answersLogoWhite

0


Best Answer

cardiac sphincter; or

gastroesophageal sphincter; or

lower esophageal sphincter (LES); or

esophageal sphincter

from http://en.wikipedia.org/wiki/Cardia

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: The sphincter muscle that controls access to the stomach from the esophagus is called?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Who controls access to the president?

The answer to that is the president's chief of staff.


Who controls PC software?

Random Access Memory (RAM) and Processor Controls PC Software.


What two access controls can be set up for Windows Server 2003 folders and authentication?

The two access controls can be set up with "Authentication and Access Control. These are available in the Windows Server 2003 folders.


What is dial-up access control and call-back system?

If users connect to the system by rote via dial-up line(e.g. from home), access should be restricted by a dial-up access control. Dial-up access controls prevent unauthorized acces from remote users that attempt to access a secured environment. These controls range from dialback controls to remove user authentication. Dial-back controls are used over dial-up telecommunication lines.


What is dial-up access control and call-back systems?

If users connect to the system by rote via dial-up line(e.g. from home), access should be restricted by a dial-up access control. Dial-up access controls prevent unauthorized acces from remote users that attempt to access a secured environment. These controls range from dialback controls to remove user authentication. Dial-back controls are used over dial-up telecommunication lines.


What is the five steps in Composite management Risk?

Identify, access, develop controls, implement controls, supervise and evaluate


Which type of controls are used to implement and maintain passwords identification authentication and access control mechanisms?

technical controls


What is a computer that controls access to hardware and software on a network?

It would be a host. All other computers connected to that network are clients.


What is the five step process in composite risk management?

Identify, access, develop controls, implement controls, supervise and evaluate


What is the five step composite risk management process?

Identify, access, develop controls, implement controls, supervise and evaluate


The other strait that controls access to the Black Sea?

Dardanelles. And the Bosporus


What is the definition for technical safeguards?

Technical safeguards are security measures implemented to protect electronic protected health information (ePHI) and ensure its confidentiality, integrity, and availability. These safeguards involve the use of technology and controls such as access controls, encryption, audit controls, and integrity controls to prevent unauthorized access and protect ePHI from threats.