1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
7

How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?

Computers and Technology
2 answers:
Gala2k [10]3 years ago
5 0

Answer:

The author first shows how the two are alike, and then shows how they are different

Explanation:

Got it right on Edge.

MAKE ME BRANLIEST PLZZZ

Helen [10]3 years ago
3 0
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

You might be interested in
Heya!!<br><br>•DEFINE DATA SCIENCE??<br>(∩_∩)<br><br>#kavya#<br>​
anastassius [24]

Answer:

Explanation:

Data science defined

Data science encompasses preparing data for analysis, including cleansing, aggregating, and manipulating the data to perform advanced data analysis. Analytic applications and data scientists can then review the results to uncover patterns and enable business leaders to draw informed insights.

5 0
3 years ago
________is one of the most popular payment gateways founded in in December 1998​
iren2701 [21]

paypel is the most popular

6 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
belka [17]

Answer:

c) ECC

Explanation:

Based on the usage that the friend will have as well as his concern of the computer crashing due to a memory error, we can say that the best type of RAM that he can purchase is ECC memory. These are regular RAM modules but come with error correcting code. This code checks data as it passes through the RAM and auto corrects it if necessary in order to avoid crashes due to memory error.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
4 years ago
Match the term to its correct defintion
emmasim [6.3K]

Answer:

View Base tables: Virtual table based on a SELECT query

CREATE VIEW statement: Data definition command that stores the query specification in the data dictionary

DROP VIEW statement: Data definition command that removes the query specification in the data dictionary

Explanation:

Views are virtual tables, which can be created by select queries using the real database tables.

Creating and dropping views can be done by the CREATE VIEW and DROP VIEW statements.

<u>CREATE VIEW syntax:</u>

CREATE VIEW view_name AS

SELECT column1, column2, ...

FROM table_name

WHERE condition;

<u>DROP VIEW syntax:</u>

DROP VIEW view_name;

5 0
3 years ago
What is a router?
uranmaximum [27]

Answer:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

I believe the answer would be B). A device that sends data to the receiving device

Explanation:

3 0
4 years ago
Other questions:
  • A network administrator has been tasked with configuring access to the Internet for about 50 computers. The administrator has be
    6·1 answer
  • The item that is clicked in a JList can be retrieved using the _____ method of JList.
    8·1 answer
  • Citing the recent increase in earnings by several computer companies, economists feel that a cycle has begun in which personal c
    13·1 answer
  • According to the Computing Research Association, the number of undergraduate degrees awarded in computer science at doctoral-gra
    11·1 answer
  • Why is democracy the best form of government
    5·1 answer
  • Write code using the range function to add up the series 99, 98, 97,...
    11·1 answer
  • Which technique is best suited to create technical drawings?
    10·1 answer
  • I like the impact that the increasing number of social grants may have on the things mothers​
    14·1 answer
  • The software that displays the resulting web pages is​
    9·1 answer
  • Vadik is creating a program where the user inputs their grade level and the program tells them which sports teams they are allow
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!