answersLogoWhite

0


Best Answer

The User Access Control (UAC) will only allow some actions to happen when you're not the administrator and even if you, it will ask you for permission before hand.

User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What term is used to describe a security measure that defines who can use a computer when they can use it and what actions they can take while using it?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which three statements accurately describe a security policy?

It creates a basis for legal action if necessary It defines a process for managing security violations. It defines acceptable and unacceptable use of network resources.


What term defines an event that threatens the security of a computer system or network in an organization?

Incident.


Which three statements accurately describe attributes of a security policy?

It creates a basis for legal action if necessary It defines a process for managing security violations It defines acceptable and unacceptable use of network resources


What is the difference between a share permission and security permission?

A Share permission defines who can access a resource, a security access defines what they can do.


What does java security do?

Defines the security policy for each application .Every Java Application can have its own Security manager.


What explores computer related moral dilemmas and defines ethical principles for computer professionals?

computer ethics


What best defines a computer used on a server?

A computer isn't used on a server, a server is used on a computer.


What defines a device as a computer-?

A computer is defined as an electronic device that is designed to accept data.


What is Access Control Lists?

A file, the contents of which defines who can perform actions on a file or folder


What is the sanitation process recommended by the DoD 5220.22-M standard?

5220.22-M does not specify a standard, only that media that stored security-clearance required files must be sanitized. The Defense Security Service defines the Clearing and Sanitization Matrix, which actually specifies what actions must be taken for various types of media.


What two main group types does Active Dictionary define?

It defines security and distribution.


Which channel defines nyquist bit rate formula?

computer networking