Answer:
An Access control list (ACL) is used to describe a list of security policies that is associated with an object
Answer: Option (A) & (D) are correct.
Layer 2 switch is commonly referred to as a type of network or device switch that tends to work on data link layer and use MAC addresses in order to determine the route through which the frames are forwarded.
An IDS known as intrusion detection system is commonly referred to as a device or application that controls a network for malevolent activity and its policy violations.
Crowdsourcing is used by mobile application that allows users to report the location of a pet that appears to be lost.
<h3>What is a mobile application?</h3>
A mobile application is known to be a kind of computer app or program that has been made to handle or run itself on a mobile device e.g. phone, etc.
Conclusively, the option that best describes a system that uses crowdsourcing is the mobile application that allows users to report the location of a pet that appears to be lost and upload a photo that is made available to other users of the application and thus everyone can help to look for it.
Learn more about mobile application from
brainly.com/question/9477543
#SPJ1
<span>It should be single-user/multitasking os.</span>
Answer: I think a
Explanation: sorry I’m in wrong, have a great day!! :D