1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PtichkaEL [24]
3 years ago
8

Which of the following statements is/are correct? a. At the network layer, entitlement can map identity and/or attributes to fun

ctionality.b. At the application layer, entitlement rules can define the protocols allowed to be used.c. At the system layer, identity, and attributes used as part of the entitlement rules can stop or restrict access, or may direct access to a particular interface, for example, a web interface rather than a full-GUI interface.d. At the process layer, entitlement can be used to define the processes or functions run within an application. Entitlement can also specify that enhanced functions require additional verification (which can prompt the user or run in the background).
Computers and Technology
1 answer:
AlekseyPX3 years ago
7 0

Answer:

Option D

Explanation:

An Entitlement is an option to utilize, get to or devour an application or asset, commonly for a charge. For instance, a client may buy an Entitlement to utilize an application in ceaselessness (a "unending" permit), or they may buy a period restricted option to utilize an application, (for example, a one-year membership permit).

You might be interested in
Algorithm and flowchart to find the perimeter and area of square​
kupik [55]

Answer:

I can give you the perimeter "algorithm" but not the flowchart.

Here you go:

p = w * 4

p = perimiter,

w = width/height

4 = the amount of sides needed.

perimeter = width * 4

to include both width and height, we would instead use:

perimeter = 2(width+height)

This also works with rectangles ^

--------------------------------------------------------------------------

To find an area, it is just width * height. This is also compatible with rectangles.

4 0
3 years ago
Qbasic program to accept 10 numbers and to find their sum. <br>​
sesenic [268]

Answer:

the answer is 5

Explanation:

6 0
3 years ago
Edhesive intro to CompSci Test 7 answers pls
algol13

Answer:

nothing

Explanation:

nothing

6 0
3 years ago
What is the biggest type of gear?<br><br>A. Spur<br>B.Worm<br>C.Wheel<br>D.Pinion
AnnZ [28]
The answer to this should be B. Worm. A pinion is a the smallest gear out of the listed ones above. spur would be next then wheel and the biggest if them all would be the spur. I'm not completely sure if my answer is 100% correct, but I feel confident enough about it. Hope this helps. :)

7 0
3 years ago
Read 2 more answers
What is the function of the kernel of an operating system? It is an application that allows the initial configuration of a Cisco
Phoenix [80]

Answer:The kernel provisions hardware resources to meet software requirements.

Explanation: Kernel is the program which behaves as the central component of the operating system.The main purpose of the kernel is to control the operation of the system to manage it.

Monolithic kernel and micro-kernel are two types of kernel units present in the computer system where they work for fulfilling the software requirement by attaching it to the hardware parts.

Other option are incorrect because it does not work for Cisco device, does not perform any specific feature only , no linkage is created between the hardware and the electronics nor reacts as navigation bar.

3 0
3 years ago
Other questions:
  • In which of the following situations may the taxpayer take an education expense on Schedule C? a. Henry, a self-employed adminis
    7·1 answer
  • The mobile nodes (devices) add or leave a Mobile Ad-hoc Network, changing the _____ of this network over time. a) infrastructure
    14·1 answer
  • 6 external parts of computer
    10·2 answers
  • What does ctto mean?
    11·2 answers
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • What do people do when they navigate using GPS
    6·2 answers
  • What are the main features cyber law of Nepal​
    13·1 answer
  • How to convert binary to decimal <br> Please it’s so hard and what is digital and analogue
    9·1 answer
  • How to mark a discussion as read on canvas dashboard.
    10·1 answer
  • you have been using snmp on your network for monitoring and management. you are concerned about the security of this configurati
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!