1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
7

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj

ect. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?
a. DAC
b. RBAC
c. MAC
d. TSAC
Computers and Technology
1 answer:
Akimi4 [234]3 years ago
5 0

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.

You might be interested in
explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”
sasho [114]

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

<h3>What is the joke about?</h3>

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

brainly.com/question/21475482

#SPJ1

7 0
2 years ago
E-mails that are mailed directly to a consumer without their knowledge or permission are called
gizmo_the_mogwai [7]
E-mails that are mailed directly to a consumer without knowledge or permission are called spam
6 0
3 years ago
Read 2 more answers
Placeholders for fields such as "Last Name" and "Address" would be inserted into which
MrMuchimi

Answer:

Explanation:

The last name goes inside the main body of the mail specifically at the "closing block".

While the Address is inserted into the Subject Line specifically to the "To block"

7 0
3 years ago
What file name would allow you to easily find and edit your document later in Word Online?
Fynjy0 [20]

Answer:

Essay 1_24_20 DRAFT

Explanation: I did the assignment and my answer was correct

5 0
3 years ago
Read 2 more answers
Four possible skills a person could have
cluponka [151]

Answer:

Active listening skills.

Genuine interest in others.

Flexibility.

Good judgment.

Explanation:

4 0
4 years ago
Other questions:
  • If you witness physical bullying and want to help, what should you consider first?
    5·1 answer
  • Which of the following is not one of the five major areas to include in your notes organizer?
    15·2 answers
  • I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp
    8·2 answers
  • A teacher wants a program to give extra points to students who fail a test. Write a Python program to do the following: (a) Ask
    5·1 answer
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • Write a recursive function is_pow2(n) that returns True if the positive integer n is an integer power of 2, and False otherwise.
    9·1 answer
  • This project must target a Unix platform and execute properly on our CS1 server.
    9·1 answer
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • The scope of a temporary table is limited to what?
    10·1 answer
  • Television, the internet, and smartphones are different communication _______blank hsn uses in its imc.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!