answersLogoWhite

0

User account

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

When a user logs on what is created that identifies the user and all of the user's group memberships?

access token


What is a private combination of characters associated with the user name that allows access to certain computer resources?

A username identifies the specific user who is operating the software.


What is generated at log-on and identifies a user and all group memberships associated with that user?

access token


What identifies which resources a person can use when using the computer?

A User Account


Does user profile can affect access to shared resources?

yes it does


What represent a collection of user accounts that require access to the same resources?

Groups


Which type of attack denies authorized user's access to network resources?

DOS


Which statement is true about controlling access to folders and files?

When controlling access to data folders or files, permissions to these resources are assigned to individual user accounts or user groups.


What is a unique name that identifies each user?

User Name


Where could one download the 'MyAthens' toolbar?

The 'MyAthens' toolbar allows the user to easily access Athens-enabled resources. It will quickly allow the user to access 'My Athens', view the account details, change the password, and view a list of resources that can be customized.


What are the key differences between access control lists and capability lists in terms of controlling access to resources?

Access control lists (ACLs) are a list of permissions attached to an object that specify which users or groups are granted access to that object. Capability lists, on the other hand, are a list of permissions attached to a user that specify what resources that user can access. The key difference is that ACLs control access based on the object, while capability lists control access based on the user.


What is misfeasor in intruders?

The misfeasor is a legitimate user who access data , programs , or resources for which such access is not authorized . it represents internal intruder attacks