1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
7

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj

ect. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?
a. DAC
b. RBAC
c. MAC
d. TSAC
Computers and Technology
1 answer:
Akimi4 [234]3 years ago
5 0

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.

You might be interested in
Which protocols are TCP/IP application layer protocols? (choose all that apply)
natita [175]

Answer:

Option(b) and Option(c) is the correct answer for the given question.

Explanation:

TCP stands for transmission control protocol, In the TCP protocol firstly it maintains the connection between the sender and the receiver. The receiver always gives an acknowledgment to the sender when it receives the information that's why TCP is reliable protocol it is found in TCP/IP application layer protocols    

UDP stands for user datagram protocol, In the UDP protocol, it does not maintain the connection between the sender and the receiver. The receiver does not give any acknowledgment to the sender that why UDP is not a reliable protocol . it is also found in the TCP/IP application layer protocols

  • In the option(a) IP is found in the network layer that why this option is incorrect.
  • In the option(d) FTP is found in the application layer thats why this option is incorrect .

Hence TCP and UDP are TCP/IP application layer protocols

5 0
3 years ago
Read 2 more answers
What best describes "broadband access"?
Andre45 [30]

Answer:

The Correct option is : d. BROADBAND ACCESS enable users to connect to a high speed networks

Explanation:

As the names implies BROADBAND ACCESS can be defined as a technology that enables users to have the access to fast and high speed internet connection when browsing, streaming or downloading reason been that BROADBAND ACCESS is more faster and quicker which inturn enables the user to do a lot more on the internet which is why BROADBAND ACCESS is often refer or known as a high and fast speed Internet access connection.

5 0
3 years ago
Which of the following are techniques that companies use to influence consumers demand for their goods and services
Lesechka [4]
A. Turning luxuries into necessaties
5 0
3 years ago
Read 2 more answers
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
3 years ago
Explain how the number of jobs available to workers has been affected by the use of ICT in commerce and industry, using specific
blondinia [14]

Answer:

The main cause of lack of jobs is due to automation and the ability for computers to do everything faster, more efficiently and effectively.

Explanation:

A specific example - Data entry jobs are redundant from automation programs

- Economic Forum predicted a net increase of 58 million jobs for automation, so this accounts for losses but isn't case specific to data entry

6 0
2 years ago
Other questions:
  • video-sharing sotes such as youtube and vimeo provide a place to post short videos called clips true or false?
    5·1 answer
  • Which principle of CSR requires that a business state facts fully and accurately?
    8·1 answer
  • Ashley works for a movie theater. The theater has decided to host some special events over the summer. She needs to communicate
    8·2 answers
  • Create a class 'ProblemSolution' with following characteristics A public method 'solution' without parameters and return type is
    14·1 answer
  • Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
    9·1 answer
  • You are a database administrator. Chantelle comes to you asking for help on how to access all the data in one row of the databas
    11·1 answer
  • You can minimize the Ribbon with a command contained on the _____.
    7·1 answer
  • Hi am feeling really happy just passed a test after a lot of tries :-)
    5·1 answer
  • Question 8 of 10
    5·1 answer
  • The ______ process retains copies of data over extended periods of time in order to meet legal and operational requirements.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!