<span>Web applications need access controls to allow users (with varying privileges) to use the application.They also need administrators to manage the applications access control rules and the granting of permissions or entitlements to users and other entities. Various access control design methodologies are available. To choose the most appropriate one, a risk assessment needs to be performed to identify threats and vulnerabilities specific to your application, so that the proper access control methodology is appropriate for your application.</span>
Answer:
The employer
Explanation:
because use they are replaceable for their employees to be treated well and equally.
Answer: The answer is No, because the MB > MC
Explanation:
They are not cleaning up enough because the MB>MC. Therefore, all other options which cut across - Yes, because the MC > MB,
No, because the MB > MC,
Yes, because the MB > MC and
No, because the MC > MB are wrong.