expand for answer

Pointer

The address of a record (or other data grouping) contained in another record so that a program may access the former record when it has retrieved the latter record. The address can be absolute, relative, or symbolic, and hence the pointer is referred to as absolute, relative, or symbolic.


Similar items:
MAC is a means of restricting access to data based on varying degrees of security requirements for information contained in the objects. A policybased means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (access control privileges) of subjects to access information of such sensitivity. Means of restricting access to objects based on the sensitivity of the information contained in the objects and the formal authorization (i. e. , clearance, formal access approvals, and needtoknow) of subjects to access information of such sensitivity. (. See discretionary access control. )
[view]
A bit mask used to identify which bits in an IP address correspond to the network address and subnet portions of the address. This mask is often referred to as the subnet mask because the network portion of the address can be determined by the class inherent in an IP address. The address mask has ones (1) in positions corresponding to the network and subnet numbers and zeros (0) in the host number positions.
[view]
Information system security mode of operation wherein each user, with direct or indirect access to the information system, its peripherals, remote terminals, or remote hosts, has all of the following: a. valid security clearance for all information within an information system; b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs); and c. valid needto know for some of the information contained within the information system. IS security mode of operation wherein each user, with direct or indirect access to the IS, its peripherals, remote terminals, or remote hosts, has all of the following: (a) valid security clearance for all information within an IS; (b) formal access approval and signed nondisclosure agreements for all the information stored and processed (including all compartments and special access programs); and (c) valid needtoknow for some of the information contained within the IS. See system-high security mode.
[view]
A nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone. The isolation of the operating system, user programs, and data files from one another in main storage to protect them against unauthorized or concurrent access by other users or programs. Also, the division of sensitive data into small, isolated blocks to reduce risk to the data.
[view]
The network portion of an IP address. For a class A network, the network address is the first byte of the IP address. For a class B network, the network address is the first 2 bytes of the IP address. For a class C network, the network address is the first 3 bytes of the IP address. In the Internet, assigned network addresses are globally unique.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in