1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
13

A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an

d what can they do with it.
Computers and Technology
1 answer:
xz_007 [3.2K]3 years ago
3 0

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

You might be interested in
This project is to mimic a meeting request system by checking the requesting party’s validity, and the number of people attendin
alexgriva [62]

Answer:

See explaination for the program code

Explanation:

Meeting.java

------

import java.util.Scanner;

public class Meeting {

public static void main(String[] args) {

Scanner input = new Scanner(System.in);

final int ROOM_CAPACITY = 100;

int numPeople, diff;

String name;

System.out.println("****** Meeting Organizer ******");

System.out.print("Enter your name: ");

name = input.nextLine();

System.out.println("Welcome " + name);

do{

System.out.print("\nHow many people would attend the meeting? (type 0 to quit): ");

numPeople = input.nextInt();

if(numPeople < 0)

System.out.println("Invalid input!");

else if(numPeople != 0)

{

if(numPeople > ROOM_CAPACITY)

{

diff = numPeople - ROOM_CAPACITY;

System.out.println("Sorry! The room can only accommodate " + ROOM_CAPACITY +" people. ");

System.out.println(diff + " people have to drop off");

}

else if(numPeople < ROOM_CAPACITY)

{

diff = ROOM_CAPACITY - numPeople;

System.out.println("The meeting can take place. You may still invite " + diff + " people");

}

else

{

System.out.println("The meeting can take place. The room is full");

}

}

}while(numPeople != 0);

System.out.println("Goodbye!"); }

}

output

---

****** Meeting Organizer ******

Enter your name: John

Welcome John

How many people would attend the meeting? (type 0 to quit): 40

The meeting can take place. You may still invite 60 people

How many people would attend the meeting? (type 0 to quit): 120

Sorry! The room can only accommodate 100 people.

20 people have to drop off

How many people would attend the meeting? (type 0 to quit): 100

The meeting can take place. The room is full

How many people would attend the meeting? (type 0 to quit): 0

Goodbye!

4 0
4 years ago
Type your response in the box. Imagine you purchased a new computer and you plan to install one operating system and a few appli
faltersainse [42]

Answer:

Yes

Explanation:

As long as they were legally copied

5 0
2 years ago
Read 2 more answers
Complete the sentences about interactive media.
maksim [4K]

Answer:

teletext

dynamic media

Explanation:

5 0
3 years ago
there are four stage of the product life cycle. during which of these stages do you think is the best time for a company to purc
Alisiya [41]

Maturity Stage – During the maturity stage, the product is established and the aim for the manufacturer is now to maintain the market share they have built up. This is probably the most competitive time for most products and businesses need to invest wisely in any marketing they undertake. They also need to consider any product modifications or improvements to the production process which might give them a competitive advantage. i think this would be the best time for the company to purchase an emerging technology.

7 0
3 years ago
Read 2 more answers
A(n) ____ address is an assigned series of numbers, separated by periods, that designate an address on the Internet.
schepotkina [342]

Answer: An <em>IP</em> address is commonly referred to as an accredited series of numbers, disjointed by periods, this eventually provides an address on web. In laymen terms, an IP address is commonly known as a numerical label accredited to a device that is connected to a network which uses the IP for communication.

6 0
3 years ago
Other questions:
  • Interactive media professionals are unique among other Information Technology professionals because they
    7·1 answer
  • The general manager for a retail clothing outlet was recently cited as saying, IT is the cornerstone of our company. All of our
    9·1 answer
  • Use the horizontal scroll bar to navigate through the _______.?
    15·1 answer
  • What does a coder do on a daily basis?
    8·1 answer
  • Bitmap images are ________ into different software applications.
    9·1 answer
  • Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions
    11·1 answer
  • I need help building a computer what are some good parts?
    9·1 answer
  • Terrell, a programmer, is creating a website for an online merchant and wants the program to calculate the total price based on
    14·2 answers
  • Why is E in DELL tilted?​
    5·2 answers
  • A ____________ is a collection of infected IT devices that an attacker or attack group controls.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!