answersLogoWhite

0

That functionality is not available in generic C++, it is a function of the operating system and is therefore platform-specific. Even so, user-credentials cannot be used to determine who can access an object unless you employ some form of biometric security such as fingerprint identification, or a physical security system such as keycards. In the absence of these facilities, you would have to force the user to confirm their credentials every time the object was accessed. After all, the user who originally logged into the system is not necessarily the user currently using the system.

User Avatar

Wiki User

11y ago

What else can I help you with?

Continue Learning about Engineering

How does C programming give access to low level memory?

Define 'low level memory' first.


Define protected access modifire in c plus plus?

The access privileges in c++ are 1.public 2.private 3.protected and by default its private


What is System Rights Applet?

The System Rights Applet is a component typically found in software applications or operating systems that allows users to manage and configure permissions and access rights for various system resources. It provides a user-friendly interface for administrators to define who can access certain files, applications, or system settings. By utilizing this applet, organizations can enforce security policies and ensure that only authorized users have the necessary permissions to perform specific tasks.


Define access specifiers in object oriented programming?

One of the techniques in object-oriented programming is encapsulation. It concerns the hiding of data in a class and making them available only through its methods. In this way the chance of making accidental mistakes in changing values is minimized. Java allows you to control access to classes, methods, and fields via so-called access modifiers. The access to classes, constructors, methods and fields are regulated using access modifiers i.e. a class can control what information or data can be accessible by other classes. To take advantage of encapsulation, you should minimize access whenever possible.Java provides a number of access modifiers to help you set the level of access you want for classes as well as the fields, methods and constructors in your classes. A member has package or default accessibility when no accessibility modifier is specified.Access Modifiers1. Private2. Protected3. Default4. PublicPublic is the most liberal access modifier and Private is the most restrictive access modifier. NB there is no such thing as an 'access specifier' in Java, only access modifiers.


What is a component of the CSS box model?

For each item on a webpage, even a piece of a text, you can think of there being a box around it. You can do things like draw borders around the item, define its margins, its size and its position. You define the formatting of the content of it, the space around the content which is called padding. You can define the thickness and style of the borders. Using any or all of these things gives you great control over the items on your webpage. Try this: <span style="border-width: 20px; border-color: gold; border-style: groove; padding: 5pt; position: absolute; top:5cm; left:3cm; margin:0.5cm;">SAMPLE</span>

Related Questions

What type of logical access control method allow you to define who can access an object and the type of access that they will have to that object?

Access control list


What form of access control is based on access control lists that define which users can access objects?

the passive entity that is the target of an access request. the active entity that initiates an access request.


What is baseband broadband medium-access control and packet?

Baseband broadband can be define as access in which networ work


What access point feature allows an admin to define what type of data can enter wirless network?

authentication


What are the different types of access modifiers?

Access modifiers are keywords in programming that define the accessibility of classes, methods, and variables. The main types include public, which allows access from anywhere; private, restricting access to within the same class; protected, permitting access to subclasses and classes in the same package; and default (no modifier), which allows access only within the same package. These modifiers help encapsulate data and control how components of a program interact with each other.


What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Don't cheat!


Which access control model are you implementing?

RBACFingerprint Access Control System - TTAC01 model we are implementing it has a strictness entrance to a property, a building, or a room to authorized persons.Features Of Access Control : - # Eliminates administrative costs pertaining to conventional swipe cards and ID cards# Fingerprint matching with quick, accurate# Available for users up to 500/1000/1500# Can record up to 30,000 transactions


What allows businesses to define manage access and secure network resources including files printers people and application?

Directory Services


What is access control entity?

An access control entity refers to any component within a system that manages and enforces policies regarding who can access specific resources or data. This can include users, groups, roles, and permissions that define the level of access granted. Access control entities work together to ensure that only authorized individuals can interact with sensitive information or systems, thereby enhancing security and compliance.


The Auditing tab on the Access Control Settings dialog box is used to define events that result in an audit detail being written to the Security log in the what?

Event Viewer


Which of the following are required when creating a standard access control list (Choose two.)?

When creating a standard access control list (ACL), two key requirements are specifying the access control entries (ACEs) that define the permissions for each IP address or subnet and determining the direction of the ACL (inbound or outbound). Additionally, you need to apply the ACL to the appropriate interface on a network device to enforce the rules effectively.


What is the difference between strategic control and financial control?

Define staregic control and financial control