1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
8_murik_8 [283]
3 years ago
7

Kareem is working on a project for his manager. He has a few questions for a co-worker who he knows is knowledgeable on the subj

ect. As they're discussing some of the topics, he gives the co-worker permissions to the resources so they can look at the information on their own. Which of the following access control methods does Kareem's company use?
a. DAC
b. RBAC
c. MAC
d. TSAC
Computers and Technology
1 answer:
Akimi4 [234]3 years ago
5 0

Answer: RBAC

Explanation:

The access control methods that Kareem's company uses us the role based access control.

The Role-based access control (RBAC) simply means assigning permissions to users based on the role that such individual plays within an organization.

RBAC is a simple approach to access management and is typically less prone to error than in a scenario whereby permissions are assigned to users individually. Access rights are given to the workers based on what their job entails and what is needed and other information which isn't needed won't be accessible to them.

You might be interested in
1. in terms of technology, we often said to be living in the _____ age.???
sleet_krkn [62]
I think its the new age either that or end times
3 0
3 years ago
Read 2 more answers
What is the device that converts the signals to and from the wires so that the data can be sent and received by the computer?
netineya [11]

Answer:

E. Modem

Explanation:

A network comprises of two or more interconnected devices such as computers, routers, switches, smartphones, tablets, etc. These interconnected devices avail users the ability to communicate and share documents with one another over the network.

In order for a network to exist or be established, the devices must be turned (powered) on and interconnected either wirelessly or through a cable (wired) connection.

In Computer Networking, a node is the physical device that make up a network and are capable of sending, receiving, creating and storing data in communication.

Examples of network nodes are routers, hubs, computer, switches, smartphone, printers, modem, etc.

A modem is a networking device that converts the signals to and from the wires such as a telephone line, so that the data can be sent and received by the computer.

Basically, a modem is an abbreviation for modulator and demodulator and as such it is designed to convert signal from one network device to signals that another network device such as a computer can understand or read.

When sending a signal (data) over a network, a modem converts (modulate) digital data signal to an analogue signal and transmits it over a telephone line or other communication lines. Also, when receiving an analogue signal, a modem converts (demodulate) the signal to a digital data signal.

8 0
3 years ago
If the motherboard is not getting power, it will not start the boot. ... A four-year old laptop will not boot and presents error
lakkis [162]

Answer:

<em>The right order of steps you should take to repare the laptop is: D A C B</em>

<em>Explanation:</em>

<em>D. Ask yourself if the laptop is still under warranty: Because they will replace the board for you or give you a new machine.</em>

<em>A. Ask yourself if replacing the motherboard will cost more than purchasing a new laptop: since technology evolve every day, you might consider buying a new faster, better, advanced machine.</em>

<em>C. Find the service manual to show you how to replace the motherboard: the support assistence will guide you trhough the right way of replacing the board.</em>

<em>B. Find a replacement motherboard: choose the specific one or maybe try to find a better model, that can improve your computer performance.</em>

7 0
3 years ago
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without
777dan777 [17]

 Answer:War driving

Explanation: War driving is the activity which is done for searching for the Wi-Fi connection while driving vehicle .The main purpose of the war driving is gaining and accessing the network of Wi-Fi by being in slowly moving vehicle. The act is carried out by the individual or more people.

Other options are incorrect because Wifi driving and Wifi finding are not technical words in the computer field and E-stalking is the stacking activity with the help of internet enables electronic devices.Thus, the correct option is war driving.

7 0
3 years ago
Read 2 more answers
Which type of processing best describes the correction of errors or the rearrangement of a job's running time?
Neko [114]

Answer:

Real-time

Explanation:

i am sure because on my test it said corect

6 0
4 years ago
Other questions:
  • What is illegal to search on the internet?
    5·1 answer
  • What structures in which lighting heating and other systems are controlled by computers
    14·1 answer
  • Which description of the plain text file format is most accurate?
    10·1 answer
  • C programmig : Output all combinations of character variables a, b, and c, using this ordering:abc acb bac bca cab cbaSo if a =
    12·2 answers
  • How could you use your technology skill and Microsoft Excel to organize, analyze, and compare data to decide if a specific insur
    12·1 answer
  • You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
    13·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • Your company is getting negative feedback on the current customer service process. It’s your job to make sure customers are happ
    10·1 answer
  • Está dentro del gabinete del CPU es electrónica y hace que la transferencia de datos se realice contra gran rapidez / ayuda vien
    6·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!