1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
12

Which access control principle limits a user's access to the specific information required to perform the currently assigned tas

k
Computers and Technology
1 answer:
Svetradugi [14.3K]3 years ago
4 0

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

You might be interested in
Name and describe each of the five parts of a standard wind tunnel.
Serjik [45]
Fan
drive motor
diffuser
contraction section
test section
3 0
3 years ago
Read 2 more answers
A major weakness of a lot of file processing systems is that ____.
Gnesinka [82]

They are several weaknesses or disadvantages of file processing systems but the major weakness is data redundancy and inconsistency. By data redundancy, I mean duplication of data. There are no better methods to validate insertion of duplicate data in file systems. Data redundancy can also increase the chance for errors.






7 0
3 years ago
Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What
Natalija [7]

Answer: User the insert screen recording control

Explanation:

Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.

It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.

Therefore, the correct option is B.

6 0
2 years ago
Why should you avoid the use of sarcasm cliches and idioms in busniess letters?
Oliga [24]
You would not be taken as seriously as you should be by other businesses.
3 0
3 years ago
Read 2 more answers
If you make a website what is the best way to make is good
Verizon [17]
Http://buildasitewithleah.com/step/set-up-your-website/?kw=Make%20Your%20Own%20Amazing%20Website%20T... watch this video for help
8 0
3 years ago
Other questions:
  • _____ is a web application server that provides the ability to connect web servers to multiple data sources.
    9·1 answer
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • You will write a program that reads a binary file that contains records of creatures. Each record can be stored in a Creature st
    10·1 answer
  • The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
    5·1 answer
  • In c++ 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
    6·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • What will be the results from running the following code?
    5·1 answer
  • Difference between Data and information​
    10·1 answer
  • Define a python functions that draw a pinwheel using the pinwheel function that has input paramiters that allows you to change t
    15·1 answer
  • True or false: if you are adding your own css sheet, make sure your css file comes before the bootstrap css file.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!