Access

1. In IT security, access refers to the permissions a user, program, or device has to interact with data, content, and/or other devices. Access can be granular, such as the ability to view, share or print a specific file, or it can be broad, such as admittance to a computer s operating system to use its installed applications.

At the file level, access can be customized to enable a unique combination of privileges. For example, access can be restricted to read-only, meaning a user, program, or device can view a file but cannot modify or delete it. Or, access can allow some files to be created, edited, or deleted, but restricts that functionality for more sensitive files. This type of access is particularly important in the context of digital rights management (DRM), a system for protecting intellectual property and data copyright. As a response to the rise of Internet piracy, DRM allows for widespread (or limited) access to a digital file while also preventing unauthorized duplication or reproduction.

When applied to storage, access refers to the act of reading data from or writing data to a mass storage device. For example, programs can access a computer s memory, which means they read data from or write data to the main memory but do not interact with it otherwise. The time it takes to locate a single byte of information on a mass storage device is called the access time.

In web development, access characterizes which pages of a website are visible on the Internet and which users can view or modify them. If a web page is still in production, the draft will be hidden from the public but still accessible to anyone who has login credentials with the right privileges. Access levels can also be useful when gating content or building a community site in which someone must become a member to gain access.

With computers and servers, administrator access (also called root-level access) typically offers complete visibility and control over all aspects of a computer or network, as well as the access privileges other users have. This type of access enables administrators to install and configure applications and software.

2. When capitalized, Access refers to Microsoft Access.

Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

The Complete List of 1500+ Common Text Abbreviations & Acronyms

From A3 to ZZZ we list 1,559 SMS, online chat, and text abbreviations to help you translate and understand today's texting lingo. Includes Top...

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

Generations of Computers (1st to 5th)

Reviewed by Web Webster Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that...

Snail Mail

Snail mail, also called direct mail, is a slang term for...

CC vs BCC: What...

CC and BCC are two options to add third-party recipients to...

Eventbrite

  Eventbrite is an online event posting, event management, and ticketing website. Eventbrite can...