answersLogoWhite

0


Best Answer

That functionality is not available in generic C++, it is a function of the operating system and is therefore platform-specific. Even so, user-credentials cannot be used to determine who can access an object unless you employ some form of biometric security such as fingerprint identification, or a physical security system such as keycards. In the absence of these facilities, you would have to force the user to confirm their credentials every time the object was accessed. After all, the user who originally logged into the system is not necessarily the user currently using the system.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

Access control list

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What type of logical access control method allows you to define who can access an object and type of access that they will have to that object?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

Define protected access modifire in c plus plus?

The access privileges in c++ are 1.public 2.private 3.protected and by default its private


How does C programming give access to low level memory?

Define 'low level memory' first.


Define access specifiers in object oriented programming?

One of the techniques in object-oriented programming is encapsulation. It concerns the hiding of data in a class and making them available only through its methods. In this way the chance of making accidental mistakes in changing values is minimized. Java allows you to control access to classes, methods, and fields via so-called access modifiers. The access to classes, constructors, methods and fields are regulated using access modifiers i.e. a class can control what information or data can be accessible by other classes. To take advantage of encapsulation, you should minimize access whenever possible.Java provides a number of access modifiers to help you set the level of access you want for classes as well as the fields, methods and constructors in your classes. A member has package or default accessibility when no accessibility modifier is specified.Access Modifiers1. Private2. Protected3. Default4. PublicPublic is the most liberal access modifier and Private is the most restrictive access modifier. NB there is no such thing as an 'access specifier' in Java, only access modifiers.


What is a component of the CSS box model?

For each item on a webpage, even a piece of a text, you can think of there being a box around it. You can do things like draw borders around the item, define its margins, its size and its position. You define the formatting of the content of it, the space around the content which is called padding. You can define the thickness and style of the borders. Using any or all of these things gives you great control over the items on your webpage. Try this: <span style="border-width: 20px; border-color: gold; border-style: groove; padding: 5pt; position: absolute; top:5cm; left:3cm; margin:0.5cm;">SAMPLE</span>


How you define SCADA?

SCADA is an acronym for Supervisory Control and Data Acquisition. SCADA usually refers to an industrial computer system that monitors and controls a process.

Related questions

What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


What form of access control is based on access control lists that define which users can access objects?

the passive entity that is the target of an access request. the active entity that initiates an access request.


What is baseband broadband medium-access control and packet?

Baseband broadband can be define as access in which networ work


What access point feature allows an admin to define what type of data can enter wirless network?

authentication


What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Don't cheat!


What allows businesses to define manage access and secure network resources including files printers people and application?

Directory Services


Which access control model are you implementing?

RBACFingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards# Fingerprint matching with quick, accurate# Available for users up to 500/1000/1500# Can record up to 30,000 transactions


Define logical fallacy?

Logical fallacy is a phrase used to describe reasoning that always seems to be wrong. In arguments, it would be rendered invalid.


The Auditing tab on the Access Control Settings dialog box is used to define events that result in an audit detail being written to the Security log in the what?

Event Viewer


What is the difference between strategic control and financial control?

Define staregic control and financial control


Define access of computer network?

the action of gaining access to a computer or a network by entering a username and password


How is the lean six sigma DMAIC process define?

define, measure, analyze, improve, control