1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
7

How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?

Computers and Technology
2 answers:
Gala2k [10]3 years ago
5 0

Answer:

The author first shows how the two are alike, and then shows how they are different

Explanation:

Got it right on Edge.

MAKE ME BRANLIEST PLZZZ

Helen [10]3 years ago
3 0
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

You might be interested in
A misfire code is a type _______ diagnostic trouble code (DTC).
Gre4nikov [31]

A misfire code is a type A diagnostic trouble code.  

A type A misfire indicates impending catalyst damage and is the most serious type of misfire condition. If this type of misfire is detected, the MIL may flash once per second to notify the driver that the car needs immediate service as soon as possible. In addition, a DTC is set and a freeze frame data is stored.


6 0
3 years ago
What software development model focuses on improving the product in small steps each time through the cycle?
VashaNatasha [74]

The software development model that focuses on improving the product in small steps each time through the cycle is the Waterfall Process model

•

The Waterfall Process model mainly focuses on going step by step to make sure the product improves sufficiently and significantly.

•

•

- Marlon Nunez

6 0
3 years ago
Read 2 more answers
Consider five wireless stations, A, B, C, D, and E.
klio [65]

Answer:

Check the explanation

Explanation:

A) Whenever C is sending to D, what other communications are possible?

C’s packet will be seen by A, B and D, but not by E. Thus, D can send to E at the sametime..

B) Whenever B is sending to A, what other communications are likely?

Even though B’s packet will not be seen by D, other nodes, e.g., E, or C, can’t send to D since the packets from these nodes will interfere with the packets from B at A. Therefore, other communications is not likely at the same time.

C) Whenever B is sending to C, what other communications are possible?

B’s packet will be seen by E, A and C, by not by D. therefore, E can send to D at the same point.

4 0
3 years ago
Machine code and Object code is the same right?​
guapka [62]

Answer:

"True" Machine code and Object code is the same.

Explanation:

All code at the same level is considered the same code, so we can say that the machine code, byte code, and the object code with it is of the same type, all of which are considered as the lowest level associated with the common program, these are common. Also known as source code because it is used in translating different languages.

6 0
3 years ago
What is the best image format for our website if we needed our image to have a transparent background?
Rainbow [258]
PNG- Usually if you look up your picture and then add png to the end, it has a transparent background. Make sure it has free usage, though.
5 0
3 years ago
Other questions:
  • Which cloud computing service model gives software developers access to multiple operating systems for testing?
    5·1 answer
  • In the U.S. highway numbering system, north-south routes have
    9·2 answers
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • Write a program "addnumbers.c" where it takes as many arguments as the user includes as command line arguments and calculates th
    11·1 answer
  • To view the results of a query, open it by pressing and holding or right-clicking the query in the navigation pane and tapping o
    10·1 answer
  • 100 points please hurry!!!
    14·2 answers
  • If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
    13·2 answers
  • What is the value of the variable result after these lines of code are executed?
    11·1 answer
  • What finger should be on the Y key?
    12·2 answers
  • Use the svd() function in matlab to compute a, the rank-1 approximation of a. clearly state what a, is, rounded to 4 decimal pla
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!