1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
2 years ago
8

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type

of access that is permitted in each instance.
Computers and Technology
1 answer:
malfutka [58]2 years ago
6 0

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

You might be interested in
Interactive sites where users write personal topics and comments to a threadded discussion are called?
Eddi Din [679]
The correct answer would be Forums
5 0
3 years ago
Design the logic for a program that allows a usher to continuously enter numbers until the usher enters 0. Display the sum of th
uysha [10]

int sum = 0, n;

do {cin>>n; sum+=n;}while (n!=0);

cout<<sum;

5 0
3 years ago
Crystal detected a problem in a computer network, due to which she could not send or receive data within the network. She pings
babymother [125]
<span>Conflict of IP address in the computers. when computer are networked each computer is given a unique IP address. If two computers have the same IP there will be conflict which lead to failure in sending and receiving data within the network. It can be resolved by checking the IP addresses of each computer and correcting it.</span>
3 0
3 years ago
Read 2 more answers
When you are almost done with your soup and want to get at the last little bit, how should you do this 2
pav-90 [236]

Answer:

<u>B. Tip the bowl slightly, then spoon up the last bit</u>

Explanation:

Generally speaking none of the other answers made much of sense.. "tip the bowl from side to side" doesn't help you at all, neither does "Keep spooning as much as you can, then stop eating". Neither of these will help you spoon up the last little bit, <u>the most logical answer is B. "Tip the bowl slightly, then spoon up the last bit"</u>. If this is not the correct answer then it'd be D, but I don't believe/feel that it's "poor etiquette" to "leave the last little bit".

7 0
2 years ago
A disadvantage of ethernet??
Blababa [14]
Ethernet is a wired internet connection. So, one obvious draw back is you can only go so far as your Ethernet cable will allow you.
3 0
3 years ago
Other questions:
  • Put the following numbers in order from greatest to least:
    13·1 answer
  • A book of the Law was found in the Temple, which was being repaired, during what year of Josiah's reign.
    15·2 answers
  • One megabyte is approximately __________.
    7·2 answers
  • 1. A tachometer measures:
    8·1 answer
  • What is also known as a visual aid in presentation
    15·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • What are some examples of what can be changed through options available on the mini toolbar
    5·1 answer
  • One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You
    10·2 answers
  • Denise found a volume of documents in the trash bin that contained individuals, names, social security numbers and years of birt
    14·1 answer
  • What would the internet be like today if there was no World Wide Web?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!