<Table> <Tr> <Td> </Td> <Td> This article is written like a personal reflection or opinion essay that states a Wikipedia editor's personal feelings about a topic . Please help improve it by rewriting it in an encyclopedic style . (June 2014) (Learn how and when to remove this template message) </Td> </Tr> </Table> <Tr> <Td> </Td> <Td> This article is written like a personal reflection or opinion essay that states a Wikipedia editor's personal feelings about a topic . Please help improve it by rewriting it in an encyclopedic style . (June 2014) (Learn how and when to remove this template message) </Td> </Tr> <P> In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource . The act of accessing may mean consuming, entering, or using . Permission to access a resource is called authorization . </P> <P> Locks and login credentials are two analogous mechanisms of access control . </P>

Who control the overall activity of a computer