answersLogoWhite

0


Best Answer

The answer to that is the president's chief of staff.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

The President's Chief of Staff.

-TH

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

The president's chief of staff controls access to him.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Who controls access to the president?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Who controls Haiti?

its the president of haiti who controls the contry


The most powerful position in the house?

The position of the Chief of Staff. Presently occupied by Rahm Emanuel. The Chief of Staff controls all access to the President


Who controls PC software?

Random Access Memory (RAM) and Processor Controls PC Software.


What two access controls can be set up for Windows Server 2003 folders and authentication?

The two access controls can be set up with "Authentication and Access Control. These are available in the Windows Server 2003 folders.


What does the president control?

The President of the US controls the Executive Branch of the government.


Who controls power in US?

Hopefully the President


What is dial-up access control and call-back system?

If users connect to the system by rote via dial-up line(e.g. from home), access should be restricted by a dial-up access control. Dial-up access controls prevent unauthorized acces from remote users that attempt to access a secured environment. These controls range from dialback controls to remove user authentication. Dial-back controls are used over dial-up telecommunication lines.


What is dial-up access control and call-back systems?

If users connect to the system by rote via dial-up line(e.g. from home), access should be restricted by a dial-up access control. Dial-up access controls prevent unauthorized acces from remote users that attempt to access a secured environment. These controls range from dialback controls to remove user authentication. Dial-back controls are used over dial-up telecommunication lines.


Which type of controls are used to implement and maintain passwords identification authentication and access control mechanisms?

technical controls


What is the five steps in Composite management Risk?

Identify, access, develop controls, implement controls, supervise and evaluate


What is a computer that controls access to hardware and software on a network?

It would be a host. All other computers connected to that network are clients.


Which political part has the majorityand controls the house?

The president.