answersLogoWhite

0


Best Answer

Access control list

User Avatar

Wiki User

โˆ™ 2010-03-18 15:08:12
This answer is:
User Avatar
Study guides

When is the ideal time to take a resting heart rate

Which of the following plays a role in determining your body-type

Which view allows you to create or modify a worksheet while viewing how it will look in printed format

Which of the following is a benefit of participating in team sports

โžก๏ธ
See all cards
4.17
โ˜†โ˜…โ˜†โ˜…โ˜†โ˜…โ˜†โ˜…โ˜†โ˜…
23 Reviews

Add your answer:

Earn +20 pts
Q: What type of logical access control method allows you to define who can access an object and the type of access that they will have to that object?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Define the keyword public in java?

public is an access modifier in Java that allows all classes and methods uncontrolled access to the class or the variable that is defined with the keyword public in their definition.


What type of logical access control method allows you to define who can access an object and type of access that they will have to that object?

That functionality is not available in generic C++, it is a function of the operating system and is therefore platform-specific. Even so, user-credentials cannot be used to determine who can access an object unless you employ some form of biometric security such as fingerprint identification, or a physical security system such as keycards. In the absence of these facilities, you would have to force the user to confirm their credentials every time the object was accessed. After all, the user who originally logged into the system is not necessarily the user currently using the system.


Define protected access modifire in c plus plus?

Protected access is exactly the same as private access, except that derived classes are also permitted access.


Define access specifiers in object oriented programming?

One of the techniques in object-oriented programming is encapsulation. It concerns the hiding of data in a class and making them available only through its methods. In this way the chance of making accidental mistakes in changing values is minimized. Java allows you to control access to classes, methods, and fields via so-called access modifiers. The access to classes, constructors, methods and fields are regulated using access modifiers i.e. a class can control what information or data can be accessible by other classes. To take advantage of encapsulation, you should minimize access whenever possible.Java provides a number of access modifiers to help you set the level of access you want for classes as well as the fields, methods and constructors in your classes. A member has package or default accessibility when no accessibility modifier is specified.Access Modifiers1. Private2. Protected3. Default4. PublicPublic is the most liberal access modifier and Private is the most restrictive access modifier. NB there is no such thing as an 'access specifier' in Java, only access modifiers.


Define an open loop control system?

open loop control systems usually are used to test certain hardware.

Related questions

What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


What form of access control is based on access control lists that define which users can access objects?

the passive entity that is the target of an access request. the active entity that initiates an access request.


What is baseband broadband medium-access control and packet?

Baseband broadband can be define as access in which networ work


Which access control model should you implement?

The choice of access control model depends on what you are trying to achieve. For example: Mandatory access control (MAC) should protect information no matter who the user is. They can't change it's classification or who is granted access to it. Discretionary access control (DAC) allows the information owner maximum flexibility in granting or revoking permissions for the information and applications. Role-based access control (RBAC) allows users to be assigned pre-defined sets of permissions based on what they will need to do so that it is not necessary to craft access policies for each individual user. RBAC can also be combined with MAC as an access control model. There are, of course, other access control models. The point is, that you have to first define your objectives before you can decide which model you should implement.


What access point feature allows an admin to define what type of data can enter wirless network?

authentication


What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Don't cheat!


What allows businesses to define manage access and secure network resources including files printers people and application?

Directory Services


Define the keyword public in java?

public is an access modifier in Java that allows all classes and methods uncontrolled access to the class or the variable that is defined with the keyword public in their definition.


What type of logical access control method allows you to define who can access an object and type of access that they will have to that object?

That functionality is not available in generic C++, it is a function of the operating system and is therefore platform-specific. Even so, user-credentials cannot be used to determine who can access an object unless you employ some form of biometric security such as fingerprint identification, or a physical security system such as keycards. In the absence of these facilities, you would have to force the user to confirm their credentials every time the object was accessed. After all, the user who originally logged into the system is not necessarily the user currently using the system.


Define logical fallacy?

Logical fallacy is a phrase used to describe reasoning that always seems to be wrong. In arguments, it would be rendered invalid.


What is true regarding media access control?

- Ethernet utilizes CSMA/CD - Defined as placement of data frames on the media - Data Link layer protocols define the rules for access to different media


What are the constants and control related to science?

define constants and control

People also asked