the leader board?
    5·1 answer
  • Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s
    5·2 answers
  • How is unqualified assumptions a disadvantage of communication​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!