1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OverLord2011 [107]
3 years ago
11

Which access control type would you use to grant permissions based on the sensitivity of the information contained in the object

s
Computers and Technology
1 answer:
hram777 [196]3 years ago
5 0

Answer:

Mandatory Access Control (MAC) is a means of restricting access to system resources based on the sensitivity (as represented by a label) of the information contained in the system resource and the formal authorization (i.e., clearance) of users to access information of such sensitivity.

You might be interested in
Which of these is a good guideline when using text on a slide?
aleksklad [387]
Use no more than two font types
3 0
4 years ago
How are most gamepads installed on devices?
Doss [256]

Answer:

Plug and Play

Explanation:

most modern game pads are you just need to plug into a port and then you are free to use without any setting up.

3 0
3 years ago
What does the visibility icon allow you to do?
Eva8 [605]

Answer:

it lets you hide the layer

Explanation:

maybe you should go and take some photopea lessons

7 0
4 years ago
Which of the following is NOT true about digitizing physical media?
vredina [299]
So i think it’s c because the way it sells resell it’s porcupine so I feel like I should be c
4 0
3 years ago
Ten(10) examples of wearables or wearable technologies?​
Semmy [17]

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

7 0
3 years ago
Other questions:
  • ________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
    14·1 answer
  • Each character in a string has a(n) _______________ which specifies its position in the string.
    13·1 answer
  • Which service is used when your email program exchanges messages with the mail server on a distant network?
    5·1 answer
  • "the most common way to access the internet is through ________."
    5·1 answer
  • How to hard reset a iphone 7 without computer
    8·2 answers
  • What is metrical task system algorithm?? and can we use that in online shopping project??
    11·1 answer
  • The primary purpose of an ids is to detect intrusions, log suspicious events, and send alerts.
    7·1 answer
  • a document contains a list of items that appear in no particular order. what is the best way to format the list
    5·1 answer
  • Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing th
    15·1 answer
  • Who is the founder of C language?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!