1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tiny-mole [99]
3 years ago
7

How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?

Computers and Technology
2 answers:
Gala2k [10]3 years ago
5 0

Answer:

The author first shows how the two are alike, and then shows how they are different

Explanation:

Got it right on Edge.

MAKE ME BRANLIEST PLZZZ

Helen [10]3 years ago
3 0
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

You might be interested in
The term "resolution" refers to ______.
Usimov [2.4K]

Options A and C can get you confused. We can choose option A if our argument is based entirely on digital images. The correct answer, however, is  C: Number of pixels you see on your computer monitor.

Resolution describes the clarity and sharpness of a picture that can be measured by the number of pixels contained on a display monitor. It can be expressed by the number of horizontal (width) and vertical pixels (height) represented by a screen. The clarity and sharpness are always dependent on the resolution and size of the monitor.

4 0
3 years ago
Read 2 more answers
Andy wants to touch up his holiday photographs because they appear too bright and the color is washed out. Which software applic
Veronika [31]
The application andy wants to use is adobe photoshop 
5 0
3 years ago
A hacker corrupted the name:IP records held on the HOSTS file on a client, to divert traffic for a legitimate domain to a malici
balu736 [363]

The type of attack that the hacker performed is Domain Name System (DNS) server cache poisoning.

<h3>What is DNS poisoning?</h3>

In Domain Name System (DNS) server cache poisoning, the hackers often enter into a DNS server because they want to make an adjustment to its directory so that it can point the domain name users enter to a wrong, IP address.

Note that Domain Name Server (DNS) poisoning is a form of system attack in which there is the change of DNS records which are then used to redirect online traffic to a wrong website.

Learn more about hacker  from

brainly.com/question/24956493

7 0
2 years ago
How do I get rid of this?
kherson [118]

There Is an App that you downloaded that allows this. you have to find it and disable it

3 0
3 years ago
Read 2 more answers
Describe the Pros and Cons Associated with Cloud Computing Cloud Computing was introduced in 1999 by a company named "Salesforce
Rudik [331]

Answer & Explanation:

Pros of cloud computing:

  • Cloud computing provides high speed due to faster deployment of services in fewer clicks.
  • It eliminates the need of IT infrastructure and manageability.
  • It is cost efficient as it provides huge space availability.
  • It makes it easy to get backup and recovery.
  • It is easy to access information anytime and anywhere in the world.
  • Due to cloud computing, it is very easy to add or remove services as required.

Cons of cloud computing:

  • It makes the data vulnerable and information theft challenges can be encountered.
  • Internet connection is required all the time.
  • There is less control available as it runs on remote servers.
  • Migrating information can become difficult.
  • It can face technical issues so the information will not be available for a limited time.
7 0
3 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • Double any element's value that is less than controlValue. Ex: If controlValue = 10, then dataPoints = {2, 12, 9, 20} becomes {4
    8·2 answers
  • Lucy has to move data from column A to column N in a worksheet. Which keys should she select to move data in the same worksheet?
    7·2 answers
  • Who needs to be involved when assembling business solutions that include hardware and software?
    11·2 answers
  • What is outlook used for?
    14·2 answers
  • Which tab is used to insert a hyperlink onto a slide?
    9·1 answer
  • Yeah help me please......................
    9·1 answer
  • What is Parallelism? And what is Pipelining?<br> Can someone please explain them fully?!
    14·1 answer
  • How does the dns solve the problem of translating domain names like example.com into ip addresses?
    10·1 answer
  • Which new development in malware caused sandbox technology to automate and introduce artificial intelligence learning
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!