1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ket [755]
3 years ago
8

__________ implements a security policy that specifies who or what may have access to each specific system resource and the type

of access that is permitted in each instance.
Computers and Technology
1 answer:
malfutka [58]3 years ago
6 0

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

You might be interested in
What is a device that makes it possible for multiple customers to share one address is called a/n
chubhunter [2.5K]
I'm totally not sure but I think sec midterm flashcards
4 0
4 years ago
You have been given two classes, a Main.java and a Coin.java. The coin class represents a coin. Any object made from it will hav
11111nata11111 [884]

Answer:

Here is the Coin class:

public class Coin {  //class names

 private int value;  // private member variable of type int of class Coin to store the value

 private String coinName;  // private member variable of type String of class Coin to store the coint name

 private double weight;      //private member variable of type double of class Coin to store the weight

  public void setValue (int v) {  //mutator method to set the value field

    value = v;  }  

     

 public void setName(String n){  //mutator method to set coinName field

    coinName = n;}  

 public void setWeight (double w) {  //mutator method to set weight field

    weight = w;  }  

 public int getValue () {  //accessor method to get the value

   return value;  }  // returns the current value

 

 public String getName () {  //accessor method to get the coin name

   return coinName;  }  //returns the current coin name

   

 public double getWeight () {   //accessor method to get the weight

   return weight;  } } //returns the current weight

 

Explanation:

Here is the Main.java

public class Main{ //class name

public static void main(String[] args) { //start of main method

Coin penny = new Coin(); //creates object of Coin class called penny

penny.setName("Penny");  //calls setName method of Coin using object penny to set the coinName to Penny

penny.setValue(1); //calls setValue method of Coin using object penny to set the coin value to 1

penny.setWeight(0.003); //calls setWeight method of Coin using object penny to set the coin weight to 0.003

   System.out.println("Coin name: " + penny.getName()); // calls getName method of Coin using penny object to get the current coin name stored in coinName field    

   System.out.println("Coin value: " + penny.getValue()); // calls getValue method of Coin using penny object to get the coin value stored in value field    

   System.out.println("Coin weight: " +penny.getWeight()); }} // calls getWeight method of Coin using penny object to get the coin weight stored in weight field    

The value of coinName is set to Penny, that of value is set to 1 and that of weight is set to 0.003 using mutator method and then the accessor methods to access these values and prinln() to display these accessed values on output screen. Hence the output of the entire program is:

Coin name: Penny                                                                                                                                Coin value: 1                                                                                                                                   Coin weight: 0.003

The screenshot of the program along with its output is attached.

3 0
3 years ago
In which decade did cell phones become available to the public?
JulijaS [17]

Answer:

1980s

Explanation:

Source:

https://www.cbc.ca/news/technology/5-major-moments-in-cellphone-history-1.1407352

6 0
3 years ago
WILL GIVE Brainliest!!!!
12345 [234]

Answer:

start

Explanation:

5 0
2 years ago
Read 2 more answers
Explain connectivity is productivity
Olegator [25]

Answer:

In fact, Quadir coined the phrase "connectivity is productivity" to explain the unique impact of Information Communication Technologies (ICTs), particularly mobile telephones, in improving economic efficiency.

5 0
3 years ago
Other questions:
  • Collaboration, listening, and negotiating are considered __________ skills.
    7·2 answers
  • Question 14 (3 points)
    5·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • 9.6 Code Practice<br> Instructions<br> 1<br> Declare a 4x 5 array called N<br><br> Please helppp
    9·1 answer
  • 80billion +2 TRILLION . PLEASE AWNSER
    7·1 answer
  • Dispositivo de computo
    5·1 answer
  • Comment if u wanna text me on behance
    6·1 answer
  • Not all output display data for humans to read explain why​
    13·1 answer
  • How to write a C++ program that lets the user guess if a randomly generated integer is even or odd then the computer lets them k
    6·1 answer
  • Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!